0% found this document useful (0 votes)
74 views50 pages

Webtoc

The document outlines the proceedings of the 2022 IEEE 24th International Conference on High Performance Computing & Communications, along with several other related conferences held in Hainan, China from December 18-21, 2022. It includes various research papers and contributions from multiple authors in the fields of high performance computing, data science, smart cities, and sensor systems. The document also contains copyright information and details for obtaining additional copies of the publication.

Uploaded by

doreenfu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
74 views50 pages

Webtoc

The document outlines the proceedings of the 2022 IEEE 24th International Conference on High Performance Computing & Communications, along with several other related conferences held in Hainan, China from December 18-21, 2022. It includes various research papers and contributions from multiple authors in the fields of high performance computing, data science, smart cities, and sensor systems. The document also contains copyright information and details for obtaining additional copies of the publication.

Uploaded by

doreenfu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 50

2022 IEEE 24th International Conference

on High Performance Computing &


Communications; 8th International
Conference on Data Science &
Systems; 20th International Conference on
Smart City; 8th International Conference
on Dependability in Sensor, Cloud & Big
Data Systems & Application
(HPCC/DSS/SmartCity/DependSys 2022)

Hainan, China
18-21 December 2022

Pages 1-594

IEEE Catalog Number: CFP2289E-POD


ISBN: 979-8-3503-1994-1

1/4
Copyright © 2022 by the Institute of Electrical and Electronics Engineers, Inc.
All Rights Reserved

Copyright and Reprint Permissions: Abstracting is permitted with credit to the source.
Libraries are permitted to photocopy beyond the limit of U.S. copyright law for private
use of patrons those articles in this volume that carry a code at the bottom of the first
page, provided the per-copy fee indicated in the code is paid through Copyright
Clearance Center, 222 Rosewood Drive, Danvers, MA 01923.

For other copying, reprint or republication permission, write to IEEE Copyrights


Manager, IEEE Service Center, 445 Hoes Lane, Piscataway, NJ 08854. All rights
reserved.

*** This is a print representation of what appears in the IEEE Digital


Library. Some format issues inherent in the e-media version may also
appear in this print version.

IEEE Catalog Number: CFP2289E-POD


ISBN (Print-On-Demand): 979-8-3503-1994-1
ISBN (Online): 979-8-3503-1993-4

Additional Copies of This Publication Are Available From:

Curran Associates, Inc


57 Morehouse Lane
Red Hook, NY 12571 USA
Phone: (845) 758-0400
Fax: (845) 758-2633
E-mail: [email protected]
Web: www.proceedings.com
2022 IEEE 24th Int Conf on
High Performance Computing
& Communications; 8th Int
Conf on Data Science &
Systems; 20th Int Conf on
Smart City; 8th Int Conf on
Dependability in Sensor,
Cloud & Big Data Systems &
Application
(HPCC/DSS/SmartCity/Depen
dSys)
HPCC-DSS-SmartCity-
DependSys 2022
Table of Contents

Message from HPCC 2022 Steering Chairs liii


Message from HPCC 2022 General Chairs liv
Message from HPCC 2022 Program Chairs lv
HPCC 2022 Organizing Committee lvi
HPCC 2022 Program Committee lvii
Message from Smart City 2022 Steering Chairs lxi
Message from Smart City 2022 General Chairs lxii
Message from Smart City 2022 Program Chairs lxiii
Smart City 2022 Organizing Committee lxiv
Smart City 2022 Program Committee lxv
Message from ICESS 2022 Steering Chairs lxvi
Message from ICESS 2022 General Chairs lxvii
Message from ICESS 2022 Program Chairs lxviii
ICESS 2022 Organizing Committee lxix
ICESS 2022 Program Committee lxx
Message from DIKW 2022 Steering Chairs lxxi
Message from DIKW 2022 General Chairs lxxii
Message from DIKW 2022 Program Chairs lxxiii
DIKW 2022 Organizing Committee lxxiv

v
DIKW 2022 Program Committee lxxv
Message from DSS 2022 Steering Chairs lxxvii
Message from DSS 2022 General Chairs lxxviii
Message from DSS 2022 Program Chairs lxxix
DSS 2022 Organizing Committee lxxx
DSS 2022 Program Committee lxxxi
Message from DependSys 2022 Steering Chairs lxxxii
Message from DependSys 2022 General Chairs lxxxiii
Message from DependSys 2022 Program Chairs lxxxiv
DependSys 2022 Organizing Committee lxxxv
DependSys 2022 Program Committee lxxxvi

The 24th IEEE International Conference on HPCC (HPCC 2022)

Regular Research Papers

High Performance Computing and Applications 1

Efficiently Executing Sparse Matrix-Matrix Multiplication on General Purpose Digital


Single Processor 1
Haibo Xu (National University of Defense Technology, China), Xiaoxiong
Zhu (National University of Defense Technology, China), Qinglin Wang
(National University of Defense Technology, China), and Jie Liu
(National University of Defense Technology, China)
Matching using Sufficient Dimension Reduction for Heterogeneity Causal Effect Estimation 9
Haoran Zhao (Huazhong Agricultural University, China), Yinghao Zhang
(Huazhong Agricultural University, China), Debo Cheng (Guangxi Normal
University, China; STEM, University of South Australia, Australia),
Chen Li (Kyushu Institute of Technology, Japan), and Zaiwen Feng
(Huazhong Agricultural University, China; Hubei Key Laboratory of
Agricultural Bioinformatics, Huazhong Agricultural University, China;
Hubei Hongshan Laboratory, Huazhong Agricultural University, China;
National Key Laboratory of Crop Genetic Improvement, Huazhong
Agricultural University, China; State Key Laboratory of Hybrid Rice,
Wuhan University, China; Macro Agricultural Research Institute,
Huazhong Agricultural University, China)
SWin: A Set-Window Division Mechanism to Alleviate I/O Jitters of NVMe SSD Drives 17
Yuting Liu (Beihang University, China), Liang Wang (Beihang
University, China), Jinbin Zhu (Beihang University, China), Runnan
Shen (Beihang University, China), Shixuan Jiang (Beihang University,
China), and Limin Xiao (Beihang University, China)
Machine Learning-Enabled Performance Model for DNN Applications and AI Accelerator 25
Ruohan Wu (University of Science and Technology of China, China),
Mingfan Li (University of Science and Technology of China, China),
Hanxi Li (University of Science and Technology of China, China),
Tianxiang Chen (Huawei, China), Xinghui Tian (Huawei, China), Xiaoxin
Xu (Huawei, China), Bin Zhou (Huawei, China), Junshi Chen (University
of Science and Technology of China, China), and Hong An (University of
Science and Technology of China, China)

vi
High Performance Computing and Applications 2

DTSpMV: An Adaptive SpMV Framework for Graph Analysis on GPUs 35


Guoqing Xiao (Hunan University, China; National Supercomputing Center
in Changsha, Changsha, China), Tao Zhou (Hunan University, China;
National Supercomputing Center in Changsha, Changsha, China), Yuedan
Chen (Hunan University, China; National Supercomputing Center in
Changsha, Changsha, China), Yikun Hu (Hunan University, China;
National Supercomputing Center in Changsha, Changsha, China), and
Kenli Li (Hunan University, China; National Supercomputing Center in
Changsha, Changsha, China)
RTA: An Efficient SIMD Architecture for Ray Tracing 43
Run Yan (National University of Defense Technology, China), Libo Huang
(National University of Defense Technology), Hui Guo (National
University of Defense Technology), Yashuai Lü (Huawei 2012 Labs,
China), Ling Yang (National University of Defense Technology), Nong
Xiao (National University of Defense Technology), Li Shen (National
University of Defense Technology), and Yongwen Wang (National
University of Defense Technology)
MISA-MD: A New Design of Molecular Dynamics Software for GPU Architecture 51
Genshen Chu (University of Science and Technology Beijing, China),
Tianyi Chen (University of Science and Technology Beijing, China),
Dandan Chen (University of Science and Technology Beijing, China), He
Bai (University of Science and Technology Beijing, China), Guannan Li
(Zhejiang Lab, China), Shuai Ren (University of Science and Technology
Beijing, China), and Yang Li (University of Science and Technology
Beijing, China)
LBBGEMM: A Load-Balanced Batch GEMM Framework on ARM CPUs 59
Cunyang Wei (Institute of Computing Technology, Chinese Academy of
Sciences, China; University of Chinese Academy of Sciences, China),
Haipeng Jia (Institute of Computing Technology, Chinese Academy of
Sciences, China), Yunquan Zhang (Institute of Computing Technology,
Chinese Academy of Sciences, China), Kun Li (Microsoft Research), and
Luhan Wang (Institute of Computing Technology, Chinese Academy of
Sciences, China; University of Chinese Academy of Sciences, China)
GPU Parallelization and Optimization of a Combustion Simulation Application 67
Zhixiang Liao (National University of Defense Technology, China),
Yongzhou Liu (National University of Defense Technology, China), and
Yonggang Che (National University of Defense Technology, China)

vii
High Performance Computing and Applications 3

Dynamic Semantic Modeling of Structural Data Sources 74


Hailong Chu (HuaZhong Agriculture University, China), Weiming Wu
(HuaZhong Agriculture University, China), Wolfgang Mayer (University
of South Australia, Australia), Debo Cheng (Guangxi Normal University,
China; STEM & University of South Australia, Australia), Hong-Yu Zhang
(Huazhong Agricultural University, China; Huazhong Agricultural
University, China), and Zaiwen Feng (Huazhong Agricultural University,
China; Huazhong Agricultural University, China; Agricultural
University, China; Huazhong Agricultural University, China; Wuhan
University, China; Macro Agricultural Research Institute, Huazhong
Agricultural University, China)
Optimized Computation for Determinant of Multivariate Polynomial Matrices on GPGPU 82
Liangyu Chen (East China Normal University, China), Jianjun Wei
(Washington University in St. Louis, USA), Zhenbing Zeng (Shanghai
University, China), and Min Zhang (East China Normal University,
China)
PaddlePaddle: A Production-Oriented Deep Learning Platform Facilitating the Competency of
Enterprises 92
Ran Bi (Baidu Online Network Technology (Beijing) Co., Ltd, China),
Tongtong Xu (Baidu Online Network Technology (Beijing) Co., Ltd,
China), Mingxue Xu (Baidu Online Network Technology (Beijing) Co.,
Ltd, China), and Enhong Chen (University of Science and Technology of
China, China)
ME-BERT: Multi-Exit BERT by Use of Adapter 100
Pan Ma (Sichuan University, China), Dasha Hu (Sichuan University,
China), Xuefeng Ding (Sichuan University, China), Bing Guo (Sichuan
University, China), and Yuming Jiang (Sichuan University, China)

High Performance Computing and Applications 4

Dual Memory Network for Medical Dialogue Generation 110


Zongli Jiang (Beijing University of Technology, China), Jia Xu
(Beijing University of Technology, China), Jinli Zhang (Beijing
University of Technology, China), Fenglong Ma (Penn State University,
USA), and Jianqiang Li (Beijing University of Technology, China)
Contrastive Self-Supervised Learning for Predicting Disease-RNA Associations 118
Xiaoyu Wu (Beijing University of Technology, China), Jinli Zhang
(Beijing University of Technology, China), Zongli Jiang (Beijing
University of Technology, China), and Jianqiang Li (Beijing University
of Technology, China)

viii
MZ Core: An Enhanced Matrix Acceleration Engine for HPC/AI Applications 126
Yasong Cao (National University of Defense Technology, China), Mei Wen
(National University of Defense Technology, China), Junzhong Shen
(National University of Defense Technology, China), Sheng Liu
(National University of Defense Technology, China), Zhi Wang (National
University of Defense Technology, China), Minjin Tang (National
University of Defense Technology, China), Yahao Fang (National
University of Defense Technology, China), Jianchao Yang (National
University of Defense Technology, China), Renyu Yang (National
University of Defense Technology, China), Yuhan Kang (Hunan Normal
University, China), and Jiawei Fei (National University of Defense
Technology, China)
Evaluating BERT on Cloud-edge Time Series Forecasting and Sentiment Analysis via Prompt
Learning 135
Qizhi Li (Xihua University, China), Xianyong Li (Xihua University,
China), Yujia Song (Xihua University, China), Maolin Zhang (Xihua
University, China), Longqi Chen (Xihua University, China), Gang Wang
(Xihua University, China), and Yajun Du (Xihua University, China)

High Performance Computing and Applications 5

A Practical Adversarial Attack on Graph Neural Networks by Attacking Single Node Structure 143
Yang Chen (Qinghai Normal University, china), Zhonglin Ye (Qinghai
Normal University, China), Haixing Zhao (Qinghai Normal University,
China), Lei Meng (Qinghai Normal University, China), Zhaoyang Wang
(Qinghai Normal University), and Yanlin Yang (Qinghai Normal
University, China)
Three-Channel Graph Convolutional Network 153
Lei Meng (Qinghai Normal University, China), Zhonglin Ye (Qinghai
Normal University, China), Haixing Zhao (Qinghai Normal University,
China), Yanlin Yang (Qinghai Normal University, China), Yang Chen
(Qinghai Normal University, China), and Zhaoyang Wang (Qinghai Normal
University, China)
Image Anomaly Detection With Semantic-Enhanced Augmentation and Distributional Kernel 163
Mingxi Wang (Jilin University, China), Ye Zhu (Deakin University,
Australia), Gang Li (Deakin University, Australia), Gang Liu (Harbin
Engineering University, China), and Bo Yang (Jilin University, China)

High Performance Computing and Applications 6

ReSLB: Load Balanced Workflow for Distributed Deep Learning Mass Spectrometry Database 171
Mocheng Li (National University of Defense Technology, China), Yang
Liu (National University of Defense Technology, China), Yang Ou
(National University of Defense Technology, China), Zhiguang Chen (Sun
Yat-sen University, China), Nong Xiao (National University of Defense
Technology, China), and Tao Chen (National Center for Protein
Sciences(Beijing), China)

ix
Efficient Electronic Transaction Query Model for Light Nodes Based on Optimized Blockchain
Structure 178
Mingjie Zhao (Sichuan University, China), Cheng Dai (Sichuan
University, China), Yuting Zhao (Sichuan University, China), and Bing
Guo (Sichuan University, China)
IIoT Mobile Business Data Placement Strategy Based on Bayesian Optimization Algorithm 186
Zhijie Shen (Nanjing University, China; Guangdong Laboratory of
Artificial Intelligence and Digital Economy(SZ), China), Bowen Liu
(Nanjing University, China; Guangdong Laboratory of Artificial
Intelligence and Digital Economy(SZ), China), Xiaolong Xu (Nanjing
University of Information Science and Technology, China), Lianyong Qi
(Qufu Normal University, China), Fei Dai (Southwest Forestry
University, China), and Wanchun Dou (Nanjing University, China)
Medical Dialogue Generation via Extracting Heterogenous Information 194
Bocheng Zhao (Beijing University of Technology, China), Zongli Jiang
(Beijing University of Technology, China), Jinli Zhang (Beijing
University of Technology, China), Fenglong Ma (Penn State University,
USA), and Jianqiang Li (Beijing University of Technology, China)

