February 23, 2018 (Yannian Century Hotel) | ||||
08:00-08:30 | Registration | Hotel Lobby | ||
08:30-08:45 | Welcoming Remarks 1
Prof. Xiping Hu, Shenzhen Institutes of Advanced Technology, Chinese Academy of Sciences, China |
Guoming Tang | Meeting Room
(The 5th Floor) |
|
08:45-09:00 | Welcoming Remarks 2
Prof. Deke Guo, National University of Defense Technology, China |
|||
09:00-09:20 | Group Photo Session | Lobby Entrance | ||
09:20-10:10 | Keynote 1 | Opportunities and Challenges of Disruptive Applications Driven by 5G Networks
Prof. Xitong Li (HEC Paris, France) |
Deke Guo | Meeting Room
(The 5th Floor) |
10:10-10:30 | Coffee Break | |||
10:30-11:50 | Paper Session 1: Optimization Theory and Applications | Meeting Room
(The 5th Floor) |
||
12:00-14:00 | Buffet Lunch | Cafeteria
(The 1st Floor) |
||
14:00-15:20 | Paper Session 2: Intelligent Computing Technology for 5G Applications | Meeting Room
(The 5th Floor) |
||
15:20-15:40 | Coffee Break | |||
15:40-16:20 | Paper Session 3: Resource Allocation and Management | Meeting Room
(The 5th Floor) |
||
16:20-17:50 | Panel | Future Wireless Networking: Progress and Prospects
Panel list: Haijun Zhang (Chair), Xitong Li, Xiaojiang Chen, Xiaofei Wang, Deke Guo |
Meeting Room
(The 5th Floor) |
|
18:00-20:00 | Banquet
Location: Shixiang Room and Shiyun Room (The 2nd Floor) |
Shiruyi Restaurant | ||
February 24, 2018 (Yannian Century Hotel) | ||||
08:30-09:20 | Keynote 2 | Sensing Our World Using Wireless Signal
Prof. Xiaojiang Chen (Northwest University, China) |
Qiang Liu | Meeting Room
(The 5th Floor) |
09:20-09:40 | Coffee Break | |||
09:40-10:40 | Paper Session 4: Security and Privacy in Emerging 5G Applications | Meeting Room
(The 5th Floor) |
Keynote Speaker 1
09:20-10:10, February 23, 2018
Xitong Li, Ph.D.
Associate Professor HEC Paris, France |
Title: Opportunities and Challenges of Disruptive Applications Driven by 5G Networks
Abstract: <TBA>
Biography: Xitong Li holds a Ph.D. in Management (specialized in Information Technologies) from Massachusetts Institute of Technology (MIT), USA and a Ph.D. in Engineering from Tsinghua University, China. His research interests include how to use online data/information and the identification of causal impacts of using online data/information or social media. He has served as an editor or a reviewer of several highly recognized journals including Management Science, Information Systems Research (ISR), ACM Transactions on Internet Technology (ACM TOIT), World Wide Web Journal (WWWJ), IEEE Transactions on Systems, Man and Cybernetics, Part A (SMCA), IEEE Transactions on Automation Science and Engineering (T-ASE), IEEE Transactions on Service Computing (TSC), IEEE Transactions on Emerging Topics in Computing (TETC), IEEE Intelligent Systems, Decision Support Systems (DSS), Information Sciences (INS), Information Systems Frontiers (ISF), Journal on Data Semantics (JODS), Journal of Systems and Software (JSS), Enterprise Information Systems (EIS), Service Oriented Computing and Applications (SOCA).
Keynote Speaker 2
08:30-09:20, February 24, 2018
Xiaojiang Chen, Ph.D.
