IEEE/ACM International Symposium on Quality of Service (IWQoS) 2021
Enhancing Scalability and Liquidation in QoS Lightning Networks
Enhancing Scalability and Liquidation in QoS Lightning Networks
Jie Wu (Temple Univsitery, USA)
Biography: Jie Wu is the Director of the Center for Networked Computing and Laura H. Carnell professor at Temple University. He also serves as the Director of International Affairs at College of Science and Technology. He served as Chair of Department of Computer and Information Sciences and Associate Vice Provost for International Affairs. Prior to joining Temple University, he was a program director at the National Science Foundation and was a distinguished professor at Florida Atlantic University. His current research interests include mobile computing and wireless networks, routing protocols, cloud and green computing, network trust and security, and social network applications. Dr. Wu regularly publishes in scholarly journals, conference proceedings, and books. He serves on several editorial boards, including IEEE Transactions on Mobile Computing and IEEE Transactions on Service Computing. Dr. Wu was general co-chair for IEEE MASS 2006, IEEE IPDPS 2008, IEEE ICDCS 2013, ACM MobiHoc 2014, ICPP 2016, IEEE CNS 2016, WiOpt 2021, and ICDCN 2022 as well as program cochair for IEEE INFOCOM 2011, CCF CNCC 2013, and ICCCN 2020. He was an IEEE Computer Society Distinguished Visitor, ACM Distinguished Speaker, and chair for the IEEE Technical Committee on Distributed Processing (TCDP). He was also the recipient of the 2011 China Computer Federation (CCF) Overseas Outstanding Achievement Award. Dr. Wu is a Fellow of the AAAS and a Fellow of the IEEE.
Wenjing Lou, Virginia Tech., USA
Cloud & Storage
Towards Private Similarity Query based Healthcare Monitoring over Digital Twin Cloud Platform
Yandong Zheng, Rongxing Lu, Yunguo Guan and Songnian Zhang (University of New Brunswick, Canada); Jun Shao (Zhejiang Gongshang University, China)
Secure Outsourced Top-$k$ Selection Queries against Untrusted Cloud Service Providers
Xixun Yu (Xidian University, China & University of Delaware, USA); Yidan Hu and Rui Zhang (University of Delaware, USA); Zheng Yan (Xidian University & Aalto University, China); Yanchao Zhang (Arizona State University, USA)
EC-Scheduler: A Load-Balanced Scheduler to Accelerate the Straggler Recovery for Erasure Coded Storage Systems
Xinzhe Cao, Gen Yang, Yunfei Gu and Chentao Wu (Shanghai Jiao Tong University, China); Jie Li (Shanghai Jiaotong University, China); Guangtao Xue and Minyi Guo (Shanghai Jiao Tong University, China); Yuanyuan Dong and Yafei Zhao (Alibaba Group, China)
To address the above problem, we propose a dynamic load-balanced scheduling algorithm for straggler recovery called EC-Scheduler. EC-Scheduler adjusts the recovery schedule dynamically with the awareness of continuous load fluctuation on the nodes, guaranteeing high parallelism and load balance ability simultaneously. To demonstrate the effectiveness of EC-Scheduler, we conduct several experiments in a cluster. The results show that, compared to typical recovery schemes such as Fast-PR and EC-Store, EC-Scheduler could achieve a 1.3X speed-up in the recovery process and 10X improvement in recovery load imbalance factor.
A Proactive Failure Tolerant Mechanism for SSDs Storage Systems based on Unsupervised Learning
Hao Zhou, Zhiheng Niu, Gang Wang and Xiaoguang Liu (Nankai University, China); Dongshi Liu, Bingnan Kang, Hu Zheng and Yong Zhang (Huawei, China)
In this paper, we propose a proactive failure tolerance mechanism for SSDs storage systems based on unsupervised technology. It only uses data of normal SSDs to train the failure prediction model, which means that our method is not limited by the imbalance in SSDs data. At the core of our method is the idea to use VAE-LSTM to learn the pattern of normal SSDs, in which case faulty SSDs can be alerted when their patterns are very different from normal ones. Our method can provide early warning of failures, thereby effectively protecting data and improving the quality of cloud storage service. We also propose a drive failure cause location mechanism, which can help operators analyze the modes of failure by providing guiding suggestions. In order to evaluate the effectiveness of our method, we use cross-validation and online testing methods on SSDs data from a technology company. The results show that the FDR and FAR of our method outperform the baselines by 17.25% and 2.39% on average.