Parallel and Distributed Computing and Systems 1

A Loop Optimization Method for Dataflow Architecture 202


Zhihua Fan (Institute of Computing Technology, China; UCAS, China),
Wenming Li (Institute of Computing Technology, China; UCAS, China),
Tianyu Liu (Institute of Computing Technology, China; UCAS, China),
Shengzhong Tang (Institute of Computing Technology, China; UCAS,
China), Zhen Wang (Institute of Computing Technology, China; UCAS,
China), Xuejun An (Institute of Computing Technology, China; UCAS,
China), Xiaochun Ye (Institute of Computing Technology, China), and
Dongrui Fan (Institute of Computing Technology, China; UCAS, China)
Design and Evaluation of a Rack-Scale Disaggregated Memory Architecture For Data Centers 212
Amit Puri (Indian Institute of Technology Guwahati, India), John Jose
(Indian Institute of Technology Guwahati, India), and Tamarapalli
Venkatesh (Indian Institute of Technology Guwahati, India)
A Method for Mobile-Aware Multi-vehicular Offloading in Hybrid Cloud-Edge Environment 218
Yu Wang (Chongqing University, China), Feng Zeng (Discovery Technology
(shenzhen) limited, China), Yin Li (Guangzhou Institute of Software
Application Technology, China), Yunni Xia (Chongqing University,
China), and Linchengxi Zeng (Mashang Consumer Finance Company Ltd.
(MSCF), China)
Hybrid Decision Based Multi-Agent Deep Reinforcement Learning for Task Offloading in
Collaborative Edge-Cloud Computing 228
Juan Chen (Xihua University, China), Zongling Wu (Southwest Jiaotong
University, China), Lei Wu (University of Electronic Science and
Technology of China, China), Yunni Xia (Chongqing University, China),
Yang Wang (Xihua University, China), Ling Xiong (Xihua University,
China), and Canghong Shi (Xihua University, China)

x
Hybrid Parameter Update: Alleviating Imbalance Impacts for Distributed Deep Learning 236
Hongliang Li (Jilin University, China), Dong Xu (Jilin University,
China), Zhewen Xu (Jilin University, China), and Xiang Li (Jilin
University, China)

Parallel and Distributed Computing and Systems 2

PRKP: A Parallel Randomized Iterative Algorithm for Solving Linear Systems 244
Junjie Wang (Qilu University of Technology (Shandong Academy of
Sciences), China), Min Tian (Qilu University of Technology (Shandong
Academy of Sciences), China), Yinglong Wang (Qilu University of
Technology (Shandong Academy of Sciences), China), Guoping He (Qilu
University of Technology (Shandong Academy of Sciences), China), and
Tao Liu (Qilu University of Technology (Shandong Academy of Sciences),
China)
A Secure and Reliable Construction Scheme for Enterprise Value Chain Networks 250
Chaoxia Qin (Sichuan University, China), Bing Guo (Sichuan University,
China), Yuting Zhao (Sichuan University, China), and Yan Shen (Chengdu
University of Information Technology, China)
Batched LU Factorization with Fast Row Interchanges for Small Matrices on GPUs 259
Rongfeng Huang (Computer Network Information Center Chinese Academy of
Sciences, China), Yonghua Zhao (Computer Network Information Center
Chinese Academy of Sciences, China), Tianyu Yu (Computer Network
Information Center Chinese Academy of Sciences, China), Shifang Liu
(Computer Network Information Center Chinese Academy of Sciences,
China), and Xinyin Zhang (Computer Network Information Center Chinese
Academy of Sciences, China)
ESBench: Understanding Deep Learning Inference Overheads for Edge Serverless 267
Yanying Lin (Shenzhen institute of advanced technology, Chinese
Academy of Science; University of Chinese Academy of Sciences),
Junhong Chen (Shenzhen institute of advanced technology, Chinese
Academy of Science; University of Chinese Academy of Sciences), Yang
Wang (Shenzhen institute of advanced technology, Chinese Academy of
Science), and Kejiang Ye (Shenzhen institute of advanced technology,
Chinese Academy of Science)
Fine-Grained Scheduling for Containerized HPC Workloads in Kubernetes Clusters 275
Peini Liu (Barcelona Supercomputing Center, Spain; Universitat
Politècnica de Catalunya, Spain) and Jordi Guitart (Barcelona
Supercomputing Center, Spain; Universitat Politècnica de Catalunya,
Spain)

xi
Parallel and Distributed Computing and Systems 3

A Cache-Aware Virtual Machine Placement With Network Constraints in Large-Scale Network


Emulation 285
Haiqiang Fei (School of Cyber Security, University of Chinese Academy
of Sciences, China), Wei Wang (Zhongguancun Laboratory, China), Yu
Chen (School of Cyber Security, University of Chinese Academy of
Sciences, China), Zhenquan Ding (School of Cyber Security, University
of Chinese Academy of Sciences, China), Hongsong Zhu (Institute of
Information Engineering, Chinese Academy of Sciences, China), Yongji
Liu (School of Cyber Security, University of Chinese Academy of
Sciences, China), Zhiyu Hao (Zhongguancun Laboratory, China), and
Chengli Yu (China Academy or Industrial Internet, China)
SCIF-ARF: Container Anomaly Prediction for Container Cloud Platforms 295
Jing Li (Civil Aviation University of China, China), Chang Liu (Civil
Aviation University of China, China), Xiaofei Wang (Civil Aviation
University of China, China), and Chunlei Liu (Travelsky Mobile
Technology Limited, China)
FedTADBench: Federated Time-Series Anomaly Detection Benchmark 303
Fanxing Liu (Sichuan University, China), Cheng Zeng (University of
Electronic Science and Technology of China, China), Le Zhang
(University of Electronic Science and Technology of China, China),
Yingjie Zhou (Sichuan University, China), Qing Mu (Sichuan University,
China), Yanru Zhang (University of Electronic Science and Technology
of China, China), Ling Zhang (Sichuan University, China), and Ce Zhu
(University of Electronic Science and Technology of China, China)
TBFL: A Trusted Blockchain-Based Federated Learning System 311
Yufang Wu (Beijing Jiaotong University, China), Guorong Chen (Beijing
Jiaotong University, China), Yuhao Liu (Beijing Jiaotong University,
China), Chao Li (Beijing Jiaotong University, China), Mingqing Hu
(iFLYTEK Co., Ltd, China), and Wei Wang (Beijing Jiaotong University,
China)
A Cache Sharing Mechanism Based on RDMA 319
Xiao Zhang (Northwestern Polytechnical University, China), Jinbo Yv
(Northwestern Polytechnical University, China), Yun Liu (Northwestern
Polytechnical University, China), Song Xiao (Northwestern
Polytechnical University, China), Nannan Zhao (Northwestern
Polytechnical University, China), and Xiaonan Zhao (Northwestern
Polytechnical University, China)

Parallel and Distributed Computing and Systems 4

FNotify: A Low-Latency and Scalable Publish/Subscribe System using RDMA 327


Yusen Xu (Shanghai Jiao Tong University, China), Sijie Shen (Shanghai
Jiao Tong University, China), Mingcong Han (Shanghai Jiao Tong
University, China), and Rong Chen (Shanghai Jiao Tong University,
China)

xii
Efficient, Scalable and Robust Data Shuffle Service for Distributed MapReduce Computing on
Cloud 337
Rong Gu (Nanjing University, China), Xu Huang (Nanjing University,
China), Haipeng Dai (Nanjing University, China), Xiaoyu Geng (Nanjing
University, China), Xiaofei Chen (Nanjing University, China), Yihua
Huang (Nanjing University, China), Fu Xiao (Nanjing University of
Posts and Telecommunications, China), and Guihai Chen (Nanjing
University, China)
Delay and Loss Rate Analysis of the Log Commitment Process in Raft 347
Yuqiang Wen (Macao Polytechnic University, China) and K. L. Eddie Law
(Macao Polytechnic University, China)
A Robust and Accurate Multivariate Time Series Anomaly Detection in Fluctuating Cloud-Edge
Computing Systems 357
Yujia Song (Xihua university, China), Ruyue Xin (University of
Amsterdam, Netherlands), Rui Zhang (Xihua university, China), Juan
Chen (Xihua university, China), and Zhiming Zhao (University of
Amsterdam, Netherlands)
Online 8-Form Tai Chi Chuan Training and Evaluation System Based on Pose Estimation 366
Chunchen Wei (University of Electronic Science and Technology of
China), Jingxin Wen (Sichuan University Jinjiang College), Ran Bi
(University of Electronic Science and Technology of China), Huabin
Yang (University of Electronic Science and Technology of China),
Yanqing Tao (University of Electronic Science and Technology of
China), Yuhang Fan (Chengdu DiShi Technology Co Ltd), Yulong He
(Chengdu DiShi Technology Co Ltd), Didi Cheng (Sichuan University
Jinjiang College), and Yanru Zhang (University of Electronic Science
and Technology of China, UESTC Shenzhen Institute for Advanced Study)

Parallel and Distributed Computing and Systems 5

Weak Network Oriented Mobile Distributed Storage: A Hybrid Fault-Tolerance Scheme Based on
Potential Replicas 372
Xinlei Wei (Chongqing University, China), Yujuan Tan (Chongqing
University, China), Duo Liu (Chongqing University, China), Daitao Wu
(Chongqing University, China), Yu Wu (Chongqing University, China),
Xianzhang Chen (Chongqing University, China), and Jian Li (Chongqing
University, China)
GSpTC: High-Performance Sparse Tensor Contraction on CPU-GPU Heterogeneous Systems 380
Guoqing Xiao (Hunan University, China; National Supercomputing Center
in Changsha, China), Chuanghui Yin (Hunan University, China; National
Supercomputing Center in Changsha, China), Yuedan Chen (Hunan
University, China; National Supercomputing Center in Changsha, China),
Mingxing Duan (Hunan University, China; National Supercomputing Center
in Changsha, China), and Kenli Li (Hunan University, China; National
Supercomputing Center in Changsha, China)
Interactive and Reliable Graph Processing via the Edge-Cloud Collaboration Framework 388
Jun Zhou (Keio University, Japan) and Masaaki Kondo (Keio University,
Japan)

xiii
Dual Chain Authentication and key Agreement Protocol Based on Blockchain Technology in
Edge Computing 396
Wei Jian (Hunan University of Science and Technology, China), Jianbo
Xu (Hunan University of Science and Technology, China), Wei Liang
(Hunan University of Science and Technology, China), and Kuan-Ching Li
(Hunan University of Science and Technology, China)

Parallel and Distributed Computing and Systems 6

Aprus: An Airborne Altitude-Adaptive Purpose-Related UAV System for Object Detection 402
Weiqiang Wang (Yunnan University, China), Haiyang Chen (Yunnan
University, China), Xingzhou Zhang (Chinese Academy of Sciences,
China; University of Chinese Academy of Sciences, China), Wei Zhou
(Yunnan University, China), and Weisong Shi (University of Delaware,
USA)
DA2F: Research on Robustness of Deep Learning Models using Approximate Activation Function 412
Yuqi Bian (Capital Normal University, China), Jing Wang (Renmin
University of China, China), Weigong Zhang (Capital Normal University,
China), and Lan Gao (Capital Normal University, China)
Distance-Aware Multi-Agent Reinforcement Learning for Task Offloading in MEC Network 420
Lili Jiang (Tsinghua University, China), Lifeng Sun (Tsinghua
University, China), and Wenwu Zhu (Tsinghua University, China)
Multi-Scenario Bimetric-Balanced IoT Resource Allocation: An Evolutionary Approach 428
Jiashu Wu (Shenzhen Institute of Advanced Technology Chinese Academy
of Sciences, China; University of Chinese Academy of Sciences, China),
Hao Dai (Shenzhen Institute of Advanced Technology Chinese Academy of
Sciences, China; University of Chinese Academy of Sciences, China),
Yang Wang (Shenzhen Institute of Advanced Technology Chinese Academy
of Sciences, China), and Zhiying Tu (Harbin Institute of Technology,
China)

Communications and Networking 1

In-Band Management Framework and Performance Evaluation for Interconnect Network in the
TianHe Exascale Prototype System 438
Jijun Cao (National University of Defense Technology, China), Mingche
Lai (National University of Defense Technology, China), Lu Liu
(National University of Defense Technology, China), Jiaqing Xu
(National University of Defense Technology, China), and Xiaoyue Hu
(National University of Defense Technology, China)

xiv
GDMD: A Transmission Control Scheme with Block Information-Aware for Delay Sensitive
Multimedia 446
Wei Yang (Institute of Information Engineering, Chinese Academy of
Sciences, China; University of Chinese Academy of Sciences, China;
National Engineering Laboratory of Information Security Technologies,
China; School of Cyber Security, University of Chinese Academy of
Sciences, China; National Engineering Laboratory of Information
Security Technologies, China), Yubing Li (Institute of Information
Engineering, Chinese Academy of Sciences, China; University of Chinese
Academy of Sciences, China; National Engineering Laboratory of
Information Security Technologies, China), Ping Jiang (Institute of
Information Engineering, Chinese Academy of Sciences, China;
University of Chinese Academy of Sciences, China; National Engineering
Laboratory of Information Security Technologies, China), Zhou Zhou
(Institute of Information Engineering, Chinese Academy of Sciences,
China; National Engineering Laboratory of Information Security
Technologies, China; National Engineering Laboratory of Information
Security Technologies, China), and Qingyun Liu (Institute of
Information Engineering, Chinese Academy of Sciences, China; National
Engineering Laboratory of Information Security Technologies, China;
National Engineering Laboratory of Information Security Technologies,
China)
Heterogeneous Propagation Graph Representation Learning for Fake News Detection 456
Zhi Zeng (Huazhong Agricultural University, China; Key Laboratory of
Smart Farming for Agricultural Animals, China; Hubei Engineering
Technology Research Center of Agricultural Big Data, China), Xiang Li
(Huazhong Agricultural University, China; Key Laboratory of Smart
Farming for Agricultural Animals, China; Hubei Engineering Technology
Research Center of Agricultural Big Data, China), and Ying Sha
(Huazhong Agricultural University, China; Key Laboratory of Smart
Farming for Agricultural Animals, China; Hubei Engineering Technology
Research Center of Agricultural Big Data, China)
Fairness-Aware Algorithms for Seed Allocation in Social Advertising 464
Pengzi Wang (University of Science and Technology of China, China),
Yiming Zhu (Hong Kong University of Science and Technology, China;
Hong Kong University of Science and Technology(Guangzhou), China), Kai
Han (Soochow University, China), Zhizhuo Yin (University of Science
and Technology of China, China), Qing Xiu (University of Science and
Technology of China, China), and Pan Hui (Hong Kong University of
Science and Technology, China)

xv
Communications and Networking 2

MTBD: HTTPS Tunnel Detection Based on Multi-dimension Traffic Behaviors Decision 474
Bingxu Wang (Institute of Information Engineering, Chinese Academy of
Sciences, China; University of Chinese Academy of Sciences, China),
Yangyang Guan (Institute of Information Engineering, Chinese Academy
of Sciences, China; University of Chinese Academy of Sciences, China),
GaoPeng Gou (Institute of Information Engineering, Chinese Academy of
Sciences, China; University of Chinese Academy of Sciences, China),
Peipei Fu (Institute of Information Engineering, Chinese Academy of
Sciences, China; University of Chinese Academy of Sciences, China),
Zhen Li (Institute of Information Engineering, Chinese Academy of
Sciences, China; University of Chinese Academy of Sciences, China),
Qingya Yang (Institute of Information Engineering, Chinese Academy of
Sciences, China; University of Chinese Academy of Sciences, China),
and Chang Liu (Institute of Information Engineering, Chinese Academy
of Sciences, China; University of Chinese Academy of Sciences, China)
Spreading Factor Allocation and Rate Adaption for Minimizing Age of Information in LoRaWAN 482
Zhuoyao Wang (Fudan University, China), Xiaokang Xu (Fudan University,
China), and Jin Zhao (Fudan University, China)
DeepPath: Multi-path Traffic Scheduling Algorithm for 5G High Dynamic Network 490
Long Zhang (Beijing University of Posts and Telecommunications,
China), Bo He (Beijing University of Posts and Telecommunications,
China), Jingyu Wang (Beijing University of Posts and
Telecommunications, China), Qi Qi (Beijing University of Posts and
Telecommunications, China), Haifeng Sun (Beijing University of Posts
and Telecommunications, China), Cong Liu (China Mobile Research
Institute, China), and Jianxin Liao (Beijing University of Posts and
Telecommunications, China)
SequenceShield: A Robust and Accurate DDoS Detection Method via Serializing the Traffic
With Direction Information 499
Zeyi Deng (Institute of Information Engineering, Chinese Academy of
Sciences, China; University of Chinese Academy of Sciences, China;
National Engineering Laboratory of Information Security Technologies,
China), Wei Yang (Institute of Information Engineering, Chinese
Academy of Sciences, China; University of Chinese Academy of Sciences,
China; National Engineering Laboratory of Information Security
Technologies, China), Minchao Xu (Institute of Information
Engineering, Chinese Academy of Sciences, China; University of Chinese
Academy of Sciences, China; National Engineering Laboratory of
Information Security Technologies, China), Meijie Du (Institute of
Information Engineering, Chinese Academy of Sciences, China;
University of Chinese Academy of Sciences, China; National Engineering
Laboratory of Information Security Technologies, China), Yuzhen Li
(Institute of Information Engineering, Chinese Academy of Sciences,
China; University of Chinese Academy of Sciences, China; National
Engineering Laboratory of Information Security Technologies, China),
Zhou Zhou (Institute of Information Engineering, Chinese Academy of
Sciences, China; National Engineering Laboratory of Information
Security Technologies, China), and Qingyun Liu (Institute of
Information Engineering, Chinese Academy of Sciences, China; National
Engineering Laboratory of Information Security Technologies, China)

xvi
Nuwa-RL: A Reinforcement Learning Based Receiver-Side Congestion Control Algorithm to Meet
Applications Demands over Dynamic Wireless Networks 508
Guanghui Gong (Ningbo University, China), Xianliang Jiang (Ningbo
University, China), Guang Jin (Ningbo University, China), Yi Xie
(Ningbo University, China), and Haiming Chen (Ningbo University,
China)