Professor, Deputy Dean School of Information Science & Technology, Northwest University, China |
Title: Sensing Our World Using Wireless Signal
Abstract: <TBA>
Biography: Xiaojiang Chen is a Professor and Deputy Dean of the School of Information Science and Technology, Northwest University. His research interest include wireless networks, smart sensing, mobile edge computing, and mobile computing. His research has been continuously supported by National Natural Science Foundation of China (NSFC). He has published over 100 papers in premier journals and conferences. He served as the general secretary of ACM Xi’An Council, and the Chair of the YOCSEF XI’AN Community of the CCF (2014-2016), Director of the CCF Board (2016-2017). He has served as technical program committee member for many international conferences (such as IEEE MASS , IEEE ICCCN, IEEE ICC). He was the recipient of the Best Paper Nomination Awards at ACM CCS 2018, and Best Poster Award of the ACM SenSys 2018. Dr. Chen will be serving as vice general co-chair of ACM Turing Celebration Conference.
Paper Session 1: Optimization Theory and Applications
Session Chair: Wei Chen
10:30-11:50, February 23, 2018
Joint Scheduling and Trajectory Design for UAV-aided Wireless Power Transfer System
Yi Wang, Meng Hua, Zhi Liu, Di Zhang, Haibo Dai, Ying Hu
Abstract: In this paper, we focus on an unmanned aerial vehicle (UAV)-aided wireless power transfer (WPT) system, where an energy transmitter is deployed on UAV and sends wireless energy to multiple energy limited sensor nodes (SNs) for energy supplement. How to exploit the UAV’s mobility via trajectory design and adopt suitable scheduling scheme of SNs will directly influence the whole charging efficiency over a given charging period. From the perspective of fairness among SNs, our aim is to maximize the minimum energy received by all SNs by jointly optimizing the UAV’s trajectory and SNs’ scheduling scheme with the UAV’s maximum speed constraint as well as the initial/final location constraint. However, the established problem is in a non-convex mixed integer form, which is difficult to tackle. Therefore, we first decompose the original problem into two subproblems and then develop an efficient iterative algorithm by using the successive convex optimization technique, which leads to a suboptimal solution. Numerical results are provided to demonstrate the superiority of our proposed algorithm over the benchmarks.
Deep Learning Based Nodes Management and Transceiver Optimization in Cloud-RAN
Yu Chen, Kai Zhao, Jing-Ya Zhao, Qing-Hua Zhu, Yong Liu
Abstract: Inspired by Deep Learning (DL) in successfully solving complex control problems, a new DL-based efficient resource allocation framework to solve the problems of node management and transceiver optimization in Cloud-RAN was proposed. The main purpose is to treat the input and output of resource allocation algorithm as a non-linear mapping, and use a Deep Neural Network (DNN) to approximate this mapping relation. First is to determine a series of optimization algorithms that can be learned by a fully connected DNN; second is to evaluate the performance of the DNN-based framework. Simulation shows that the DNN can achieve a fairly accurate approximation, compared with the traditional algorithm, DNN can achieve orders of magnitude in time computation, and can handle dynamic situation well.
Deep Learning Based Antenna Muting and Beamforming Optimization in Distributed Massive MIMO Systems
Yu Chen, Kai Zhao, Jing-Ya Zhao, Qing-Hua Zhu, Yong Liu
Abstract: Inspired by the success of Deep Learning (DL) in solving complex control problems, a new DL-based approximation framework to solve the problems of antenna muting and beamforming optimization in distributed massive MIMO was proposed. The main purpose is to obtain a non-linear mapping from the raw observations of networks to the optimal antenna muting and beamforming pattern, using Deep Neural Network (DNN). Firstly, the antenna muting and beamforming optimization problem is modeled as a non-combination optimization problem, which is NP-hard. Then a DNN based framework is proposed to obtain the optimal solution to this complex optimization problem with low-complexity. Finally, the performance of the DNN-based framework is evaluated in details. Simulation results show that the proposed DNN framework can achieve a fairly accurate approximation. Moreover, compared with the traditional algorithm, DNN can reduced the computation time by several orders of magnitude.
