IEEE/CIC International Conference on Communications in China
7–9 August 2024 // Hangzhou, China
Ubiquitous Communications @ Future

Key Technologies of Low-Latency and High-Security Internet of Things

Time: 7th Aug 13:15-15:15

Location: Conf. Room 6/ Huanbi Hall

Keynote speech:

1. 13:15-13:30: Cell-free Radio Access Network: System Design and Experimental Performance Evaluation

Speaker: Prof. Dongming Wang, Southeast University, Nanjing, China

2.13:30-13:45: LPWAN: the state of artapplications and challenges

Speaker: Dr. Wenkun Wen, Guangzhou Techphant Corp. Ltd., Guangzhou, China

Presentations:

1. 13:45-13:55: Deployment Optimization of Multi-cell Multi-user System with Hard Core Poisson Point Distribution

Authors: Yuanxue Xin; Lin Ma; Jingyao Wang; Xin Wan; Wenqiang Zhao; Yue Ning; Yi Mao

2. 13:55-14:05: Super-Resolution Sparse Bayesian Learning-Based Channel Estimation in Bistatic Sensing

Authors: Longyuan Sun; Qingji Jiang; Xiangyang Wang; Dongming Wang

3. 14:05-14:15: Achieving Improved Security in UAV-Assisted Covert Communication Networks

Authors: Xinying Chen; Zheng Chang; Timo Hämäläinen

4. 14:15-14:25: Adaptive Sampling for Real-Time Status Update Systems under Non-Stationary Delay Statistics

Authors: Yifan Gu; Zhi Quan

5. 14:25-14:35: Collaborative Optimization for Resource-constrained Federated Learning in Large-scale IoT Networks

Authors: Haihui Xie; Shuwu Chen; Teng Sun; Junhui Zhao; Minghua Xia

6. 14:35-14:45: Cross-Slot User Scheduling Strategy for Fast Uplink Grant over Cell-Free Networks

Authors: Jie Wang; Yihang Chen; Feng Ye; Jiamin Li; Pengcheng Zhu; Dongming Wang; Bin Sheng

7. 14:45-14:55: Optimizing the Consensus Algorithm of Blockchain in the Internet of Vehicles

Authors: Fanwei Huang; Yingxuan Guo; Longxia Liao; Junhui Zhao

8. 14:55-15:05: Reinforcement Learning based Edge Offloading Strategy for Port Infrastructure States Monitoring

Authors: Jingzhe Wang; Qingqing Pan; Ziqi Liu; Yunlong Lu; songgui CHEN; Zhufang Kuang; Siyu Lin

9. 15:05-15:15: Securing Crowdsourced Localization to Resist Attack Based on Service Security Value Assessment

Authors: Guanghui Wang; Lingyun Li; Lingfeng Shen; He Wei

Posters:

1. UAV-based Coverage Hole Detection and Recovery For Large-scale IoT Networks

Authors: Xiao Fan; Peiran Wu; Teng Sun; Junhui Zhao; Minghua Xia

2. Hierarchical Network Slicing Resource Allocation for ISAC Vehicular Networks

Authors: Youyang Li; Fajin Hu; Yuyu Liu; Junhui Zhao

3. Multi-agent Reinforcement Learning Connectivity Optimization Algorithm in Vehicular Networks

Authors: Jingyan Chen; Xincheng Xiong; Xuehui Guan; Qingmiao Zhang; Minghua Xia; Junhui Zhao

Patrons

Organizer

Co-Organizers