Communications and Networking 3

A Lightweight Authentication Protocol for NFC-Enabled Drug Anti-Counterfeiting System 516


Xiangwei Meng (Nanjing University of Aeronautics and Astronautics,
China), Wei Liang (Hunan University of Science and Technology, China),
Zisang Xu (Changsha University of Science and Technology, China), and
Kuan-Ching Li (Hunan University of Science and Technology, China)
Compressed Sensing by using Measurement Completion for Robust Image Coding 523
Bo Zhang (Army Engineering University, China), Di Xiao (Chongqing
University, China), Sen Bai (Chongqing Institute of Engineering,
China), and Min Li (Chongqing University, China)
Coding-Aware Routing for Maximum Throughput and Coding Opportunities by Deep Reinforcement
Learning in FANET 530
Xiulin Qiu (Nanjing University of Science and Technology, China), Bo
Song (Nanjing University of Science and Technology, China), Yaqi Ke
(Nanjing University of Science and Technology, China), Lei Xu (Nanjing
University of Science and Technology, China), and Yuwang Yang (Nanjing
University of Science and Technology, China)
Less is More: Mitigating Tor Traffic Correlation with Distance-Aware Path Selection 538
Guoqiang Zhang (Tsinghua University, China; Beijing National Research
Center for Information Science and Technology (BNRist), China), Jiahao
Cao (Tsinghua University, China; Beijing National Research Center for
Information Science and Technology (BNRist), China), Mingwei Xu
(Tsinghua University, China; Beijing National Research Center for
Information Science and Technology (BNRist), China), and Qi Li
(Tsinghua University, China; Beijing National Research Center for
Information Science and Technology (BNRist), China)
ONLAD-IDS: ONLAD-Based Intrusion Detection System using SmartNIC 546
Man Wu (Keio University, Japan), Hiroki Matsutani (Keio University,
Japan), and Masaaki Kondo (Keio University, Japan)

xvii
Communications and Networking 4

A Shapley-Based Lightweight Global Explainer for Network Intrusion Detection System 554
Hangsheng Zhang (University of Chinese Academy of Sciences, Institute
of Information Engineering, Chinese Academy of Sciences, China), Yu
Chen (China Mobile Communications Group Co Ltd, China), Weiyu Liu
(China Mobile Communications Group Co Ltd, China), ShangYuan Zhuang
(University of Chinese Academy of Sciences, Institute of Information
Engineering, Chinese Academy of Sciences, China), Jiyan Sun (Institute
of Information Engineering, Chinese Academy of Sciences, China),
Yinlong Liu (University of Chinese Academy of Sciences, Institute of
Information Engineering, Chinese Academy of Sciences, China), and Liru
Geng (Institute of Information Engineering Chinese Academy of
Sciences, China)
Ordinal Data Stream Collection with Condensed Local Differential Privacy 562
Yuanyuan He (Huazhong University of Science and Technology, China),
Fayao Wang (Huazhong University of Science and Technology, China),
Xianjun Deng (Huazhong University of Science and Technology, China),
Jianbing Ni (Queen's University, Canada), Jun Feng (Huazhong
University of Science and Technology, China), and Shenghao Liu
(Huazhong University of Science and Technology, China)
Lightweight Many-to-Many Anonymous Authenticated Key Agreement Scheme for Intelligent
Vehicular Ad-hoc Networks 570
Wenchen Wang (Southwest Petroleum University, China), Xiaojun Zhang
(Southwest Petroleum University, China), Hao Wang (NSFOCUS Information
Chengdu Technology co., LTD, China), Liming Mu (NSFOCUS Information
Chengdu Technology co., LTD, China), and Haoyu Tang (Southwest
Petroleum University, China)
An Efficient and Privacy-Concerned Multi-user Access Mechanism for EMRs 578
Yihan Li (University of Xihua, China), Shengke Zeng (University of
Xihua, China), Yawen Feng (University of Xihua, China), and Zhiliang
Zhao (University of Xihua, China)
CARE: Enabling Hardware Performance Counter Based Malware Detection Resilient to System
Resource Competition 586
Yanfei Hu (Institute of Information Engineering, Chinese Academy of
Sciences, China; University of Chinese Academy of Sciences, China),
Shuangshuang Liang (Institute of Information Engineering, Chinese
Academy of Sciences, China; University of Chinese Academy of Sciences,
China), Min Li (Institute of Information Engineering, Chinese Academy
of Sciences, China; University of Chinese Academy of Sciences, China),
Tao Xue (Institute of Information Engineering, Chinese Academy of
Sciences, China; University of Chinese Academy of Sciences, China),
Boyang Zhang (Institute of Information Engineering, Chinese Academy of
Sciences, China), and Yu Wen (Institute of Information Engineering,
Chinese Academy of Sciences, China; University of Chinese Academy of
Sciences, China)

xviii
Communications and Networking 5

STEAM: SVDD-Based Anomaly Detection on Attributed Networks via Multi-Autoencoders 595


Junjie Zhang (Sichuan University, China), Xinye Wang (Sichuan
University, China), Zhenyang Yu (Sichuan University, China), Menglin
Huang (Sichuan University, China), Lei Duan (Sichuan University,
China), and Jie Zuo (Sichuan University, China)
Forward and Backward Private Searchable Symmetric Encryption with Efficient Updates 603
Zhiming Yin (School of Computer Science and Engineering, Hunan
University of Science and Technology, Xiangtan, China), Xiong Li
(Institute for Cyber Security, School of Computer Science and
Engineering, University of Electronic Science and Technology of China,
Chengdu 611731, China), Kim-Kwang Raymond Choo (Department of
Information Systems and Cyber Security, University of Texas at San
Antonio, San Antonio, TX 78249-0631, USA), Yuzhen Liu (School of
Computer Science and Engineering, Hunan University of Science and
Technology, Xiangtan, China), and Wei Liang (School of Computer
Science and Engineering, Hunan University of Science and Technology,
Xiangtan, China)
Manipulated Client Initial Attack and Defense of QUIC 611
Bo Cui (Intel Asia-Pacific Research & Development, China), Zixuan Li
(Intel Asia-Pacific Research & Development, China), and Fei Yu (Intel
Asia-Pacific Research & Development, China)
Dynamic Behavior Pattern: Mining the Fraudsters in Telecom Network 619
Dengshi Li (Jianghan University, China; Wuhan University, China), Lu
Zeng (Jianghan University, China), Ruimin Hu (Wuhan University,
China), Zijun Huang (Wuhan University, China), Xiaocong Liang
(Jianghan University, China), and Yilong Zang (Wuhan University,
China)
Hybrid Service Function Chains Dynamic Deployment in Multi-domain Edge Cloud Networks 627
Shiyan Zhang (Tsinghua University), Beijia Wang (Beijing University of
Posts and Telecommunications), Qingxiao Huang (Communication
University of China), Yinhai Wu (Beijing University of Posts and
Telecommunications), Ruohan Xu (Tsinghua University), Kun Wang
(Daimler Greater China Ltd, R&D China), and Xinyu Zhang (Tsinghua
University)

Communications and Networking 6

A Glimpse of the Whole: Detecting Few-Shot Android Malware Encrypted Network Traffic 635
Wenhao Li (Institute of Information Engineering, Chinese Academy of
Sciences, China), Xiao-Yu Zhang (Institute of Information Engineering,
Chinese Academy of Sciences, China), Huaifeng Bao (Institute of
Information Engineering, Chinese Academy of Sciences, China), Qiang
Wang (Institute of Information Engineering, Chinese Academy of
Sciences, China), Haichao Shi (Institute of Information Engineering,
Chinese Academy of Sciences, China), and Zhaoxuan Li (Institute of
Information Engineering, Chinese Academy of Sciences, China)

xix
BYEE: Batch Fully Private Scheme for Coded Distributed Matrix Multiplication 645
Guojing Li (Soochow University, China), Jin Wang (Soochow University,
China), Xiaotian Zou (Soochow University, China), Lingzhi Li (Soochow
University, China), and Fei Gu (Soochow University, China)
Black-Box Adversarial Windows Malware Generation via United Puppet-Based Dropper and
Genetic Algorithm 653
Shaohua Wang (Sichuan University, China), Yong Fang (Sichuan
University, China), Yijia Xu (Sichuan University, China), and Yaxian
Wang (Sichuan University, China)
QUIC-CNN: Website Fingerprinting for QUIC Traffic in Tor Network 663
Mingjie Nie (Shanghai Jiao Tong University, China), Futai Zou
(Shanghai Jiao Tong University, China), Yi Qin (Shanghai Jiao Tong
University, China), Tianming Zheng (Shanghai Jiao Tong University,
China), and Yue Wu (Shanghai Jiao Tong University, China)
A Data-Free Black-box Attack for Generating Transferable Adversarial Examples 672
Chenxu Wang (National Key Laboratory of Science and Technology on
Information System Security, China), Ming Zhang (National Key
Laboratory of Science and Technology on Information System Security,
China), Jinjing Zhao (National Key Laboratory of Science and
Technology on Information System Security, China), Xiaohui Kuang
(National Key Laboratory of Science and Technology on Information
System Security, China), Han Zhang (Tsinghua University, China), and
Xuhong Zhang (Zhejiang University, China)

Communications and Networking 7

An Illicit Bitcoin Address Analysis Scheme Based on Subgraph Evolution 679


Qingqing Yang (China University of Geosciences, China), Yuexin Xiang
(China University of Geosciences, China), Wenmao Liu (NSFOCUS Inc.,
China), and Wei Ren (China University of Geosciences, China)
AIC-Bench: Workload Selection Methodology for Benchmarking AI Chips 687
Zhenyu Quan (University of Chinese Academy of Sciences, China),
Xiaoming Chen (University of Chinese Academy of Sciences, China), and
Yinhe Han (University of Chinese Academy of Sciences, China)
Age of Aggregated Information-Minimizing Scheduling in Wireless Relay Network 695
Jieqiong Kang (Ningbo University, China) and Long Qu (Ningbo
University, China)
An Approach of Bayesian Network Learning Based on Optimizing Fringe Search 703
Xiaolei Yu (Wuhan University of Technology, China; Huazhong
Agricultural University, China), Kuan Xie (Huazhong Agricultural
University, China), Junli Deng (Huazhong Agricultural University,
China), and Jianxiao Liu (Huazhong Agricultural University, China)

xx
Communications and Networking 8

Time-Frequency Analysis and Convolutional Neural Network Based Radio Frequency


Fingerprinting Identification 711
Songlin Chen (University of Electronic Science and Technology of
China, China), Weifeng Xia (Shenyang Institute of Engineering, China),
and Hao Wu (University of Electronic Science and Technology of China,
China; CETC Rongwei Electronic Technology Co., Ltd., China)
Multi-view Attention Networks with Contrastive Predictive Coding for Sequential
Recommendation 717
Hongjun An (Heilongjiang University, China), Jinghua Zhu (Heilongjiang
University, China), Heran Xi (Heilongjiang University, China), and
Shiyang Zhou (Heilongjiang University, China)
Feature Quantization Convolutional Neural Networks for CSI Feedback in Massive MIMO
Systems 725
Haohui Jia (Nara Institute of Science and Technology, Japan), Na Chen
(Nara Institute of Science and Technology, Japan), Hui Gao (Beijing
University of Posts and Telecommunications, China), and Minoru Okada
(Nara Institute of Science and Technology, Japan)
Learning Local Representation by Gradient-Isolated Memorizing of Spiking Neural Network 733
Man Wu (Keio University, Japan), Yunpeng Yao (Shandong University,
China), and Zheng Chen (Osaka University, Japan)
A Clustering Resampling Stacked Ensemble Method for Imbalance Classification Problem 741
Jian Li (Beijing University of Technology, China), Jinlian Du (Beijing
University of Technology, China), and Xiao Zhang (Beijing University
of Technology, China)

Communications and Networking 9

Automatic Individual Tooth Segmentation in Cone-Beam Computed Tomography Based on


Multi-task CNN and Watershed Transform 749
Lipeng Xie (Zhengzhou University, China), BaoXiang Liu (Zhengzhou
University, China), Yangjie Cao (Zhengzhou University, China), and
Cong Yang (Zhengzhou University, China)
A Fine-Grained Multi-Label Privacy Detection Model for Unstructured Data Based on BERT
Pre-Training 755
Yuchuan Hu (Sichuan University, China), Bin Guo (Sichuan University,
China), Cheng Dai (Sichuan University, China), Qin Zheng (Sichuan
University, China), Fangpeng Weng (Sichuan University, China), and
Zhongwei Li (Sichuan University, China)
Novel-Domain Object Segmentation via Reliability-Aware Teacher Ensemble 761
Jing Miao (Qingdao University of Technology, China), Wei Luo (Deakin
University, Australia), Nayyar Zaidi (Deakin University, Australia),
and Jinlong Wang (Qingdao University of Technology, China)
LogTrans: Providing Efficient Local-Global Fusion with Transformer and CNN Parallel
Network for Biomedical Image Segmentation 769
Xingqing Nie (Fuzhou University, China), Xiaogen Zhou (Fuzhou
University, China), Zhiqiang Li (Fuzhou University, China), Luoyan
Wang (Fuzhou University, China), Xingtao Lin (Fuzhou University,
China), and Tong Tong (Fuzhou University, China)

xxi
Self-Paced Pseudo Label Refinement for Multi-view Subspace Clustering 777
Xin Song (Dalian University of Technology, China), Zhikui Chen (Dalian
University of Technology, China), Jing Gao (Dalian University of
Technology, China), Jianning Zhang (Dalian University of Technology,
China), and Peng Li (Dalian University of Technology, China)

Communications and Networking 10

Key Factor Selection Transformer for Multivariate Time Series Forecasting 785
Jun Hu (Hunan University, China) and Zehao Liu (Hunan University,
China)
LightSCA: Lightweight Side-Channel Attack via Discrete Cosine Transform and Residual
Networks 793
Nengfu Cai (Beihang University, China), Du Wang (Shijiazhuang Tieda
Kexian Information Technology Company Limited, China), Md Zakirul Alam
Bhuiyan (Fordham University, USA), Lihua Han (Shijiazhuang Railway
University, China), and Gang Li (Zhongke Zidong Information Technology
Company Limited, China)
MateGraph: Toward Mobile Malware Detection Through Traffic Behavior Graph 801
Ruihai Ge (Institute of Information Engineering, Chinese Academy of
Sciences, China; University of Chinese Academy of Sciences, China),
Yongzheng Zhang (China Assets Cybersecurity Technology CO., Ltd.,
China), Chengxiang Si (National Computer Network Emergency Response
Technical Team/Coordination Center of China, China), Guoqiao Zhou
(Institute of Information Engineering, Chinese Academy of Sciences,
China), and Wenchang Zhou (Institute of Information Engineering,
Chinese Academy of Sciences, China; University of Chinese Academy of
Sciences, China)
TB-Transformer: Integrating Mouse Trace with Object Bounding-box for Image Caption 810
Nan Lin (Zhengzhou University, China), Shuo Guo (Zhengzhou University,
China), and Lipeng Xie (Zhengzhou University, China)