A Converged Network Architecture Oriented Towards NB-IoT
Weidong Fang, Wuxiong Zhang, Lianhai Shan, Jufeng Luo, Wei Chen
Abstract: Although NB-IoT’s standardization gives us a future direction, we have to face some issues of existing networks converged, especially, the wireless sensor net-work (WSN) and cellular networks (CN) converged. On the other hand, the increase in number of sensor nodes and in the mobile devices is forcing the backhaul network architecture to undergo radical transformation. To meet the requirements of low latency and high quality of service (QoS), we put forward a novel converged network architecture. Meanwhile, we give three application scenarios. The analysis results show this architecture could facility the network design.
Paper Session 2: Intelligent Computing Technology for 5G Applications
Session Chair: Guoming Tang
14:00-15:20, February 23, 2018
Smartphone-based Intelligent Sleep Monitoring
Pansheng Fang, Zhaolong Ning, Xiping Hu
Abstract: The sleeping quality is one of the most important factors to judge people’s health status, and has drawn increasing attention of the public recently. However, the quantified results of sleeping quality can generally be achieved in labs with the help of high precision instrument, such as Actigraphy or professional graph like Polysomnography (PSG), and are thus not available for the general public. In this paper, we construct a novel way of sleep-scoring system implanted in the iSmile app. iSmile first collects the sounds recorded by smart phone recorder, then classifies the sound frames with a light weight decision tree algorithm. Based on the number and the average amplitude of sleep-related events, we score the users’ sleeping quality in three aspects (respectively cough-score, snore-score and talk-score) using Pittsburgh Sleep Quality Index (PSQI) and Pediatric Sleep Questionnaire (PSQ). During users’ sleeping period, iSmile also collects data from the accelerator sensor to predict the users’ mood (presented in valence and arousal) and recommend smart alarm sounds to help improve their mood. For the experiment, we involved 5 participants (20 nights in total) and achieved high precision of predicting sleep events (above 89%), with the users’ valence and arousal improved by 14.57%. From succinct chart of sleeping score on the App UI, users can see the visualized results of their sleeping quality.
Cluster Routing Protocol for Coal Mine Wireless Sensor Network based on 5G
Wei Chen, Xiao Yang, Weidong Fang, Wuxiong Zhang, Xiaorong Jiang
Abstract: In coal mine, the routing protocol in Wireless Sensor Network (WSN) based on fog computing can effectively achieve combination the monitoring task with the computing task, and provide the correct data forwarding path to meet the requirements of the aggregation and transmission of sensed information. However, the energy efficiency is still taken into account, especially, the unbalance of energy consumption. 5G is a technical system of high frequency and low frequency mixing, with characteristics of large capacity, low energy consumption and low cost. With the formal freeze on 5G NSA standards, 5G networks are one step closer to our lives. In this paper, a centralized non-uniform clustering routing protocol based on the residual energy and communication cost. The protocol considers all nodes as candidate cluster heads in the clustering stage and defines a weight matrix P. The value of the matrix elements takes into account the residual energy of nodes and the cost of communication between nodes and cluster heads, selected as the basis for the cluster head. When selecting a cluster head, each time a node with the largest weight is selected from a set of candidate cluster heads, other candidate cluster heads within the competition range abandon competition, and then updates the candidate cluster head set. Experimental results show that the protocol optimized in this paper can effectively extend the network life cycle.
Distributed Multiple-service User-experience Energy Saving Algorithm for base station
Yuanyuan Zeng, Yu Zhang, Hao Jiang, Xian Zhou
Abstract: The issue about energy consumption of wireless network attracts more and more attention and becomes one of three energy efficiency features in 5G. The user associated base station switching on-off strategy can effectively reduce energy consumptions. The existing strategies mainly focus on Quality of Service for users, without fully considering the influence of user experience for specific applications and the problem of high time complexity of implementing the energy-saving strategy caused by the large scale of the 5G mobile network. This paper proposes Distributed Multiple-service User-experience Energy Saving Algorithm for base station (DMUES). Nonlinear integer programming is utilized to model the above problem, which achieves the tradeoff between user experience and energy consumption. By comparing with other relative energy saving strategy, the results show that DMUES achieves good performance on user experience and energy savings. Furthermore, the time complexity of energy saving strategy is reduced due to community partition.
