{"id":344,"date":"2024-08-12T12:00:37","date_gmt":"2024-08-12T04:00:37","guid":{"rendered":"https:\/\/www.ndnlab.com\/?p=344"},"modified":"2024-08-12T12:00:39","modified_gmt":"2024-08-12T04:00:39","slug":"2024%e5%8c%ba%e5%9d%97%e9%93%be%e3%80%81web3-0-%e8%ae%ba%e6%96%87%e8%b5%84%e8%ae%afccf-a-infocom","status":"publish","type":"post","link":"https:\/\/www.ndnlab.com\/?p=344","title":{"rendered":"2024\u533a\u5757\u94fe\u3001web3.0 \u8bba\u6587\u8d44\u8bafCCF A\u2014INFOCOM"},"content":{"rendered":"\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/www.ienlab.com\/wp-content\/uploads\/2024\/08\/image-4.png\"  class=\"wp-image-562\" title=\"2024\u533a\u5757\u94fe\u3001web3.0 \u8bba\u6587\u8d44\u8bafCCF A\u2014INFOCOM\u63d2\u56fe\" alt=\"2024\u533a\u5757\u94fe\u3001web3.0 \u8bba\u6587\u8d44\u8bafCCF A\u2014INFOCOM\u63d2\u56fe\" \/><\/figure>\n\n\n\n<p><strong>Conference<\/strong>\uff1aIEEE International Conference on Computer Communications<br>CCF level\uff1aCCF A<br>Categories\uff1aComputer Network Field<br>Conference time\uff1a2024<br>number\uff1a17<\/p>\n\n\n\n<p>A Generic Blockchain-based Steganography Framework with High Capacity via Reversible GAN<br>\u57fa\u4e8e\u533a\u5757\u94fe\u7684\u901a\u7528\u9690\u5199\u6846\u67b6\uff0c\u901a\u8fc7\u53ef\u9006GAN\u5b9e\u73b0\u9ad8\u5bb9\u91cf<br>Zhuo Chen, Liehuang Zhu and Peng Jiang (Beijing Institute of Technology, China); Jialing He (Chongqing University, China); Zijian Zhang (Beijing Institute of Technology, China)<\/p>\n\n\n\n<p>A Semi-Asynchronous Decentralized Federated Learning Framework via Tree-Graph Blockchain<br>\u57fa\u4e8e\u6811\u56fe\u533a\u5757\u94fe\u7684\u534a\u5f02\u6b65\u53bb\u4e2d\u5fc3\u5316\u8054\u5408\u5b66\u4e60\u6846\u67b6<br>Cheng Zhang, Yang Xu and Xiaowei Wu (Hunan University, China); En Wang (Jilin University, China); Hongbo Jiang (Hunan University, China); Yaoxue Zhang (Tsinghua University, China)<\/p>\n\n\n\n<p>Account Migration across Blockchain Shards using Fine-tuned Lock Mechanism<br>\u4f7f\u7528\u5fae\u8c03\u9501\u673a\u5236\u8de8\u533a\u5757\u94fe\u788e\u7247\u8fdb\u884c\u5e10\u6237\u8fc1\u79fb<br>Huawei Huang, Yue Lin and Zibin Zheng (Sun Yat-Sen University, China)<\/p>\n\n\n\n<p>Broker2Earn: Towards Maximizing Broker Revenue and System Liquidity for Sharded Blockchains<br>Broker2Earn\uff1a\u5b9e\u73b0\u788e\u7247\u5316\u533a\u5757\u94fe\u7684\u7ecf\u7eaa\u4eba\u6536\u5165\u548c\u7cfb\u7edf\u6d41\u52a8\u6027\u6700\u5927\u5316<br>Qinde Chen, Huawei Huang and Zhaokang Yin (Sun Yat-Sen University, China); Guang Ye (Sen Yat-Sen University, China); Qinglin Yang (Sun Yat-Sen University, China)<\/p>\n\n\n\n<p>FileDES: A Secure Scalable and Succinct Blockchain-based Decentralized Encrypted Storage Network<br>FileDES\uff1a\u4e00\u4e2a\u5b89\u5168\u3001\u53ef\u6269\u5c55\u3001\u7b80\u6d01\u7684\u57fa\u4e8e\u533a\u5757\u94fe\u7684\u53bb\u4e2d\u5fc3\u5316\u52a0\u5bc6\u5b58\u50a8\u7f51\u7edc<br>Minghui Xu (Shandong