Communications and Networking 11

FaGAN: Frequency-Aware Generative Adversarial Network for Infrared and Visible Image
Fusion 815
Yi Li (Army Engineering University of PLA, China), Hui Li (Army
Engineering University of PLA, China), Xiaoyu Lei (Army Engineering
University of PLA, China), Yang Li (Army Engineering University of
PLA, China), Jiabao Wang (Army Engineering University of PLA, China),
and Zhuang Miao (Army Engineering University of PLA, China)

xxii
Optimal Strategy Selection for Attack Graph Games using Deep Reinforcement Learning 823
Yuantian Zhang (State Key Laboratory of Information Security,
Institute of Information Engineering, Chinese Academy of Sciences,
China; University of Chinese Academy of Sciences, China), Feng Liu
(State Key Laboratory of Information Security, Institute of
Information Engineering, Chinese Academy of Sciences, China;
University of Chinese Academy of Sciences, China), and Huashan Chen
(State Key Laboratory of Information Security, Institute of
Information Engineering, Chinese Academy of Sciences, China;
University of Chinese Academy of Sciences, China)
Exploring the Feasibility of Transformer Based Models on Question Relatedness 831
Honglin Shu (Hong Kong Polytechnic University, China), Pei Gao (Nara
Institute of Science and Technology, Japan), Ziwei Yang (Nara
Institute of Science and Technology, Japan), Chen Li (Kyushu Institute
of Technology, Japan), and Man Wu (Keio University, Japan)
An Efficient Transformer Encoder-Based Classification of Malware using API Calls 839
Chen Li (Kyushu Institute of Technology, Japan), Zheng Chen (Osaka
University, Japan), and Junjun Zheng (Osaka University, Japan)
Fine-Grained Spatiotemporal Features-Based for Anomaly Detection in Microservice Systems 847
Xikang Yang (Institute of Information Engineering, Chinese Academy of
Sciences, China; University of Chinese Academy of Sciences, China),
Juan Wang (China Academy of Information and Communications Technology,
Beijing, China), Biyu Zhou (Institute of Information Engineering,
Chinese Academy of Sciences, China), Wang Wang (Institute of
Information Engineering, Chinese Academy of Sciences, China;
University of Chinese Academy of Sciences, China), Wantao Liu
(Institute of Information Engineering, Chinese Academy of Sciences,
China), and Yangchen Dong (Institute of Information Engineering,
Chinese Academy of Sciences, China)

Short Research Papers

High Performance Computing and Applications 1

AreaHash: A Balanced and Fully Scalable Consistency Hashing Algorithm 857


Zeng Yan (Hangzhou Dianzi University, China), Jinbo Zhang (Hangzhou
Dianzi University, China), Meiting Xue (Hangzhou Dianzi University,
China), Jian Wan (Hangzhou Dianzi University, China), Jilin Zhang
(Hangzhou Dianzi University, China), and Li Zhou (Hangzhou Dianzi
University, China)
A Validation Approach for the Lipschitz Constant for Neural Networks 863
Zhiwei Zuo (Hunan University, China), Qianqian Cai (Hunan University,
China), Jungang Ji (SZZT Electronics Co Ltd, China), and Zhongan Tang
(Third Surveying and Mapping Institute of Hunan Province, China)

xxiii
Design and Implementation of Compensated Gram-Schmidt Algorithm 870
Jiexi Jin (Hunan University, China), Hehu Xie (Academy of Mathematics
and Systems Science, Chinese Academy of Sciences, China), Peibing Du
(Northwest Insititute of Nuclear Technology, China), Zhe Quan (Hunan
University, China), and Hao Jiang (National University of Defense
Technology, China)
ConeSSD: A Novel Policy to Optimize the Performance of HDFS Heterogeneous Storage 876
Xiao Zhang (Northwestern Polytechnical University, China), Liang Wang
(Northwestern Polytechnical University, China), Zhijie Huang
(Northwestern Polytechnical University, China), Huiru Xie
(Northwestern Polytechnical University, China), Yuchen Zhang
(Northwestern Polytechnical University, China), and Michael Ngulube
(Northwestern Polytechnical University, China)
Accelerating Small Matrix Multiplications by Adaptive Batching Strategy on GPU 882
Yaqing Zhang (Southwest University of Science and Technology, China),
Yaobin Wang (Southwest University of Science and Technology, China),
Zhangbin Mo (Southwest University of Science and Technology, China),
Yong Zhou (Southwest University of Science and Technology, China), Tao
Sun (Southwest University of Science and Technology, China; Huawei
Technologies Co.Ltd, China), Guang Xu (Huawei Technologies Co.Ltd,
China), Chaojun Xing (Loongson Technology Corporation Limited, China),
and Liang Yang (Loongson Technology Corporation Limited, China)

High Performance Computing and Applications 2

All-to-All Routing Algorithm for Galaxyfly Networks 888


Qinying Lin (Fuzhou University, China), Hongbin Zhuang (Fuzhou
University, China), Xiao-Yan Li (Fuzhou University, China), and Lichao
Su (Fuzhou University, China)
High-Performance Matrix Multiplication on the New Generation Shenwei Processor 894
Le Xu (University of Science and Technology of China, China), Hong An
(University of Science and Technology of China, China), Junshi Chen
(University of Science and Technology of China, China), and Pengfei
Zhang (University of Science and Technology of China, China)
Voxelization of Moving Geometries on GPU 904
Rishabh Shukla (Indian Institute of Technology Jodhpur, India), Nipun
Arora (Indian Institute of Technology Jodhpur, India), and Dip Sankar
Banerjee (Indian Institute of Technology Jodhpur, India)
EgpuIP: An Embedded GPU Accelerated Library for Image Processing 914
Luhan Wang (Institute of Computing Technology, Chinese Academy of
Sciences, China; University of Chinese Academy of Sciences, China),
Haipeng Jia (Institute of Computing Technology, Chinese Academy of
Sciences, China), Yunquan Zhang (Institute of Computing Technology,
Chinese Academy of Sciences, China), Kun Li (Microsoft Research), and
Cunyang Wei (Institute of Computing Technology, Chinese Academy of
Sciences, China)

xxiv
ASMAMC: A Specific Microprocessor Architecture for Monte Carlo Method 922
Jianmin Zhang (National University of Defense Technology, China),
Ziming Chen (National University of Defense Technology, China), and Li
Zhang (National University of Defense Technology, China)

High Performance Computing and Applications 3

DCD: A New Framework for Distillation Learning with Dynamic Curriculum 928
Jiachen Li (Beijing University of Posts and Telecommunications,
China), Yuchao Zhang (Beijing University of Posts and
Telecommunications, China), Yiping Li (University of Washington, USA),
Xiangyang Gong (Beijing University of Posts and Telecommunications,
China), and Wendong Wang (Beijing University of Posts and
Telecommunications, China)
A Secure and Trusted Data Sharing Scheme Based on Blockchain for Government Data 936
Qin Zheng (Sichuan University, China), Bin Guo (Sichuan University,
China), Yuchuan Hu (Sichuan University, China), and Zhongwei Li
(Sichuan University, China)
Quantifying Throughput of Basic Blocks on ARM Microarchitectures by Static Code Analyzers:
A Case Study on Kunpeng 920 943
Qingcai Jiang (University of Science and Technology of China, China),
Shaojie Tan (University of Science and Technology of China, China),
Zhenwei Cao (University of Science and Technology of China, China),
Xiaoyu Hao (University of Science and Technology of China, China),
Junshi Chen (University of Science and Technology of China, China),
and Hong An (University of Science and Technology of China, China)
Burger-Tree: A Three-Layer Cache-Conscious Tree Index for Persistent Memory 951
Penghao Fan (University of Science and Technology of China, China),
Peiquan Jin (University of Science and Technology of China, China),
Yongping Luo (University of Science and Technology of China, China),
and Xiaoliang Wang (University of Science and Technology of China,
China)
Localization of Mobile Nodes in Graphs using the True-Range Multilateration with Node
Sorting (TriSort) Approach in an Indoor Environment 957
Michał Gorawski (Institute of Theoretical and Applied Informatics of
PAS) and Konrad Połys (Institute of Theoretical and Applied
Informatics of PAS)

High Performance Computing and Applications 4

Temporal Staggering of Applications Based on Job Classification and I/O Burst Prediction 965
Wenxiang Yang (China Aerodynamics Research and Development Center,
China), Cheng Chen (China Aerodynamics Research and Development
Center, China), and Jie Yu (China Aerodynamics Research and
Development Center, China)
Research on Elastic Extension of Multi Type Resources for OpenMP Program 971
Junfeng Zhao (Inner Mongolia University, China), Xuesong Gao (Inner
Mongolia University, China), and Yuancong Li (Inner Mongolia
University, China)

xxv
Energy Efficient Dynamic Load Balancing using Self-Organized Criticality in Grid Computing 979
Vivek Kumar (IIT Guwahati, India), Chinmaya Kumar Swain (SRM
University, India), and Aryabartta Sahu (IIT Guwahati, India)
Mining Alarm Association Rules in Optical Transmission Networks using a Statistical
Approach 987
Miao Deng (Wuhan University of Science and Technology, China; Hubei
Province Key Laboratory of Intelligent Information Processing and
Real-time Industrial System, China), Peng Li (Wuhan University of
Science and Technology, China; Hubei Province Key Laboratory of
Intelligent Information Processing and Real-time Industrial System,
China), Yu Liu (Wuhan University of Science and Technology, China;
Hubei Province Key Laboratory of Intelligent Information Processing
and Real-time Industrial System, China), Rongjing Zhu (Wuhan
University of Science and Technology, China; Hubei Province Key
Laboratory of Intelligent Information Processing and Real-time
Industrial System, China), and Yujie Zhang (Wuhan University of
Science and Technology, China; Hubei Province Key Laboratory of
Intelligent Information Processing and Real-time Industrial System,
China)

High Performance Computing and Applications 5


Performance Optimization and Analysis of the Unstructured Discontinuous Galerkin Solver on
Multi-core and Many-Core Architectures 993
Zhe Dai (China Aerodynamics Research and Development Center, China),
Liang Deng (China Aerodynamics Research and Development Center,
China), Yueqing Wang (China Aerodynamics Research and Development
Center, China), Fang Wang (China Aerodynamics Research and Development
Center, China), Ming Li (China Aerodynamics Research and Development
Center, China), and Jian Zhang (China Aerodynamics Research and
Development Center, China)
BTDFS: B+ Tree-Based Distributed File Storing Mechanism for Improving Small File Storage 1000
Jingyu Zhang (Changsha University of Science & Technology, China;
National University of Defense Technology, China), JiaChen Tian
(Changsha University of Science & Technology, China), and Lailong Luo
(National University of Defense Technology, China)
EDCNet: A Lightweight Object Detection Method Based on Encoding Feature Sharing for Drug
Driving Detection 1006
Junfei Wei (Hanwei Technology Group Company Limited, China), Yuan Li
(Zhengzhou University, China), and Bo Zhang (Zhengzhou University,
China)

High Performance Computing and Applications 6

CORF: Bridging the Gap of Complex Operator Fusion for Faster DNN Inference 1014
Jianan Wang (National University of Defense Technology, China), Yang
Shi (National University of Defense Technology, China), Zhaoyun Chen
(National University of Defense Technology, China), and Mei Wen
(National University of Defense Technology, China)

xxvi
Optimizing Fast Trigonometric Functions on Modern CPUs 1022
Jie Shen (National University of Defense Technology, China), Biao Long
(National University of Defense Technology, China), and Chun Huang
(National University of Defense Technology, China)
Time Series Data Association Mining with High-Frequency Data Interference 1030
Rongjing Zhu (Wuhan University of Science and Technology, China), Peng
Li (Wuhan University of Science and Technology, China), Yu Liu (Wuhan
University of Science and Technology, China), and Miao Deng (Wuhan
University of Science and Technology, China)
Deep Spatio-Temporal Residual Shrinkage Networks for Traffic Prediction 1036
Ke Sun (Heilongjiang University, China), Qianqian Ren (Heilongjiang
University, China), Hu Jin (Heilongjiang University, China), and
Xingfeng Lv (Heilongjiang University, China)

High Performance Computing and Applications 7


Robust and Lossless Fingerprinting of Deep Neural Networks via Pooled Membership Inference 1042
Hanzhou Wu (Shanghai University, China)
Semi-Supervised Graph Convolutional Neural Network Based Classification for Auto Parts
Inventory Management 1050
Fangpeng Weng (Sichuan University, China), Bing Guo (Sichuan
University, China), Xinhua Suo (Sichuan university, China), Xin Wu
(Sichuan university, China), Yuchuan Hu (Sichuan university, China),
and Qin Zheng (Sichuan university, China)
Rapid Defect Detection in Cigarette Capsules Based on 1D Residual Network with
Multi-Feature Fusion 1055
Xudong Yang (University of Science and Technology of China, China),
Hao Dong (University of Science and Technology of China, China),
Mingna Wu (University of Science and Technology of China, China), Dong
Feng (Anhui University, China), Shu Wang (Chinese Academy of Sciences,
China), and Long Zhang (University of Science and Technology of China,
China)
Using BERT and Word Definitions for Implicit Sentiment Analysis 1063
Xianyong Li (Xihua University, China) and Qizhi Li (Xihua University,
China)

High Performance Computing and Applications 8

PC-BNA: Parallel Convolution Binary Neural Network Accelerator 1069


Haihui Liu (Shandong Normal University, China), Yuang Zhang (Shandong
Normal University, China), Xiangwei Zheng (Shandong Normal University,
China), Mengxin Yu (Shandong Normal University, China), Baoxu An
(Shandong Normal University, China), and Xiaojie Liu (Shandong Normal
University, China)
Castingformer: A Deep Neural Network for Precipitation Nowcasting 1075
Ge Yang (National Supercomputing Center in Shenzhen, China), Lijia Lin
(National Supercomputing Center in Shenzhen, China), and Dian Huang
(National Supercomputing Center in Shenzhen, China)

xxvii
A High-Performance SpMV Accelerator on HBM-Equipped FPGAs 1081
Tao Li (National University of Defense Technology, China), Li Shen
(National University of Defense Technology, China), and Shangshang Yao
(National University of Defense Technology, China)

Parallel and Distributed Computing and Systems 1

Adaptive Model Selection for Video Super Resolution 1088


Topology-Aware Node Allocation on Supercomputers with Hierarchical Network 1095
Wenxiang Yang (China Aerodynamics Research and Development Center,
China), Cheng Chen (China Aerodynamics Research and Development
Center, China), and Jie Yu (China Aerodynamics Research and
Development Center, China)
A Multi-Layer PBFT Consensus Algorithm with Inter-Group Supervision 1101
Yuting Zhao (Sichuan University, China), Bing Guo (Sichuan University,
China), Chaoxia Qin (Sichuan University, China), and Mingjie Zhao
(Sichuan University, China)
Automated Inconsistency Analysis of Real-Time Requirements: A Domain Expert Friendly
Approach 1109
Shaobin Liu (East China Normal University, China), Xiaohong Chen (East
China Normal University, China), Zhi Jin (Perking University, China),
and Min Zhang (East China Normal University, China)

Parallel and Distributed Computing and Systems 2

Parallel-Friendly and Work-Efficient Single Source Shortest Path Algorithm on Single-Node