Claudio Righetti, Telecom Argentina, Argentina
MoDEMS: Optimizing Edge Computing Migrations for User Mobility
Taejin Kim (Carnegie Mellon University, USA); Siqi Chen (University of Colorado Boulder, USA); Youngbin Im (Ulsan National Institute of Science and Technology, Korea (South)); Xiaoxi Zhang (Sun Yat-sen University, China); Sangtae Ha (University of Colorado Boulder, USA); Carlee Joe-Wong (Carnegie Mellon University, USA)
High-QoE DASH live streaming using reinforcement learning
Bo Wei (Waseda University, Japan); Hang Song (The University of Tokyo, Japan); Jiro Katto (Waseda University, Japan)
Joint Optimization of Multi-user Computing Offloading and Service Caching in Mobile Edge Computing
Zhang Zhenyu and Huan Zhou (China Three Gorges University, China); Dawei Li (Montclair State University, USA)
Adaptive Search Area Configuration for Location-based P2P Networks
Hiroki Hanawa, Takumi Miyoshi, Taku Yamazaki and Thomas Silverston (Shibaura Institute of Technology, Japan)
Yuki Koizumi, Osaka University, Japan
Edge Computing Meets Mission-critical Industrial Applications
Edge Computing Meets Mission-critical Industrial Applications
Albert Y. Zomaya (University of Sydney, Australia)
Biography: Albert Y. Zomaya is Chair Professor of High-Performance Computing & Networking in the School of Computer Science and Director of the Centre for Distributed and High-Performance Computing at the University of Sydney. To date, he has published > 600 scientific papers and articles and is (co-)author/editor of >30 books. A sought-after speaker, he has delivered >250 keynote addresses, invited seminars, and media briefings. His research interests span several areas in parallel and distributed computing and complex systems. He is currently the Editor in Chief of the ACM Computing Surveys and served in the past as Editor in Chief of the IEEE Transactions on Computers (2010-2014) and the IEEE Transactions on Sustainable Computing (2016-2020). Professor Zomaya is a decorated scholar with numerous accolades including Fellowship of the IEEE, the American Association for the Advancement of Science, and the Institution of Engineering and Technology (UK). Also, he is an Elected Fellow of the Royal Society of New South Wales and an Elected Foreign Member of Academia Europaea. He is the recipient of the1997 Edgeworth David Medal from the Royal Society of New South Wales for outstanding contributions to Australian Science, the IEEE Technical Committee on Parallel Processing Outstanding Service Award (2011), IEEE Technical Committee on Scalable Computing Medal for Excellence in Scalable Computing (2011), IEEE Computer Society Technical Achievement Award (2014), ACM MSWIM Reginald A. Fessenden Award (2017), and the New South Wales Premier’s Prize of Excellence in Engineering and Information and Communications Technology (2019).
Jiannong Cao, The Hong Kong Polytechnic University, Hongkong
System & Memory
Supporting Flow-Cardinality Queries with O(1) Time Complexity in High-speed Networks
Qingjun Xiao (SouthEast University of China, China); Xiongqin Hu (Southeast University, China); Shigang Chen (University of Florida, USA)
Practical Root Cause Localization for Microservice Systems via Trace Analysis
Zeyan Li (Tsinghua University, China); Junjie Chen (Tianjin University, China); Rui Jiao and Nengwen Zhao (Tsinghua University, China); Zhijun Wang, Shuwei Zhang, Yanjun Wu, Long Jiang and Leiqin Yan (China Minsheng Bank, China); Zikai Wang (Bizseer, China); Zhekang Chen (BizSeer, China); Wenchi Zhang (Bizseer Technology Co., Ltd., China); Xiaohui Nie (Tsinghua University, China); Kaixin Sui (Bizseer Technology Co., Ltd., China); Dan Pei (Tsinghua University, China)
Load Balancing in Heterogeneous Server Clusters: Insights From a Product-Form Queueing Model
Mark van der Boor and Céline Comte (Eindhoven University of Technology, The Netherlands)
AIR: An AI-based TCAM Entry Replacement Scheme for Routers
Yuchao Zhang and Peizhuang Cong (Beijing University of Posts and Telecommunications, China); Bin Liu (Tsinghua University, China); Wendong Wang (Beijing University of Posts and Telecommunications, China); Ke Xu (Tsinghua University, China)
Jun Li, City University of New York, USA
Traffic Analytics & Engineering
Byte-Label Joint Attention Learning for Packet-grained Network Traffic Classification
Kelong Mao (Tsinghua University, China); Xi Xiao (Graduate School at Shenzhen, Tsinghua University, China); Guangwu Hu (Shenzhen Institute of Information Technology, China); Xiapu Luo (The Hong Kong Polytechnic University, Hong Kong); Bin Zhang (Peng Cheng Laboratory, China); Shutao Xia (Tsinghua University, China)
In this paper, we devise a new method, called BLJAN, to jointly learn from byte sequence and labels for packet-grained traffic classification. BLJAN embeds the packet's bytes and all labels into a joint embedding space to capture their implicit correlations with a dual attention mechanism. It finally builds a more powerful packet representation with an enhancement from label embeddings to achieve high classification accuracy and interpretability. Extensive experiments on two benchmark traffic classification tasks, including application identification and traffic characterization, with three real-world datasets, demonstrate that BLJAN can achieve high performance (96.2%, 96.7%, and 99.7% Macro F1-scores on three datasets) for packet-grained traffic classification, outperforming six representative state-of-the-art baselines in terms of both accuracy and detection speed.