Alarm Sound Recommendation Based On Music Generating System
Wenhan Han, Xiping Hu
Abstract: In this paper, we propose an alarm sound recommendation system based on music generation. The recommendation system will be integrated with an application named iSmile, which is a sleep analysis and depression detection application built by the authors in previous work. We use a music generating algorithm based on GAN (Generative Adversarial Nets) as the core of the recommendation system. To the best of our knowledge, it is the first application recommending real-time generated music rather than existing music. In the following part of the paper, we detail the algorithm, the experiment we conducted and the result analysis. The result shows that the recommendation system can effectively generate and recommend proper alarm sound according to the emotion prediction.
Paper Session 3: Resource Allocation and Management
Session Chair: Haijun Zhang
15:40-16:20, February 23, 2018
Cooperative Caching and Delivery Algorithm Based on Content Access Patterns at Network Edge
Lintao Yang, Yanqiu Chen, Luqi Li, Hao Jiang
Abstract: Mobile network performance and user Quality of Experience (QoE) will be negatively affected by the explosion of mobile data traffic. Recent research has focused on local caching at the wireless edge, as motivated by the 80/20 rule regarding content popularity. By caching popular contents at base stations (BSs) , backhaul congestion and content access latency can be dramatically reduced. To address the limited storage size of BSs , an algorithm optimizing cooperative caching has been highlighted. Contents requested by mobile users that cannot be obtained locally could be transferred by cooperative BSs. In this paper, we propose a cooperative caching algorithm based on BS content access patterns. We use tensor decompositions with distance constraint to analyze interaction between users, contents and base stations. Thus, BSs with small geographical distances and similar content access patterns constitute a cooperative caching domain. Simulation results based on a real dataset of usage detail records (UDRs) demonstrate the superior performance and promising practical gains in caching of the proposed caching method compared to user clustering and BS clustering.
An Energy Efficient Uplink Scheduling and Resource Allocation for M2M Communications in SC-FDMA based LTE-A Networks
Qiyue Li, Yuling Ge, Yangzhao Yang, Yadong Zhu, Wei Sun, Jie Li
Abstract: In future wireless communications, there will be a large number of devices equipped with several different types of sensors need to access networks with diverse quality of service requirements. In cellular network evolution, the long term evolution advanced (LTE-A) networks has standardized Machine-to-Machine (M2M) features. Such M2M technology can provide a promising infrastructure for Internet of things (IoT) sensing applications, which usually require real-time data reporting. However, LTE-A is not designed for directly supporting such low-data-rate devices with optimized energy efficiency since it depends on core technologies of LTE that are originally designed for high-data-rate services. This paper investigate the maximum energy efficient data packets M2M transmission with uplink channels in LTE-A network. We formulate it into a jointed problem of Modulation and-Coding Scheme (MCS) assignment, resource allocation and power control, which can be expressed as a NP-hard mixed-integer linear fractional programming problem. Then we propose a global optimization scheme with Charnes-Cooper transformation and Glover linearization. The numerical experiment results show that with limited resource blocks, our algorithm can maintain low data packets dropping ratios while achieving optimal energy efficiency for a large number of M2M nodes, comparing with other typical counterparts.