System 1115
Jie Zhang (Institute of Computing Technology, Chinese Academy of
Sciences, China; UCAS, China), Yuan Zhang (Institute of Computing
Technology, Chinese Academy of Sciences, China; UCAS, China), Yiming
Sun (Institute of Computing Technology, Chinese Academy of Sciences,
China; UCAS, China), Huawei Cao (Institute of Computing Technology,
Chinese Academy of Sciences, China; Nanjing Institute of Information
Superbahn, China), Xuejun An (Institute of Computing Technology,
Chinese Academy of Sciences, China; UCAS, China), and Xiaochun Ye
(Institute of Computing Technology, Chinese Academy of Sciences,
China)
Towards Optimized Streaming Tensor Completion on Multiple GPUs 1123
Jiwei Hao (Beihang University, China), Hailong Yang (Beihang
University, China), Qingxiao Sun (Beihang University, China), Huaitao
Zhang (Xi’an Jiaotong University, China), Zhongzhi Luan (Beihang
University, China), and Depei Qian (Beihang University, China)
Joint Optimization of Service Placing and Task Scheduling Based on Full Cooperation of
Edge Nodes 1129
Jinfeng Dou (Ocean University of China, China), Xuejia Meng (Ocean
University of China, China), Nuanyu Cao (the University of Hong Kong,
China), Fangzheng Yuan (Ocean University of China, China), Tao Yang
(Ocean University of China, China), Xiaoxiao Sun (Ocean University of
China, China), and Xuanning Wei (Ocean University of China, China)

xxviii
G-Update: A Group-Based Update Scheme for Heterogenous Erasure-Coded Storage Systems 1135
Xuyu Zhao (Central South University), Bing Zhu (Central South
University), Zhiwei Zeng (Central South University), Weiping Wang
(Central South University), and Kenneth W. Shum (Chinese University of
Hong Kong (Shenzhen))
Efficient Erasure-Coded Data Update and Recovery Based on Machine Learning and I/O
Mitigation 1141
Xiaosong Su (Guangdong University of Technology, China), Bing Wei
(Hainan University, China), Yalan Wu (Guangdong University of
Technology, China), and Jigang Wu (Guangdong University of Technology,
China)

Parallel and Distributed Computing and Systems 3

Energy-Efficient Thermal-Aware Data Placement Strategy for Storage Clusters 1147


Jie Li (Jinan University, China), Yuhui Deng (Jinan University, China;
Wuhan National Laboratory for Optoelectronics, China), Zhifeng Fan
(Jinan University, China), and Zijie Zhong (Jinan University, China)
TianheQueries: Ultra-Fast and Scalable Graph Queries on Tianhe Supercomputer 1153
Xinbiao Gan (National University of Defense Technology), Guang Wu
(National University of Defense Technology), Cong Liu (Information
Center of Logistic Support Department, CMC), Jiaqi Si (National
University of Defense Technology), Xuguang Chen (National University
of Defense Technology), Bo Yang (National University of Defense
Technology), and Tiejun Li (National University of Defense Technology)
VM Performance Optimization Virtual Machine Migration Method Based on Ant Colony
Optimization in Cloud 1159
Hui Zhao (Xidian University, China; Key Laboratory of Smart
Human-Computer Interaction and Wearable Technology of Shaanxi
Province, China), Shangshu Li (Xidian University, China), Jing Wang
(Xidian University, China), and Jianhua Li (Xidian University, China)
Predicting Cloud Performance using Real-Time VM-Level Metrics 1165
Jihua Tian (University of Glasgow, United Kingdom), Abdessalam
Elhabbash (Lancaster University, United Kingdom), and Yehia Elkhatib
(University of Glasgow, United Kingdom)
A Deep Reinforcement Learning Based VM Scheduling Strategy Decreasing Data center
Communication Cost 1173
Zhijiao Xiao (Shenzhen University, China), Xiao Liu (Shenzhen
University, China), and Zhong Ming (Shenzhen University, China)

Parallel and Distributed Computing and Systems 4

Joint Latency and Energy Optimization of Online Task Offloading Algorithms for Vehicular
Edge Computing 1180
Pingping Dong (Hunan Normal University, China), Cheng Nie (Hunan
Normal University, China), Yajing Li (Hunan Normal University, China),
Yuning Zuo (Hunan Normal University, China), Xiaojuan Lu (Hunan Normal
University, China), and Lianming Zhang (Hunan Normal University,
China)

xxix
A Privacy-Enhanced Federated Learning Scheme with Identity Protection 1188
XueQin Zhao (Qingdao University of Science and Technology, China),
Lingling Wang (Qingdao University of Science and Technology, China),
Lin Wang (Qingdao University of Science and Technology, China), and
Zhongkai Lu (Qingdao University of Science and Technology, China)
Optimized Client-Side Detection of Model Poisoning Attacks in Federated Learning 1196
Guoxi Zhang (Harbin Institute of Technology, China), Jiangang Shu
(Peng Cheng Laboratory, China), and Xiaohua Jia (City University of
Hong Kong, China)
An Optimized Transaction Processing Scheme for Highly Contented E-Commerce Workloads 1202
Chunxi Zhang (Shanghai Stock Exchange, China), Shuyan Zhang (East
China Normal University, China), Ting Chen (East China Normal
University, China), Rong Zhang (East China Normal University, China),
and Kai Liu (Shanghai Stock Exchange, China)
FedACL: Federated Multi-Distillation with Auxiliary Classification Layers in IoT 1208
Zhipeng Gao (Beijing University of Posts and Telecommunications,
China), Futeng Feng (Beijing University of Posts and
Telecommunications, China), Zijia Mo (Beijing University of Posts and
Telecommunications, China), Zijian Xiong (Beijing University of Posts
and Telecommunications, China), and Yang Yang (Beijing University of
Posts and Telecommunications, China)

Parallel and Distributed Computing and Systems 5

Privacy-Preserving Multi-party Neural Network Learning Over Incomplete Data 1216


Fengxiao Liu (Hubei University of Technology), Gang Shen (Hubei
University of Technology), and Mingwu Zhang (Hubei University of
Technology)
FedCo: Self-Supervised Learning in Federated Learning With Momentum Contrast 1222
Shuai Wei (Sichuan University, China), Guitao Cao (East China Normal
University, China), Cheng Dai (East China Normal University, also with
Sichuan University, China), Shengxin Dai (Sichuan Uniersity, China),
and Bing Guo (Sichuan University, China)
Fabric Image Layering Based on Parallel K-Means 1228
Lei Wang (Shanghai University, China), Wei Zhao (Shanghai University,
China), Tong Sang (Shanghai University, China), Zeng Zeng (Shanghai
University, China), and Yangfan Li (Central South University, China)
The Influence-Maximizing Node Selection Algorithm Based on Local Isolated Centrality in
Large-Scale Networks Implemented by Distributed Graph Computing 1234
Piaoyang Chen (Guizhou University of Finance and Economics, China),
Rong Lei (Guizhou University of Finance and Economics, China), and
Mingsen Deng (Guizhou University of Finance and Economics, China)
HCER: A High Cost-Effectiveness Multi-bit Fault-Tolerant NoC Router 1241
Wencai Gao (National University of Defense Technology, China), Xiaowen
Chen (National University of Defense Technology, China), Chen Li
(National University of Defense Technology, China), Jianzhuang Lu
(National University of Defense Technology, China), and Hanyan Liu
(National University of Defense Technology, China)

xxx
Parallel and Distributed Computing and Systems 6

Delaying Large Write Requests to Trade off I/O Performance and Long-Tail Latency in SSDs 1249
Guodong Peng (Southwest University, China), Jun Li (Southwest
University, China), Mingwang Zhao (Southwest University, China),
Minjun Li (Southwest University, China), Zhibing Sha (Southwest
University, China), Min Huang (Southwest University, China), and
Zhigang Cai (Southwest University, China)
WRLqueue: A Lock-Free Queue for Embedded Real-Time System 1255
Qidi Yang (Xian Microelectronics Technology Institute, China), Lei
Tang (Xian Microelectronics Technology Institute, China), Yanrong Guo
(Xian Microelectronics Technology Institute, China), Nailiang Kuang
(Xian Microelectronics Technology Institute, China), Sheng Zhong
(Northwest University, China), and Hangzai Luo (Northwest University,
China)
Holistic Scheduling Algorithm for Tasks and Messages of Automotive Embedded System 1261
Hongxing Xing (Hunan Normal University, China), Yehua Wei (Hunan
Normal University, China), Can Cheng (Hunan Normal University, China),
and Lianming Zhang (Hunan Normal University, China)
An Energy-Efficient Task Scheduling Method for CPU-GPU Heterogeneous Cloud 1269
Hui Zhao (Xidian University, China), Jianhua Li (Xidian University,
China), Guobin Zhang (Xidian University, China), Shangshu Li (Xidian
University, China), and Jing Wang (Xidian University, China)

Parallel and Distributed Computing and Systems 7

A Precision Mechanism for Simulations of Real-Time Multicore Energy-Aware Scheduling 1275


Jiangyue Zhan (Sichuan University, China) and Bing Guo (Sichuan
University, China)
3DS: An Efficient DPDK-Based Data Distribution Service for Distributed Real-Time
Applications 1283
Tianyu Xu (Chongqing University, China), Xianzhang Chen (Chongqing
University, China), Changze Wu (Chongqing University, China), Jiapin
Wang (Chongqing University, China), Rongwei Zheng (Chongqing
University, China), Duo Liu (Chongqing University, China), Yujuan Tan
(Chongqing University, China), Ao Ren (Chongqing University, China),
and Jian Li (Chongqing University, China)
RBCP: A Reputation-Based Blockchain Consensus Protocol for Internet of Things 1291
Jiaze Shang (Beijing University of Posts and Telecommunications,
China), Tianbo Lu (Beijing University of Posts and Telecommunications,
China), Yingjie Cai (Beijing University of Posts and
Telecommunications, China), Shuang Luo (Beijing University of Posts
and Telecommunications, China), and Zhaoxin Jin (Beijing University of
Posts and Telecommunications, China)

xxxi
Aware: Adaptive Distributed Training With Computation, Communication and Position
Awareness for Deep Learning Model 1299
Yan Zeng (Hangzhou Dianzi University, China), Guangzheng Yi (Hangzhou
Dianzi University, China), Yuyu Yin (Hangzhou Dianzi University,
China), Jiyang Wu (Hangzhou Dianzi University, China), Meiting Xue
(Hangzhou Dianzi University, China), Jilin Zhang (Hangzhou Dianzi
University, China), Jian Wan (Hangzhou Dianzi University, China), and
Yunquan Zhang (Institute of Computing Technology, Chinese Academy of
Sciences, China)

Parallel and Distributed Computing and Systems 8

Unsupervised Anomaly Detection Based on CNN-VAE With Spectral Residual for KPIs 1307
Gongliang Li (Sichuan University, China), Zepeng Wen (China Academy of
Engineering Physics, China), and Xin Xie (China Academy of Engineering
Physics, China)
A Dynamic Computational Memory Address Architecture for Systolic Array CNN Accelerators 1314
Min Tang (National University of Defense Technology, China) and Sheng
Liu (National University of Defense Technology, China)
Optimizing GNN on ARM Multi-Core Processors 1320
Chaorun Liu (National University of Defense Technology, China), Huayou
Su (National University of Defense Technology, China), Yong Dou
(National University of Defense Technology, China), Kangkang Chen
(National University of Defense Technology, China), and Yanjie Sun
(National University of Defense Technology, China)
Secure and Efficient BMC-Based Centralized Management Method for Large-Scale Data Centers 1328
Hongwei Liu (Institute of Information Engineering Chinese Academy of
Sciences, China), Haojun Xia (Institute of Information Engineering
Chinese Academy of Sciences, China), and Bibo Tu (Institute of
Information Engineering Chinese Academy of Sciences, China)

Parallel and Distributed Computing and Systems 9

An Unsupervised Convolutional Adversarial Anomaly Detection Model for IoT Data


Infrastructure 1336
Peian Wen (Xihua University, China), Zhenyu Yang (University of
Electronic Science and Technology of China, China), Lei Wu (University
of Electronic Science and Technology of China, China), Sibo Qi (Xihua
University, China), and Juan Chen (Xihua University, China)
A Layer-Based Sparsification Method for Distributed DNN Training 1342
Yanqing Hu (Sichuan University, China), Qing Ye (Sichuan University,
China), Zhongyu Zhang (Sichuan University, China), and Jiancheng Lv
(Sichuan University, China)
An Efficient Parallel CNN Inference Framework for Multi-Zone Processor 1350
Jie Chen (National University of Defense Technology, China) and Zhong
Liu (National University of Defense Technology, China)

xxxii
Intelligent System for Distributed Deep Learning Training Traffic Optimization 1358
Weipeng Lu (University of Science and Technology of China, China),
Shuang Wu (University of Science and Technology of China, China),
Junhui Ou (University of Science and Technology of China, China), Bing
Niu (VMware, China), Jin He (VMware, China), Kevin Song (VMware,
China), and Xinwei Zheng (University of Science and Technology of
China, China)

Communications and Networking 1

HCRO-LKSM: A Lightweight Key Sharing and Management Protocol Based on HCRO-PUF for IoT
Devices 1366
Zhenyu Wang (National University of Defense Technology, China), Ding
Deng (National University of Defense Technology, China), Yang Guo
(National University of Defense Technology, China), and Shaoqing Li
(National University of Defense Technology, China)
Interference Elimination in IRS-Enabled Indoor mmw-D2D Communication 1374
Bingjie Han (Beijing Information Science and Technology University,
China), Xin Chen (Beijing Information Science and Technology
University, China), Libo Jiao (Beijing Information Science and
Technology University, China), and Dongchao Guo (Beijing Information
Science and Technology University, China)
AoI Aware VNF Scheduling with Parallel Transmission for Delay-Sensitive Applications 1382
Lingjie Yu (Ningbo University, China) and Long Qu (Ningbo University,
China)
NBMon: NB-IoT-Based UAV Network Routing Monitoring System 1388
Ji'ao Tang (Nanjing University of Aeronautics and Astronautics,
China), Xiaojun Zhu (Nanjing University of Aeronautics and
Astronautics, China), Chao Dong (Nanjing University of Aeronautics and
Astronautics, China), and Lei Zhang (Nanjing University of Aeronautics
and Astronautics, China)
TCRing: A Novel Single-Channel Deadlock-Free Concentrated on-Chip Network 1394
Zhenjiang Guo (Institute of Computing Technology CAS, China), Huandong
Wang (Loongson Technology, China), Longbing Zhang (Institute of
Computing Technology CAS, China), and Junhua Xiao (Institute of
Computing Technology CAS, China)

Communications and Networking 2

Optimal Trajectory Planning and Task Assignment for UAV-Assisted Fog Computing 1400
Shuaijun Liu (BNU-HKBU United International College, China), Jiaying
Yin (The University of Hong Kong, Hong Kong, China), Zishu Zeng (The
Hong Kong University of Science and Technology, Hong Kong, China), and
Jingjin Wu (BNU-HKBU United International College, China; Guangdong
Provincial Key Laboratory of Interdisciplinary Research and
Application for Data Science)

xxxiii
Smart Health Records Sharing Scheme Based on Partially Policy-Hidden CP-ABE With Leakage
Resilience 1408
Edward Mensah Acheampong (University of Electronic Science and
Technology of China, China), Shijie Zhou (University of Electronic
Science and Technology of China, China), Yongjian Liao (University of
Electronic Science and Technology of China, China), Emmanuel
Antwi-Boasiako (University of Electronic Science and Technology of
China, China), and Isaac Amankona Obiri (University of Electronic
Science and Technology of China, China)
CC-Guard: An IPv6 Covert Channel Detection Method Based on Field Matching 1416
Jichang Wang (Zhengzhou University, China), Liancheng Zhang (National
Digital Switching System Engineering and Technological Research
Center, China), Zehua Li (China Xi’an Satellite Control Center,
China), Yi Guo (National Digital Switching System Engineering and
Technological Research Center, China), Lanxin Cheng (National Digital
Switching System Engineering and Technological Research Center,
China), and Wenwen Du (National Digital Switching System Engineering
and Technological Research Center, China)
METC-MVAE: Mobile Encrypted Traffic Classification With Masked Variational Autoencoders 1422
Wei Cai (Institute of Information Engineering, Chinese Academy of
Sciences; University of Chinese Academy of Sciences, China), Zhen Li
(Institute of Information Engineering, Chinese Academy of Sciences;
University of Chinese Academy of Sciences, China), Peipei Fu
(Institute of Information Engineering, Chinese Academy of Sciences;
University of Chinese Academy of Sciences, China), Chengshang Hou
(Institute of Information Engineering, Chinese Academy of Sciences;
University of Chinese Academy of Sciences, China), Gang Xiong
(Institute of Information Engineering, Chinese Academy of Sciences;
University of Chinese Academy of Sciences, China), and Gaopeng Gou
(Institute of Information Engineering, Chinese Academy of Sciences;
University of Chinese Academy of Sciences, China)
A Mobility Adaptive Service Placement Scheme in Satellite Edge Computing Network 1430
Peng Deng (Beijing University of Posts and Telecommunications, China),
Xiangyang Gong (Beijing University of Posts and Telecommunications,
China), and Xirong Que (Beijing University of Posts and
Telecommunications, China)