DarkTE: Towards Dark Traffic Engineering in Data Center Networks with Ensemble Learning
Renhai Xu (Tianjin University, China); Wenxin Li (Hong Kong University of Science and Technology); Keqiu Li and Xiaobo Zhou (Tianjin University, China); Heng Qi (Dalian University of Technology, China)
BCAC: Batch Classifier based on Agglomerative Clustering for traffic classification in a backbone network
Hua Wu, Xiying Chen, Guang Cheng, Xiaoyan Hu and Youqiong Zhuang (Southeast University, China)
Efficient Fine-Grained Website Fingerprinting via Encrypted Traffic Analysis with Deep Learning
Meng Shen, Zhenbo Gao and Liehuang Zhu (Beijing Institute of Technology, China); Ke Xu (Tsinghua University, China)
In this paper, we propose BurNet, a fine-grained WF method using Convolutional Neural Networks (CNNs). To extract differences of similar webpages, we propose a new concept named unidirectional burst, which is a sequence of packets corresponding to a piece of HTTP message. BurNet takes as input unidirectional burst sequences, instead of bidirectional packet sequences, which makes it applicable to different attack scenarios. BurNet employs CNNs to build a powerful classifier, where sophisticated architecture is designed to improve classification accuracy while reducing time complexity in training. We collect real-world datasets from three well-known websites and conduct extensive experiments to evaluate the performance of BurNet. The closed-world evaluation results show that BurNet outperforms the stateof-the-art methods in both attack scenarios. In the more realistic open-world setting, BurNet can achieve 0.99 precision and 0.99 recall. BurNet is also superior to its CNN-based counterparts in terms of training efficiency.
Kui Wu, University of Victoria, Canada
Privacy-Preserving Optimal Recovering for the Nearly Exhausted Payment Channels
Minze Xu, Yuan Zhang, Fengyuan Xu and Sheng Zhong (Nanjing University, China)
In this paper, we propose OPRE, a protocol for OPtimal off-chain REcovering of payment channels, to solve this problem. It is optimal in that it recovers the maximum number of nearly exhausted channels in the PCN. Furthermore, we consider users' privacy concerns and design a privacy-preserving version of this protocol, so that users' balance information does not need to be revealed. This protocol maintains optimality in recovering payment channels while providing cryptographically strong privacy guarantee. In addition to the theoretical design and analysis, we also implement OPRE and experimentally evaluate its performance. The results show that the OPRE protocol is both efficient and effective.
Privacy-Preserving Approximate Top-k Nearest Keyword Queries over Encrypted Graphs
Meng Shen and Minghui Wang (Beijing Institute of Technology, China); Ke Xu (Tsinghua University, China); Liehuang Zhu (Beijing Institute of Technology, China)
In this paper, we propose a new graph encryption scheme Aton, which enables efficient and privacy-preserving k-NK querying. Based on the symmetric-key encryption and particular pseudo-random functions, we construct a secure k-NK query index. Aton is built on a ciphertext sum comparison scheme which can achieve approximate distance comparison with high accuracy. Rigorous security analysis proves that it is CQA-2 secure. Experiments with real-world datasets demonstrate that it can efficiently answer k-NK queries with more accurate results compared with the state-of-the-art.