Energy Efficient Resource Allocation in Small Cells with WiFi Unlicensed Bands Sharing
Lei Zhu, Haijun Zhang, Xuebin Li
Abstract: Unlicensed spectrum has long been considered a powerful candidate for addressing spectrum resource shortages. The emergence of small cells makes network coverage more seamless, switching, and a better user experience. This paper introduces small base station (SBS) to enable not only the information transmission on the WLAN unlicensed spectrum, but also the communication with connected terminals through the licensed spectrum. The energy efficiency (EE) in small cells with WiFi unlicensed band sharing is studied. We first build a two-layer network model containing small cells and macro cells. In particular, the subchannel allocation and power optimization problems are jointly studied using the alternative direction method of multipliers (ADMM)
algorithm. Then, to obtain an optimization scheme, a radio resource scheduling strategy is proposed, taking into account Quality of Service (QoS) requirements, maximum transmit power, and same layer interference. The effectiveness and optimal solution of the method are shown by simulation results.
Paper Session 4: Security and Privacy in Emerging 5G Applications
Session Chair: Xiaofei Wang
09:40-10:40, February 24, 2018
TME2R: Trust Management-based Energy Efficient Routing Scheme in Fog-assisted Industrial Wireless Sensor Network
Weidong Fang, Wuxiong Zhang, Wei Chen, Yang Liu Chaogang Tang
Abstract: Fog-assisted Industrial Wireless Sensor Network (F-IWSN) is a novel wireless sensor network (WSN) in the industry. It not only can more efficiently reduce information transmission latency, but also can more conducively achieve real-time control and rapid resource scheduling. However, similar to other distributed networks, it also faces enormous security challenges, especial-ly from internal attacks. The differences from those traditional security schemes are that, one is the trade-off between security, transmission performance and energy consumption to meet the requirements of information convergence and control, the other constructs a multi-dimensional selective forwarding scheme to achieve the real time transmission. In this paper, we propose a Gaussian distribution-based comprehensive trust management system (GDTMS) for F-IWSN. Furthermore, in its trust decision, the analytic hierarchy process is introduced to achieve the trade-off between security, transmission performance and energy consumption. The proposed trade-off can effectively select the secure and robust relay node. Namely, Trust Management-based Energy Efficient Routing Scheme (TME2R). In addition, GDTMS is also applicable to defending against bad mouthing attacks. Simulation results show that, the comprehensive performance of GDTMS is better than other similar algorithms, it can effective-ly prevent the appearance of network holes, and balance the network load, pro-mote the survivability of the network.
Security Risk Assessment for miniature Internet of thing systems with 5G
Wei Chen, Lei Wang, Fangming Bi, Chaogang Tang, Senyu Li
Abstract: In order to improve the traditional analytic hierarchy process method, information entropy and interval fuzzy number are introduced to AHP respectively on the weight of the hierarchy and the weight of the index. The effectiveness of the improved method is tested by a Simulation example which is based on risk assessment index system of miniature Internet of things system. Meanwhile, 5G as the fifth generation of mobile communication technology, will be widely used in entertainment, health care, education and autonomous driving. It will extend the capabilities of various applications on our personal devices and wearable devices will fill every corner of our lives by the application with miniature Internet of thing systems. At the same time,5G also faces the threat of information security risk, which is our paper concerned.
Improved Flow Awareness by Intelligent Collaborative Sampling in Software Defined Networks
Jun Deng, He Cai, Xiaofei Wang
Abstract: To improve the specific quality of service, internal network management and security analysis in the future mobile network, accurate flow-awareness in the global network through packet sampling has
been a viable solution. However, the current traffic measurement method with the five tuples cannot recognize the deep information of flows, and the Deep Packet Inspection (DPI) deployed at the gateways or access points is lack of traffic going through the internal nodes(e.g., base station, edge server). In this paper, by means of Deep Q-Network (DQN) and Software-Defined Networking (SDN) technique, we propose a flow-level sampling framework for edge devices in the Mobile Edge Computing (MEC) system. In the framework, an original learning-based sampling strategy considering the iterative in fluences of nodes is used for maximizing the long-term sampling accuracy of both mice and elephant flows. We present an approach to effectively collect traffic packets generated from base stations and edge servers in two steps: 1) adaptive node selection, and 2) dynamic sampling duration allocation by Deep Q-Learning. The results show that the approach can improve the sampling accuracy, especially for mice flows.