Communications and Networking 3

Multi-modal Feature Collaborative Fusion for Court Verdicts Recommendation 1436


Xu Yuan (Dalian University of Technology, China), Yungang Wang (Dalian
University of Technology, China), Shan Jin (Dalian University of
Technology, China), Ying Yang (Dalian University of Technology,
China), and Zhikui Chen (Dalian University of Technology, China)
FACA: An Effective Method for Detecting the Survivability of Large-Scale IPv6 Addresses 1442
Yi Guo (Information Engineering University, China), Mengfan Liu
(Zhengzhou University, China), Liancheng Zhang (Information
Engineering University, China), Lanxin Cheng (Information Engineering
University, China), Wenwen Du (Information Engineering University,
China), and Quan Zhang (Zhengzhou University, China)

xxxiv
Cascading Failure Analysis of Uniform Double-Layer Hyper-Networks Based on the Couple Map
Lattice Model 1449
Shujie Gao (Qinghai Normal University, China), Xiujuan Ma (Qinghai
Normal University, China), Fuxiang Ma (Qinghai Normal University,
China), and Bin Zhou (Qinghai Normal University, China)
Graph Clustering Under Weight-Differential Privacy 1457
Lang Chen (University of Science and Technology of China, China), Kai
Han (Soochow University, China), Qing Xiu (University of Science and
Technology of China, China), and Dazheng Gao (University of Science
and Technology of China, China)
Firewall Management: Rapid Anomaly Detection 1465
Claas Lorenz (University of Potsdam, Germany) and Bettina Schnor
(University of Potsdam, Germany)
Secure SVM Services with Multiple Service Providers and Subscribers in the Cloud 1473
RuiHeng Lu (University of Electronic Science and Technology of China,
China), Xiaofen Wang (University of Electronic Science and Technology
of China, China), Mengyu Ge (University of Electronic Science and
Technology of China, China), Jiasheng Li (University of Electronic
Science and Technology of China, China), and Haomiao Yang (University
of Electronic Science and Technology of China, China)

Communications and Networking 4

A Predictive Model of COVID-19 mRNA Vaccine Reactivity Based on Dual Attention for
Federated Learning Scenarios 1480
Mengyu Ge (University of Electronic Science and Technology of China,
China), Haomiao Yang (University of Electronic Science and Technology
of China, China), Xian Ming (Chengdu Sport University, China), and
Kunlan Xiang (University of Electronic Science and Technology of
China, China)
A One-Class Anomaly Detection Method for Drives Based on Adversarial Auto-Encoder 1487
Yufei Wang (Xi'an Jiaotong University, China), Xiaoshe Dong (Xi'an
Jiaotong University, China), Longxiang Wang (Xi'an Jiaotong
University, China), Weiduo Chen (Xi'an Jiaotong University, China),
and Bowen Li (Xi'an Jiaotong University, China)
Detecting Phishing Scams on Ethereum using Graph Convolutional Networks With Conditional
Random Field 1495
Wenhan Hou (Inner Mongolia University, China), Bo Cui (Inner Mongolia
University, China), and Ru Li (Inner Mongolia University, China)
PME: Processing-in-Memory Masking and Encoding for Secure NVM 1501
Zhiwen Xie (University of Chinese Academy of Sciences, China;
Institute of Computing Technology, China), Yinhe Han (University of
Chinese Academy of Sciences, China; Institute of Computing Technology,
China), and Xiaoming Chen (University of Chinese Academy of Sciences,
China; Institute of Computing Technology, China)
Towards a Privacy Preserving Data Flow Control via Packet Header Marking 1509
Somnath Mazumdar (Copenhagen Business School, Denmark) and Thomas
Dreibholz (Simula Metropolitan, Norway)

xxxv
Communications and Networking 5

A Blockchain-Based Decentralized Privacy-Preserving Mobile Payment Scheme using Anonymous


Credentials 1517
Linsheng Yu (Xihua University, China), Mingxing He (Xihua University,
China), Ling Xiong (Xihua University, China), Qian Luo (Xihua
University, China), and Xianhua Niu (Xihua University, China)
Secure Single-Server Fuzzy Deduplication Without Interactive Proof-of-Ownership in Cloud 1525
Shuai Cheng (Xihua University, China), Shengke Zeng (Xihua University,
China), Haoyu Zheng (Xihua University, China), Yawen Feng (Xihua
University, China), and Jixiang Xiao (Xihua University, China)
A Detecting Method Against Cross-Container Spectre Attacks 1531
Xinfeng He (Hebei University, China) and Yuanpu Li (Hebei University,
China)
Communication-Efficient Federated Learning Based on Chained Secure Multiparty Computing
and Compressed Sensing 1539
Di Xiao (Chongqing University, China), Pengcen Jiang (Chongqing
University, China), and Min Li (Chongqing University, China)
DcDID: Highly Privacy-Secure Decentralized Identity System Based on Dynamic Committee 1547
Xiaohua Wu (University of Electronic Science and Technology of China,
China), Xueqi Feng (University of Electronic Science and Technology of
China, China), Fengheng Wu (Chengdu Sea&Dune Network Technology Co.,
LTD, China), and Jing Wang (University of Electronic Science and
Technology of China, China)

Communications and Networking 6

THperf: Enabling Accurate Network Latency Measurement for Tianhe-2 System 1554
Yunyang Xu (National University of Defense Technology, China), Ke Wu
(National University of Defense Technology, China), Dezun Dong
(National University of Defense Technology, China), Cunlu Li (National
University of Defense Technology, China), and Liquan Xiao (National
University of Defense Technology, China)
Balancing Revenue and Cache Partition Fairness for CDN Providers 1562
Xiaodong Dong (Nankai University, China) and Binlei Cai (Qilu
University of Technology, China)
Entity Alignment Based on Latent Structural Information Mining Graph Convolutional
Networks 1570
JiaYi Du (Central South University of Forestry and Technology, China),
Yulu Liu (Central South University of Forestry and Technology, China),
Wei Ai (Central South University of Forestry and Technology, China),
Hongen Shao (Central South University of Forestry and Technology,
China), and Tao Meng (Central South University of Forestry and
Technology, China)

xxxvi
Communications and Networking 7

Subspace Clustering Based on Latent Low Rank Representation With Weighted Nuclear Norm
Minimization 1577
Cuiying Huang (Southwest University, China), Zhi Wang (Southwest
University, China), and Wu Chen (Southwest University, China)
Efficient PCA-Based Image Compression via Secure Outsourcing Edge Cloud 1586
Yuling Luo (Guangxi Normal University, China), Shiqi Zhang (Guangxi
Normal University, China), Shunsheng Zhang (Guangxi Normal University,
China), Junxiu Liu (Guangxi Normal University, China), Ce Liang
(Guangxi Normal University, China), and Su Yang (Swansea University,
UK)
Stable Causal Feature Selection Based on Direct Causal Effect Estimation 1593
Xiaojing Du (Guangxi University, China), Qingfeng Chen (Guangxi
University, China), Debo Cheng (Guangxi Normal University, China),
Qian Huang (Liuzhou Big Data Development Bureau, China), Junyue Cao
(Guangxi University, China), Zhenyun Deng (University of Auckland,
China), and Shichao Zhang (Guangxi Normal University, China)
FuzzGAN: A Generation-Based Fuzzing Framework for Testing Deep Neural Networks 1601
Ge Han (Shandong University, China), Zheng Li (CISPA Helmholtz Center
for Information Security, Germany), Peng Tang (Shandong University,
China), Chengyu Hu (Shandong University, China), and Shanqing Guo
(Shandong University, China)
Image Enhancement Algorithm Based on Local Contrast for Convolutional Neural Network-Based
Infrared Target Recognition 1609
BingKun Nian (The 32nd Institute, China; Electricity Science and
Technology, china), LiYuan Ma (National University of Defense
Technology, China), Yan Zhang (National University of Defense
Technology, China), Yi Zhang (National University of Defense
Technology, China), and HuaJun Shi (The 32nd Institute, China;
Electricity Science and Technology, China)

Communications and Networking 8

BERT-Based Chinese NER With Lexicon and Position Enhanced Information Adapter 1618
Zhongwei Li (Sichuan University, China), Bing Guo (Sichuan University,
China), YuChuan Hu (Sichuan University, China), Qin Zheng (Sichuan
University, China), and Xinhua Suo (Sichuan University, China)
A Disease Progression Prediction Model Based on EHR Data 1625
Fangcao Zhao (Shandong Normal University, China), Xiaomei Yu (Shandong
Normal University, China), Jinsong Zhang (Shandong Normal University,
China), Xue Li (Shandong Normal University, China), and Rui Li
(Shandong Normal University, China)
BBR-FIT: An Intelligent BBR Based on the Reinforcement Learning to Boost the Network
Efficiency over Time-Varying Networks 1633
Yi Xie (Ningbo University, China), Xianliang Jiang (Ningbo University,
China), Guang Jin (Ningbo University, China), and Haiming Chen (Ningbo
University, China)

xxxvii
Cooperative Computation Offloading and Resource Management for Vehicle Platoon: A Deep
Reinforcement Learning Approach 1641
Lingyun Lu (Beijing Jiaotong University, China), Xiang Li (Beijing
Jiaotong University, China), Jingxin Su (Beijing Jiaotong University,
China), and Zhihe Yang (Beijing Jiaotong University, China)
VICTOR: An Adaptive Framing-Based Speech Content Authentication and Recovery Algorithm 1649
Qing Qian (Guizhou University of Finance and Economics, China), Shuyun
Zhou (Guizhou University of Finance and Economics, China), Meixin Song
(Guizhou University of Finance and Economics, China), Yunhe Cui
(Guizhou University, China), and Huan Wang (Guizhou University of
Finance and Economics, China)

Communications and Networking 9

BPCN: A Simple and Efficient Model for Visual Question Answering 1655
Feng Yan (Xinjiang University, China), Wushour Silamu (Xinjiang
University, China), Yanbing Li (Xinjiang University, China), and
Yachang Chai (Xinjiang University, China)
BS2Vec: A Spatial Representation Learning Model for Large Scale Base Stations 1661
Li Li (Beijing Information Science & Technology University, China),
Junjun Si (Peking University, China; Hezhixin(Shandong) big data
Technology Co., Ltd., China), Jin Yang (Hezhixin(Shandong) big data
Technology Co., Ltd, China), Shuaifu Dai (Beijing JiuQi Science and
Technology Co., Ltd, China), Jianyu Zhang (Beijing JiuQi Science and
Technology Co., Ltd, China), and Bo Tu (Hezhixin(Shandong) big data
Technology Co., Ltd, China)
Construct A Unique Agent Network for Cooperative Multi-agent Reinforcement Learning 1668
Long Liang (Sichuan University, China), Haolin Wu (Sichuan University,
China), and Hui Li (Sichuan University, China)
Generating Natural Language Adversarial Examples Based on the Approximating Top-K
Combination Token Substitution 1675
Panfeng Qiu (East China Normal University, China), Xi Wu (The
University of Sydney, Australia), and Yongxin Zhao (East China Normal
University, China)
A Block Gray Adversarial Attack Method for Image Classification Neural Network 1682
Cailong Li (Shenyang Aerospace University, China), Chunlong Fan
(Shenyang Aerospace University, China), Jici Zhang (Shenyang Aerospace
University, China), Chenyang Li (Renmin University of China, China),
and Yiping Teng (Shenyang Aerospace University, China)

xxxviii
Communications and Networking 10

Authentication Scheme Based on Non-Interactive Zero-Knowledge Proof for Mobile Health 1690
Edward Mensah Acheampong (University of Electronic Science and
Technology of China, China), Shijie Zhou (University of Electronic
Science and Technology of China, China), Yongjian Liao (University of
Electronic Science and Technology of China, China), Emmanuel
Antwi-Boasiako (University of Electronic Science and Technology of
China, China), and Isaac Amankona Obiri (University of Electronic
Science and Technology of China, China)
RTD: The Road to Encrypted Video Traffic Identification in the Heterogeneous Network
Environments 1697
Minchao Xu (University of Chinese Academy of Sciences, China;
Institute of Information Engineering Chinese Academy of Sciences,
China; National Engineering Laboratory of Information Security
Technologies, China), Meijie Du (University of Chinese Academy of
Sciences, China; Institute of Information Engineering Chinese Academy
of Sciences, China; National Engineering Laboratory of Information
Security Technologies, China), Zhao Li (University of Chinese Academy
of Sciences, China; Institute of Information Engineering Chinese
Academy of Sciences, China; National Engineering Laboratory of
Information Security Technologies, China), Zeyi Deng (University of
Chinese Academy of Sciences, China; Institute of Information
Engineering Chinese Academy of Sciences, China; National Engineering
Laboratory of Information Security Technologies, China), Wei Yang
(University of Chinese Academy of Sciences, China; Institute of
Information Engineering Chinese Academy of Sciences, China; National
Engineering Laboratory of Information Security Technologies, China),
and Qingyun Liu (Institute of Information Engineering Chinese Academy
of Sciences, China; National Engineering Laboratory of Information
Security Technologies, China)
A Few-Shot Image Classification Method Based on Information Entropy for First-Order
Gradient Meta-Learning 1705
Chengzhi Xie (Guizhou University of Finance and Economics, China),
Fengjing An (Guizhou University of Finance and Economics, China), and
Mingsen Deng (Guizhou University of Finance and Economics, China)
An Effective Approach for Multi-label Classification with Missing Labels 1713
Xin Zhang (University of South Carolina, USA), Rabab Abdelfattah
(University of South Carolina, USA), Yuqi Song (University of South
Carolina, USA), and Xiaofeng Wang (University of South Carolina, USA)

Communications and Networking 11

Deep Residual Neural Networks with Attention Mechanism for Spatial Image Steganalysis 1721
Yue Shu (Southwest University of Science and Technology, China),
Renchao Qin (Southwest University of Science and Technology, China),
Yaying He (Southwest University of Science and Technology, China), Ya
Li (Southwest University of Science and Technology, China), Ruilin
Jiang (Southwest University of Science and Technology, China), and
Zhiyuan Wu (Southwest University of Science and Technology, China)

xxxix
A Reinforcement Learning Framework Based on Regret Minimization for Approximating Best
Response in Fictitious Self-Play 1728
Yanran Xu (Sichuan University, China), Kangxin He (Sichuan University,
China), Shu Hu (Sichuan University, China), and Hui Li (Sichuan
University, China)
Supervised Contrastive Meta-Learning for Few-Shot Classification 1736
Chuanyao Zhang (University of Science and Technology of China, China;
Ping An Technology (Shenzhen) Co., LTD., China), Jianzong Wang (Ping
An Technology (Shenzhen) Co., LTD., China), Zhangcheng Huang (Ping An
Technology (Shenzhen) Co., LTD., China), Lingwei Kong (Ping An
Technology (Shenzhen) Co., LTD., China), Xiaoyang Qu (Ping An
Technology (Shenzhen) Co., LTD., China), Ning Cheng (Ping An
Technology (Shenzhen) Co., LTD., China), and Jing Xiao (Ping An
Technology (Shenzhen) Co., LTD., China)
Efficiently Conditional Community Search in Dynamic Graphs 1743
Chuanyu Zong (Shenyang Aerospace University, China), Dong Ma (Shenyang
Aerospace University, China), Tao Qiu (Shenyang Aerospace University,
China), Jiajia Li (Shenyang Aerospace University, China), Yunzhe An
(Shenyang Aerospace University, China), and Xiufeng Xia (Shenyang
Aerospace University, China)