A Behavior Privacy Preserving Method towards RF Sensing
Jianwei Liu (Zhejiang University & Xi'an Jiaotong University, China); Chaowei Xiao (University of Michigan, ann arbor, USA); Kaiyan Cui (Xi'an Jiaotong University & The Hong Kong Polytechnic University, China); Jinsong Han (Zhejiang University & School of Cyber Science and Technology, China); Xian Xu and Kui Ren (Zhejiang University, China); Xufei Mao (Dongguan University of Tech, China)
In this paper, we propose a privacy-preserving deep neural network named BPCloak to erase the behavior information in RF signals while retaining the ability of user authentication. We conduct extensive experiments over mainstream RF signals collected from three real wireless systems, including the WiFi, Radio Frequency IDentification (RFID), and millimeter-wave (mmWave) systems. The experimental results show that BPCloak significantly reduces the behavior recognition accuracy, i.e., 85%+, 75%+, and 65%+ reduction for WiFi, RFID, and mmWave systems respectively, merely with a slight penalty of accuracy decrease when using these three systems for user authentication, i.e., 1%-, 3%-, and 5%-, respectively.
Differential Privacy-Preserving User Linkage across Online Social Networks
Xin Yao (Central South University & Arizona State University, China); Rui Zhang (University of Delaware, USA); Yanchao Zhang (Arizona State University, USA)
Shui Yu, University of Technology Sydney, Australia
Can Online Learning Increase the Reliability of Extreme Mobility Management?
Yuanjie Li (Tsinghua University, China); Esha Datta (University of California, Davis, USA); Jiaxin Ding (Shanghai Jiao Tong University, China); Ness B. Shroff (The Ohio State University, USA); Xin Liu (University of California Davis, USA)
In this paper, we formulate the exploration-exploitation tradeoff in extreme mobility as a composition of two online learning problems. Then we present BaTT, a multi-armed bandit-based online learning solution for both problems. BaTT uses ɛ-binary-search to optimize the threshold of a serving cell's signal strength to initiate the handover with a provable O(log J log T ) regret. We also devise an opportunistic Thompson sampling algorithm to optimize the sequence of target cells measured for reliable handovers. BaTT can be readily implemented using the recent Open Radio Access Network (O-RAN) framework in operational 4G LTE and 5G NR. Our analysis and empirical evaluations over a dataset from operational LTE networks on the Chinese high-speed rails show a 29.1% handover failure reduction at the speed of 200-350 km/h.
SuperClass: A Deep Duo-Task Learning Approach to Improving QoS in Image-driven Smart Urban Sensing Applications
Yang Zhang, Ruohan Zong, Lanyu Shang, Md Tahmid Rashid and Dong Wang (University of Notre Dame, USA)
SeqAD: An Unsupervised and Sequential Autoencoder Ensembles based Anomaly Detection Framework for KPI
Na Zhao, Biao Han and Yang Cai (National University of Defense Technology, China); Jinshu Su (National University of Defence Technology, China)
DeepDelivery: Leveraging Deep Reinforcement Learning for Adaptive IoT Service Delivery
Yan Li, Deke Guo and Xiaofeng Cao (National University of Defense Technology, China); Feng Lyu (Central South University, China); Honghui Chen (National University of Defense Technology, China)
LCL: Light Contactless Low-delay Load Monitoring via Compressive Attentional Multi-label Learning
Xiaoyu Wang, Hao Zhou, Nikolaos M. Freris and Wangqiu Zhou (University of Science and Technology of China, China); Xing Guo (Anhui University, China); Zhi Liu (The University of Electro-Communications, Japan); Yusheng Ji (National Institute of Informatics, Japan); Xiang-Yang Li (University of Science and Technology of China, China)
Inspired by observations of discriminative yet redundant current waveform and model sparsity, we propose LCL, a light-weight, contactless, plug-and-play solution for real-time load monitoring. The filtering module skips over unchanged input and compresses the measurements of interest using Compressed Sensing. The reconstruction-free inference module runs an attentional multi-label classification and returns all functioning appliance states directly from the compressed input. The compression module leverages model sparsity for real-time processing on edge devices. Evaluations based on our prototype deployed in real-life scenarios attest to the high QoS of LCL with a subset accuracy of 94.2% and a delay reduction of 52.2%. Our solution further filters out 96.8% of the redundant input and attains a Measurement Rate of 0.1 without noticeable impact on the performance.
GreenTE.ai: Power-Aware Traffic Engineering via Deep Reinforcement Learning
Tian Pan (Beijing University of Posts and Telecommunications, China); Xiaoyu Peng (BUPT, China); Qianqian Shi (Beijing University of Posts and Telecommunications, China); Zizheng Bian (BUPT, China); Xingchen Lin and Enge Song (Beijing University of Posts and Telecommunications, China); Fuliang Li (Northeastern University, China); Yang Xu (Fudan University, China); Tao Huang (Beijing University of Posts and Telecommunications, China)
Yanjiao Chen, Zhejiang University, China