Communications and Networking 12

Influence Maximization with Graph Neural Network in Multi-feature Social Network 1751
Yuhao Wang (Wuhan University of Science and Technology, China; Hubei
Province Key Laboratory of Intelligent Information Processing and
Real-time Industrial System, China), Peng Li (Wuhan University of
Science and Technology, China; Hubei Province Key Laboratory of
Intelligent Information Processing and Real-time Industrial System,
China), and Weiyi Hang (Wuhan University of Science and Technology,
China; Hubei Province Key Laboratory of Intelligent Information
Processing and Real-time Industrial System, China)
HybridRTS: A Hybrid Congestion Control Framework with Rule and Reinforcement Learning for
Low-Latency WebRTC Live Video Streaming 1757
Kaizhe Zhang (Xian Jiaotong University, China), Zhiwen Wang (Xian
Jiaotong University, China), Hansen Ma (Xian Jiaotong University,
China), Haipeng Du (Xian Jiaotong University, China), and Weizhan
Zhang (Xian Jiaotong University, China)
Cosine Similarity-Based Mixup Data Preprocessing Under Point Augmentation for Point Cloud
Classification 1765
Guangping Li (Guangdong University of Technology, China), Yicheng
Huang (Guangdong University of Technology, China), Dingkai Liang
(Guangdong University of Technology, China), and Ping an Hu (Guangdong
University of Technology, China)
SG-Net: A Super-Resolution Guided Network for Improving Thyroid Nodule Segmentation 1770
Xingtao Lin (Fuzhou University), Xiaogen Zhou (Fuzhou University),
Tong Tong (Fuzhou University; Imperial Vision Technology), Xingqing
Nie (Fuzhou University), and Zhiqiang Li (Fuzhou University)

xl
Communications and Networking 13

Aspect-Level Sentiment Analysis Based on Graph Attention Fusion Networks 1776


Wenting Yu (Tianjin University of Technology, China), Xiaoye Wang
(Tianjin University of Technology, China), Peng Yang (Tianjin
University of Technology, China), Yingyuan Xiao (Tianjin University of
Technology, China), and Jinsong Wang (Tianjin University of
Technology, China)
Staggered Repetition Frequency Pulse Solution and Evaluation for Ultra-Wideband Range
Ambiguity in Long-Distance Multipath 1782
Licheng Zhang (University of Electronic Science and Technology of
China, China), Ziyan Yang (University of Electronic Science and
Technology of China, China), Xiaozhang Zhu (University of Electronic
Science and Technology of China, China), and Zhiqin Zhao (University
of Electronic Science and Technology of China, China)
An Adaptive RPC Mechanism for Performance and Node Fault Tolerance Optimization in HDFS
1789
Jingyu Zhang (Changsha University of Science & Technology, China;
National University of Defense Technology, China), Zhengwen Shu
(Changsha University of Science & Technology, China), and Lailong Luo
(National University of Defense Technology, China)
Depth Monocular Estimation with Attention-Based Encoder-Decoder Network from Single Image
1795
Xin Zhang (University of South Carolina, United States), Rabab
Abdelfattah (University of South Carolina, United States), Yuqi Song
(University of South Carolina, United States), Samuel A. Dauchert
(University of South Carolina, United States), and Xiaofeng Wang
(University of South Carolina, United States)

The 20th IEEE International Conference on Smart City


(SmartCity 2022)

Regular Research Papers


Ellipsoid Pricing Based Budget-Constraint Incentives for Noisy Crowdsensing 1801
Jiajun Sun (Huaiyin Normal University, China)
Capacity Bounds and Achievable Rates of Visible Light Communications for Future Smart City 1809
Xin Hu (Southwest Jiaotong University, China), Xiong Deng (Southwest
Jiaotong University, China), Wenxiang Fang (Southwest Jiaotong
University, China), Ziqiang Gao (Southwest Jiaotong University,
China), Yixiang Dong (Southwest Jiaotong University, China), and
Yanbing Yang (Sichuan University, China)
Transfer Route Recommendation for Metro Systems Based on Multi-source Data Fusion 1814
Tailan Yuan (Yunnan Normal University, China), Wen Xiong (Yunnan
Normal University, China), and Lijun Yun (Yunnan Normal University,
China; Engineering Research Center of Computer Vision and Intelligent
Control Technology, China)

xli
Binary Gaussian Mask Weighted Joint Dynamic and Static Guided Discriminative Correlation
Filter for Visual Tracking 1822
Zhiwen Xiao (Nanjing University of Posts and Telecommunications,
China), Xiaodan Hu (China National Center for Food Safety Risk
Assessment, China), and Hu Zhu (Nanjing University of Posts and
Telecommunications Nanjing, China)
JADD-GAN: A Joint Attention Generative Adversarial Data Fusion Network for Object
Detection and Tracking 1829
Guoxia Xu (Norwegian University of Science and Technology, Norway),
Hao Wang (Norwegian University of Science and Technology, Norway),
Meng Zhao (Tianjin University of Technology, China), and Hu Zhu
(Nanjing University of Posts and Telecommunications, China)
Cost-Effective Elderly Fall Detection with Symmetry Transformer Networks 1837
Bing Li (Agency for Science, Technology and Research, Singapore), Wei
Cui (Agency for Science, Technology and Research, Singapore), Yanru
Chen (Sichuan University), Joey Tianyi Zhou (Agency for Science,
Technology and Research, Singapore), Zhenghua Chen (Agency for
Science, Technology and Research, Singapore), Yuli Li (Shandong
University of Science and Technology (SUST)), and Wu Min (Agency for
Science, Technology and Research, Singapore)
Efficient Checkpoint Under Unstable Power Supplies on NVM Based Devices 1846
Jialin Liu (East China Normal University, China), Edwin Sha (East
China Normal University, China), Qingfeng Zhuge (East China Normal
University, China), Rui Xu (East China Normal University, China), and
Yuhong Song (East China Normal University, China)
Multi-source Privacy Protection EEG Emotion Recognition Based on Self-Supervised Learning 1854
Yingdong Wang and Qingfeng Wu

Short Research Papers


Optimization of Public Bus Scheduling using Real-Time Online Information 1863
Teng Hei Ho (Macao Polytechnic University, Macao, China), Ke Wang
(Macao Polytechnic University, Macao, China), Man Xu (Macao
Polytechnic University, Macao, China), Chan-Tong Lam (Macao
Polytechnic University, Macao, China), and Benjamin K. Ng (Macao
Polytechnic University, Macao, China)
Study on Temperature and Humidity Coupling Control of Plant Factory Based on ANFIS 1869
Jiayao Liu (Shanghai Institute of Technology, China), Xiaokun Guo
(Shanghai Academy of Agricultural Sciences, China), Yong Liu (Shanghai
Academy of Agricultural Sciences, China), Wenwen Hu (Shanghai Academy
of Agricultural Sciences, China), Shipu Xu (Shanghai Academy of
Agricultural Sciences, China), and Yunsheng Wang (Shanghai Academy of
Agricultural Sciences, China)
An Empirical Evaluation of Deep Neural Networks in Federated Learning 1875
Xiaotong Wu (Nanjing Normal University, China; Nanjing University,
China), Zilong Xue (Nanjing Normal University, China), and Lingling
Shen (Nanjing Normal University, China)

xlii
Blockchain Privacy Disclosure Risk Assessment Scheme Based on Improved Paillier Algorithm 1881
Lingqin Ran (Guizhou University, China), Changgen Peng (Guizhou
University, China), Dequan Xu (Guizhou University, China), Weijie Tan
(Guizhou University, China), and Zhongming Lin (Hong Kong University
of Science and Technology, China)
Towards Planning Package Delivery Paths by Exploiting the Crowd of Private Cars 1888
Hejing Nie (Hunan University of Science and Technology, China), Yiping
Wen (Hunan University of Science and Technology, China), Tiancai Li
(Hunan University of Science and Technology, China), Sipeng OuYang
(Hunan University of Science and Technology, China), and Muyang Tian
(Hunan University of Science and Technology, China)
Task Oriented Adaptive HUD Human Reliability Analysis 1896
Liu Sichen (China Aviation Radio Electronics Research Institute, Key
Laboratory of Avionics System Integrated Technology, Shanghai), Zhou
Lei (University of Shanghai for Science and Technology, China), Liu
Liwen (Southeast University, China), and Majian Majian (Southeast
University, China)

The 18th IEEE International Conference on Embedded


Software and Systems (ICESS 2022)

Regular Research Papers


A Thermal-Aware Approach for DVFS-Enabled Multi-core Architectures 1904
Javier Pérez Rodríguez (CISTER Research Centre, ISEP, IPP, Portugal),
Patrick Meumeu Yomsi (CISTER Research Centre, ISEP, IPP, Portugal),
and Pavel Zaykov (Honeywell Aerospace, Czechia)
User Satisfaction Oriented Elastic Charging Strategy for Electric Vehicles 1912
Lei Sun (Northeastern University, China), Yanru Liu (Northeastern
University, China), Kangwei Lin (Northeastern University, China),
Changqing Xia (Shenyang Institute of Automation, Chinese Academy of
Sciences, China), and Qingxu Deng (Northeastern University, China)
Energy- and Temperature-Aware Scheduling: From Theory to an Implementation on Intel
Processor 1922
Qaisar Bashir (Intel, Inc.), Mohammad Pivezhandi (Wayne State
University), and Abusayeed Saifullah (Wayne State University)
Real-Time Schedulability Analysis for Overloaded Primary-To-Secondary Processor Systems 1931
Mitchell Duncan (Wayne State University), Fatima Raadia (Wayne State
University), Syeda Tanjila Atik (Wayne State University), Marco
Brocanelli (Wayne State University), and Nathan Fisher (Wayne State
University)
A Lightweight Trusted Architecture and Service Mechanisms Based on SylixOS 1941
Qidi Zhao (Northwestern Polytechnical University, China), Hongjun You
(Shanghai Aerospace Electronic Technology Institute, China), Tianyang
Wang (Northwestern Polytechnical University, China), Changyi Du
(Northwestern Polytechnical University, China), Bohao Pei
(Northwestern Polytechnical University, China), and Kailong Zhang
(Northwestern Polytechnical University, China)

xliii
Enabling Massive Scalability in Low-Power Wide-Area Networks 1948
Mahbubur Rahman (City University of New York, USA) and Pushpen Bikash
Goala (City University of New York, USA)
Performance Evaluation of Intelligent Computing Platform for Air-Combat Decision Algorithm 1956
Kangfa Xu (Aviation Key Laboratory of Science and Technology on
Airborne and Missle-borne Computer, Xi’an Aeronautics Computing
Technique Research Institute, China), Linting Bai (Aviation Key
Laboratory of Science and Technology on Airborne and Missle-borne
Computer, Xi’an Aeronautics Computing Technique Research Institute,
China), Pengcheng Wen (Aviation Key Laboratory of Science and
Technology on Airborne and Missle-borne Computer, Xi’an Aeronautics
Computing Technique Research Institute, China), and Wensheng Niu
(Aviation Key Laboratory of Science and Technology on Airborne and
Missle-borne Computer, Xi’an Aeronautics Computing Technique Research
Institute, China)
Optimized Scheduling for Guard Bands Reduction in Time-Sensitive Networking 1963
Zexian Pan (Northeastern University, China), Qingxu Deng (Northeastern
University, China), Zhiwei Feng (Northeastern University, China),
Yuhan Lin (Northeastern University, China), and Changqing Xia
(Shenyang Institute of Automation, Chinese Academy of Sciences, China)
PPG-Based Heart Rate Estimation with Efficient Sensor Sampling and Learning Models 1971
Yuntong Zhang (The University of Texas at San Antonio, USA), Jingye Xu
(The University of Texas at San Antonio, USA), Mimi Xie (The
University of Texas at San Antonio, USA), Wei Wang (The University of
Texas at San Antonio, USA), Keying Ye (The University of Texas at San
Antonio, USA), Jing Wang (Florida State University, USA), and Dakai
Zhu (The University of Texas at San Antonio, USA)
A Vision-Based Low-Cost Power Wheelchair Assistive Driving System for Smartphones 1979
Zhiwei Wang (The University of Texas at San Antonio, USA), Kevin Liu
(University of Western Ontario, Canada), Jeffrey Wang (Keystone
School, USA), Jingye Xu (The University of Texas at San Antonio, USA),
Jingjing Chen (The University of Texas at San Antonio, USA), Yufang
Jin (The University of Texas at San Antonio, USA), and Rocky Slavin
(The University of Texas at San Antonio, USA)
VoiceBit: GPU-Accelerated Real-Time Human Voice Separation for Mobile Phones 1987
Gang Chen (Sun Yat-sen Unviersity), Zhaoheng Zhou (Sun Yat-sen
University), ShengYu He (Sun Yat-sen Univerity), Yi Zheng (Sun Yat-sen
University), and Wang Yi (Uppsala University)
Difference-Adaptive Knowledge Distillation for Resource-Constrained Embedded Devices 1995
Yi Xiong (University of Science and Technology of China, China),
Wenjie Zhai (University of Science and Technology of China, China),
and Zongwei Zhu (University of Science and Technology of China, China)
End-Edge Coordinated Multiview Deep Learning for Time-Efficient Atrial Fibrillation
Detection 2003
Tianren Zhou (Shandong University, China), Hanwen Li (Shandong
University, China), Zhaoyan Shen (Shandong University, China), and
Zhiping Jia (Shandong University, China)

xliv
Exploring TensorRT to Improve Real-Time Inference for Deep Learning 2011
Yuxiao Zhou (Texas State University, USA) and Kecheng Yang (Texas
State University, USA)
An Optimization Approach of Container Startup Times for Time-Sensitive Embedded Systems 2019
Lukas Stahlbock (IAV GmbH, Germany), Jan Weber (IAV GmbH, Germany),
and Frank Köster (German Aerospace Center (DLR), Germany)

Short Research Papers


Pseudo-Log: Restore Global Data Facing Power Failures with Minimum NVM Write 2027
Edwin Hsing Mean Sha (East China Normal University, China), Yeteng
Liao (East China Normal University, China), Qingfeng Zhuge (East China
Normal University, China), Rui Xu (East China Normal University,
China), Yuhong Song (East China Normal University, China), and Jialin
Liu (East China Normal University, China)
Scheduling Performance Evaluation Framework for ROS 2 Applications 2031
Bo Peng (Saitama University), Atsushi Hasegawa (Research Institute of
Systems Planning, Inc, Japan), and Takuya Azumi (Saitama University)
The Design of a Novel Modbus TCP/RTU Gateway for High Reliable Communication 2039
Honglin Zhou (DEC Academy of Science and Technology Co., Ltd., P.R.
China), Junlin Song (DEC Academy of Science and Technology Co., Ltd.,
P.R. China), and Xiaomin Pu (DEC Academy of Science and Technology
Co., Ltd., P.R. China)
Design and Realization of Intelligent Airborne Information Processing Concept Simulation
System 2043
Jianchun Xie (Aviation Key Laboratory of Science And Technology On
Airborne And Missile-borne Computer AVIC Xi’an Aeronautics Computing
Technique Research Institute, China), Linting Bai (Aviation Key
Laboratory of Science And Technology On Airborne And Missile-borne
Computer AVIC Xi’an Aeronautics Computing Technique Research
Institute, China), and Qing Luo (Nanjing University of Aeronautics and
Astronautics Nanning, China; Shenyang Aircraft Design&Reserch
Institute, China)

The 2nd IEEE International Conference on DIKW (DIKW 2022)

Regular Research Papers


Research on Gale Forecast Method of Yangpu Port Based on Random Forest Model 2048
Wanting Wang (Hainan Province Meteorological Service Centre, China),
Liang Chen (Hainan Province Meteorological Service Centre, China), and
Yucong Duan (Hainan University, China)
Multi-Dimensional Intention Recognition for User-Generated Short Texts 2056
Ying Zhang (Shandong Institute of Commerce and Technology, China), Fan
Zhang (Shandong University of Finance and Economics, China), and
Xiaoyan Zhang (Shandong Institute of Commerce and Technology, China)

xlv
Personalized Review Recommendation Without User Interactive Data 2062
Shufan He (Harbin Institute of Technology at Weihai, China), Hua Zhang
(Harbin Institute of Technology at Weihai, China), Zhiying Tu (Harbin
Institute of Technology at Weihai, China), and Dianhui Chu (Harbin
Institute of Technology at Weihai, China)
Joint Extraction of Entity Relations Based on Dependency Syntax and BERT in Medical Domain 2071
Boyang Zhang (School of Resources and Environment, UESTC, China),
Wenbo Xu (School of Resources and Environment, UESTC, China), Haitao
Jia (School of Resources and Environment, UESTC, China), Jiahao Li
(School of Resources and Environment, UESTC, China), and Jingzhe Sun
(School of Resources and Environment, UESTC, China)
Enhancing Cross-Lingual Medical Concept Alignment by Leveraging Synonyms and Translations
of the Unified Medical Language System 2078
Luming Chen (BioLand Laborartory, China), Yifan Qi (Suzhou Institute
of Systems Medicine; Peking Union Medical College & Chinese Academy of
Medical Sciences, China), Aiping Wu (Suzhou Institute of Systems
Medicine; Peking Union Medical College & Chinese Academy of Medical
Sciences, China), Lizong Deng (Suzhou Institute of Systems Medicine;
Peking Union Medical College & Chinese Academy of Medical Sciences,
China), and Taijiao Jiang (Guangzhou Laborartory, China)
Analysis of Semantic-Based Knowledge Graph Embedding Models in Uncertainty Knowledge
Graphs 2084
Jianjing Li (Ningxia University, China) and Guanfeng Li (Ningxia
University, China)
OASIS: An Ontology-Driven Autonomic Management System for Intelligent Substations 2093
Xiaodong Xie (STATE GRID Corporation of China, China), Jianxu Yang
(NARI Group Corporation State Grid Electric Power Research Institute,
China), Xiong Hua (NARI Group Corporation (State Grid Electric Power
Research Institute), China), and Qianru Zhou (Nanjing University of
Science and Technology, China)
Compressive Sensing Solution Optimization Method in Sensing-Transmission-Calculation
Integrated System 2101
Li Ma (North China University of Technology, China), Zelin Zhang
(North China University of Technology, China), Yang Li (North China
University of Technology, China), Yingxun Fu (North China University
of Technology, China), and Dongchao Ma (North China University of
Technology, China)
Multivariate Time Series Imputation Based on Masked Autoencoding With Transformer 2110
Yongsheng Wang (Inner Mongolia University Of Technology, China), Hao
Xu (Inner Mongolia University Of Technology, China), Zhiwei Xu (Inner
Mongolia University Of Technology, China), Jing Gao (Inner Mongolia
University Of Technology, China), Yuhao Wu (Inner Mongolia University
Of Technology, China), and Zhe Zhang (Inner Mongolia University Of
Technology, China)

xlvi
Purpose Driven Disputation Modeling, Analysis and Resolution Based on DIKWP Graphs 2118
Yingtian Mei (Hainan University, China), Yucong Duan (Hainan
University, China), Liang Chen (Hainan Meteorological Service Center,
China), Zaiwen Feng (Huazhong Agricultural University, China), Lei Yu
(Inner Mongolia University, China), and Zhendong Guo (Hainan
University, China)
Purpose Driven DIKW Modeling and Analysis of Meteorology and Depression 2126
Zhendong Guo (HaiNan University, China), Yucong Duan (HaiNan
University, China), Liang Chen (Hainan Meteorological Service Center,
China), Chunyu Zhuang (Haikou Maternal and Child Health Hospital,
China), and Yingtian Mei (HaiNan University, China)
Purpose Driven Modelling and Analysis for Smart Table Fill and Design Based on DIKW 2134
Yue Huang (Hainan University, China), Yucong Duan (Hainan University,
China), Yu Lei (Inner Mongolia University, China), Yingtian Mei
(Hainan University, China), Zhengdong Guo (Hainan University, China),
and Ting Hu (Hainan University, China)
Automatic Semantic Modeling by Cross-Modal Retrieval 2142
Ruiqing Xu (Huazhong Agricultural University, China), Wolfgang Mayer
(University of South Australia, Australia), Yulong Wang (Huazhong
Agricultural University, China), Hong-Yu Zhang (Huazhong Agricultural
University, China), Da Ning (China State Ship Building Corporation
Limited, China), Yucong Duan (Hainan University, China), Keqing He
(Wuhan University, China), and Zaiwen Feng (Huazhong Agricultural
University, China; Wuhan University, China)
Data Model Study for Advancement of Japanese PSI Management Introducing the Concepts of
S&OP 2151
Xiaomei Qin (Nagasaki Institute of Applied Science, Japan) and Zhen
Liu (Nagasaki Institute of Applied Science, Japan)

Short Research Papers


Factors Influencing out of Pocket Ratio to CPS Among NPC Patients in Guangxi: 2014-2020 2159
Li-Fang Zhou (The Fourth Affiliated Hospital of Guangxi Medical
University, Liuzhou Center for Disease Control and Prevention,P.R.C.),
Ping-Ping Zeng (Nursing School of Guangxi Medical University, P.R.C.),
Li-Hua Zhou (The Fourth Affiliated Hospital of Guangxi Medical
University, P.R.C.), Kang Min (the First Affiliated Hospital of
Guangxi Medical University, P.R.C.), Bo Wei (Guangxi Medical
University, P.R.C.), and Yu-Sheng Wang (School of Public Policy and
Management, Guangxi University, P.R.C.)
A Fault Diagnosis Method Based on Capsule Convolutional Network 2164
Tian Huachen (Wuhan Digital Engineering Institute Wuhan, China) and
Liu JunTao (Wuhan Digital Engineering Institute, China)
A Real-Time Deformation Measurement System Platform of Historic Building Based on 3DGIS,
BIM and IoT 2169
Chunxia Shi (Shanghai Construction No.5 (Group) Co., Ltd., China),
Feng Pan (Shanghai Construction No.5 (Group) Co., Ltd., China), Qiang
He (Shanghai Construction No.5 (Group) Co., Ltd., China), Yue Wu
(Shanghai Construction No.5 (Group) Co., Ltd., China), and Xinkui Li
(Shanghai Construction Group Co., Ltd., China)

xlvii
The 8th IEEE International Conference on DSS (DSS 2022)

Regular Research Papers


CTMSN-EHI: A Context-Aware Time-Decay Multi-head Self-Attention Network with Enhanced
History Information for Multi-turn Spoken Language Understanding 2175
Xiang Jin (Sichuan University, China), Chuan Li (Sichuan University,
China), and Dong Tao (Sichuan University, China)
A Hybrid BiLSTM-ATT Model for Improved Accuracy Sentiment Analysis 2182
Lanxue Dang (Henan University, China), Chunyu Wang (Henan University,
China), Hongyu Han (Henan University, China), and Yan-e Hou (Henan
University, China)
Research on the Intelligent Countermeasure Based on the Multi-aircraft Cooperative Combat
Behavior Tree 2189
Chengping Tian (Strategic evaluation and consultation center, Academy
of Military Sciences, China), Hao Zhang (Strategic evaluation and
consultation center, Academy of Military Sciences, China), Yan Li
(Strategic evaluation and consultation center, Academy of Military
Sciences, China), Xiao Sun (Strategic evaluation and consultation
center, Academy of Military Sciences, China), and Bin Cheng (Strategic
evaluation and consultation center, Academy of Military Sciences,
China)
CH-Go: Online Go System Based on Chunk Data Storage 2198
Lu Hui (Sichuan University, China), Li Chuan (Sichuan University,
China), Yang Yiming (National University of Singapore, Singapore), Li
Cheng (Sichuan University, China), and Islam Ashraful (Sichuan
University, China)
CFCT: The Cell Function Classification Method for Complex Tables 2206
Sainan Tong (Northeastern University, China), Derong Shen
(Northeastern University, China), Yue Kou (Northeastern University,
China), and Tiezheng Nie (Northeastern University, China)
Interpretable Sentencing Element-Based Prison Term Prediction 2214
Yifang Zhang (Sichuan University, China), Duanyu Feng (Sichuan
University, China), Wei Tian (Southwest Petroleum University, China),
and Hao Wang (Sichuan University, China)
Research on Intrusion Detection Method for Industrial Control Systems Based on Improved
APSO-MKBoost-C Algorithm 2221
Xiao Li (China University of Petroleum (Huadong), China) and Kewen Li
(China University of Petroleum (Huadong), China)
F3FAD: Fast 3D Facial Avatar Digitization with XR Cloud Service 2227
Qing Yang (Intel Corporation, China) and Hua Zhang (Intel Corporation,
China)

xlviii
Evaluation of Data Poisoning Attacks on Federated Learning-Based Network Intrusion
Detection System 2235
Yuemeng Zhang (Beijing University of Posts and Telecommunications,
China), Yong Zhang (Beijing University of Posts and
Telecommunications, China), Zhao Zhang (Beijing University of Posts
and Telecommunications, China), Haonan Bai (Beijing University of
Posts and Telecommunications, China), Tianyi Zhong (Beijing Jiaotong
University, China), and Mei Song (Beijing University of Posts and
Telecommunications, China)
Multi-Value Chain Auto Parts Demand Prediction Based on Dynamic Heterogeneous Graph
Convolution 2243
Xin Wu (Sichuan university, China) and Chuan Li (Sichuan university,
China)

Short Research Papers


An Enhanced BERTopic Framework and Algorithm for Improving Topic Coherence and Diversity
2251
Sahil Sawant (Worcester Polytechnic Institute, USA), Jinhong Yu
(Worcester Polytechnic Institute, USA), Kirtikumar Pandya (Vodafone
GmbH, Germany), Chun-Kit Ngan (Worcester Polytechnic Institute, USA),
and Rolf Bardeli (Vodafone GmbH, Germany)
Dual-Guided Collective Entity Alignment for Knowledge Graphs 2258
Gang Bai (Northeastern University, China), Yue Kou (Northeastern
University, China), Derong Shen (Northeastern University, China),
Tiezheng Nie (Northeastern University, China), and Dong Li (Liaoning
University, China)
DP-Denclue: An Outlier Detection Algorithm with Differential Privacy Preservation 2264
Huang-Zhi Xia (Mudanjiang Normal University, China), Li-Min Chen
(Mudanjiang Normal University, China), Fu Qi (Mudanjiang Normal
University, China), Xue-Di Mao (Mudanjiang Normal University, China),
Lin-Qi Sun (Mudanjiang Normal University, China), and Feng-Yu Xue
(Mudanjiang Normal University, China)
Acoustic Howling Suppression with Neural Networks using Real-World Data 2270
Liang Wan (Chongqing University of Posts and Telecommunications,
China), Baosheng Lv (Chongqing University of Posts and
Telecommunications, China), Hongqing Liu (Chongqing University of
Posts and Telecommunications, China), Lu Gan (Brunel Univeristy, UK),
and Yi Zhou (Chongqing University of Posts and Telecommunications,
China)
Time-Frequency Complex Mask Network for Echo Cancellation and Noise Suppression 2275
Ning Sun (Chongqing University of Posts and Telecommunications,
China), Hongqing Liu (Chongqing University of Posts and
Telecommunications, China), Lu Gan (College of Engineering, Brunel
University, U. K.), Yu Zhao (Chongqing University of Posts and
Telecommunications, China), Zhen Luo (Chongqing University of Posts
and Telecommunications, China), and Yi Zhou (Chongqing University of
Posts and Telecommunications, China)

xlix
Alzheimer's Disease Detection using Acoustic and Linguistic Features 2280
Hongshun Deng (Chongqing University of Posts and Telecommunications,
China), Hongqing Liu (Chongqing University of Posts and
Telecommunications, China), Yi Zhou (Chongqing University of Posts and
Telecommunications, China), and Gan Lu (Brunel University, UK)
MBTI BERT: A Transformer-Based Machine Learning Approach using MBTI Model for Textual
Inputs 2285
Raad Bin Tareaf (XU Exponential University of Applied Sciences,
Germany)
Predicting User Engagements using Graph Neural Networks on Online Social Networks 2293
Seyed Ali Alhosseini (Hasso-Plattner-Institute, Germany) and Christoph
Meinel (Hasso-Plattner-Institute, Germany)
A Systematic Integrated Literature Review of Clinical Data Management Platforms of HL7
FHIR 2298
Franz Frederik Walter Viktor Walter-Tscharf (University of Trento)
Construction of Social Community Knowledge Graph From Wikipedia 2308
Shimei Li (Beihang University, China), Tongge Xu (Beihang University,
China), Yueqi Liu (Beihang University, China), and Liqun Yang (Beihang
University, China)

The 8th IEEE International Conference on DependSys


(DependSys 2022)

Regular Research Papers


Index System Construction and Weight Distribution Method Based on Improved Credibility 2316
Liang Chen (China Electronics Technology Group Corporation (CETC),
20th Institute, China), Wang Sule (China Electronics Technology Group
Corporation (CETC), 20th Institute, China), and Lulu Zhao (China
Electronics Technology Group Corporation (CETC), 20th Institute,
China)
Unsupervised Anomaly Detection for IoT Data Based on Robust Adversarial Learning 2324
Yan Qiao (Hefei University of Technology, China), Benchu Zhang (Hefei
University of Technology, China), and Zeyu Zhang (Macau University of
Science and Technology, China)
Analyzing the Spatial-Temporal Characteristics and Influencing Factors of Public Attention
to 5G Based on Baidu Index 2331
Pan Liu (Qiannan Normal University for Nationalities, China), Guanyu
Wang (Qiannan Normal University for Nationalities, China), Kai Liu
(Qiannan Normal University for Nationalities, China), and Yanlin Chen
(Qiannan Normal University for Nationalities, China)
Target Recognition of HRRP Based on CNN With Multi-Axis Attention and Residual Connections
2338
Yuxuan Zhang (Nanjing University of Aeronautics and Astronautics,
China) and Yingying Kong (Nanjing University of Aeronautics and
Astronautics, China)

l
Inference-Based Deep Reinforcement Learning for Physics-Based Character Control 2345
Yuxi Chen (University of Electronic Science and Technology of China,
China), Chenghao Huang (University of Electronic Science and
Technology of China, China), Weimin Yuan (University of Electronic
Science and Technology of China, China), Yutong Wu (University of
Nottingham Ningbo China, China), Ziyi Zhang (Chengdu DiShiWuXian
Technology Co., Ltd., China), Hao Tang (Chengdu DiShiWuXian Technology
Co., Ltd., China), and Yanru Zhang (University of Electronic Science
and Technology of China, China)

Short Research Papers


A Hybrid Model Based on Deep Convolutional Neural Network for Medical Named Entity
Recognition 2353
Deguang Li (Luoyang Normal University, China), Yongxin Zhang (Luoyang
Normal University, China), Yifan Zhang (Luoyang Normal University,
China), Hao Lu (Luoyang Normal University, China), Bo Yu (Luoyang
Normal University, China), Shoubo Peng (Luoyang Normal University,
China), and Youzhong Ma (Luoyang Normal University, China)
Analysis of the Research Status of Information Technology Education Literature in China
and Abroad 2358
Yulin Zhao (Qiannan Normal University for Nationalities, China; Key
Laboratory of Machine learning and Unstructured Data Processing of
Qiannan, China), Kai Liu (Qiannan Normal University for Nationalities,
China; Suqian University, China; Key Laboratory of Complex Systems and
Intelligent Optimization of Guizhou, China), and Junke Li (Suqian
University, China; Qiannan Normal University for Nationalities, China;
Jiangsu Province Engineering Research Center of Smart Poultry Farming
and Intelligent Equipment, China)
A Deep Learning Network for Detecting COVID-19 from Chest X-Ray Images 2362
Bo Wang (Luoyang Normal University, China), Yongxin Zhang (Luoyang
Normal University, China), Shihui Ji (Southwest Jiaotong University,
China), Binbin Zhang (Luoyang Normal University, China), Xiangyu Wang
(Luoyang Normal University, China), and Jiyong Zhang (Luoyang Normal
University, China)
An Improved Deep Network of Pulmonary Tuberculosis Lesions Detection Based on YOLO 2368
Le An (Chengdu University of Technology, China), Kexin Peng (Chengdu
University of Technology, China), and Xing Yang (Chengdu University of
Technology, China)
timeTree: How to Represent Time Sequence in a Threat Tree 2373
Zhitao Wu (China Electronic Product Reliability & Environmental
Testing Research Institute, China), Jingjing Hu (China Electronic
Product Reliability & Environmental Testing Research Institute,
China), Xiaowei Zhang (China University of Geosciences, China), and
Wei Ren (China University of Geosciences, China; Hubei Key Laboratory
of Intelligent Geo-Information Processing, China)

li
Author Index

lii

You might also like