University, China); JiaHao Zhang (ShanDong University, China); Hechuan Guo, Xiuzhen Cheng and Dongxiao Yu (Shandong University, China); Qin Hu (IUPUI, USA); Yijun Li and Yipu Wu (BaishanCloud, China)<\/p>\n\n\n\n<p>Federated Analytics-Empowered Frequent Pattern Mining for Decentralized Web 3.0 Applications<br>\u8054\u90a6\u5206\u6790\u4e3a\u53bb\u4e2d\u5fc3\u5316Web 3.0\u5e94\u7528\u7a0b\u5e8f\u63d0\u4f9b\u4e86\u9891\u7e41\u6a21\u5f0f\u6316\u6398\u529f\u80fd<br>Zibo Wang and Yifei Zhu (Shanghai Jiao Tong University, China); Dan Wang (The Hong Kong Polytechnic University, Hong Kong); Zhu Han (University of Houston, USA)<\/p>\n\n\n\n<p>Optimization for the Metaverse over Mobile Edge Computing with Play to Earn<br>\u901a\u8fc7Play to Earn\u4f18\u5316\u79fb\u52a8\u8fb9\u7f18\u8ba1\u7b97\u4e0a\u7684Metaverse<br>Chang Liu, Terence Jie Chua and Jun Zhao (Nanyang Technological University, Singapore)<\/p>\n\n\n\n<p>Scheduling Stochastic Traffic With End-to-End Deadlines in Multi-hop Wireless Networks<br>\u591a\u8df3\u65e0\u7ebf\u7f51\u7edc\u4e2d\u5177\u6709\u7aef\u5230\u7aef\u622a\u6b62\u65f6\u95f4\u7684\u968f\u673a\u6d41\u91cf\u8c03\u5ea6<br>Christos Tsanikidis and Javad Ghaderi (Columbia University, USA)<\/p>\n\n\n\n<p>Sharon: Secure and Efficient Cross-shard Transaction Processing via Shard Rotation<br>Sharon\uff1a\u901a\u8fc7\u5206\u7247\u8f6e\u6362\u5b9e\u73b0\u5b89\u5168\u9ad8\u6548\u7684\u8de8\u5206\u7247\u4e8b\u52a1\u5904\u7406<br>Shan Jiang (The Hong Kong Polytechnic University, Hong Kong); Jiannong Cao (Hong Kong Polytechnic Univ, Hong Kong); Cheung Leong Tung and Yuqin Wang (The Hong Kong Polytechnic University, China); Shan Wang (The Hong Kong Polytechnic University &amp; Southeast University, China)<\/p>\n\n\n\n<p>Reinforcement Learning-based Congestion Control: A Systematic Evaluation of Fairness, Efficiency and Responsiveness<br>\u57fa\u4e8e\u5f3a\u5316\u5b66\u4e60\u7684\u62e5\u585e\u63a7\u5236\uff1a\u516c\u5e73\u6027\u3001\u6548\u7387\u548c\u54cd\u5e94\u6027\u7684\u7cfb\u7edf\u8bc4\u4f30<br>Luca Giacomoni and George Parisis (University of Sussex, United Kingdom (Great Britain))<\/p>\n\n\n\n<p>SKYCASTLE: Taming LEO Mobility to Facilitate Seamless and Low-latency Satellite Internet Services<br>\u5929\u7a7a\u57ce\u5821\uff1a\u9a6f\u670d\u4f4e\u5730\u7403\u8f68\u9053\u79fb\u52a8\u6027\uff0c\u4fc3\u8fdb\u65e0\u7f1d\u548c\u4f4e\u5ef6\u8fdf\u7684\u536b\u661f\u4e92\u8054\u7f51\u670d\u52a1<br>Jihao Li, Hewu Li, Zeqi Lai, Qian Wu and Weisen Liu (Tsinghua University, China); Xiaomo Wang (China Academy of Electronics and Information Technology, China); Yuanjie Li and Jun Liu (Tsinghua University, China); Qi Zhang (Zhongguancun Laboratory, China)<\/p>\n\n\n\n<p>SPIDER: A Semi-Supervised Continual Learning-based Network Intrusion Detection System<br>SPIDER\uff1a\u4e00\u79cd\u57fa\u4e8e\u534a\u76d1\u7763\u8fde\u7eed\u5b66\u4e60\u7684\u7f51\u7edc\u5165\u4fb5\u68c0\u6d4b\u7cfb\u7edf<br>Suresh Kumar Amalapuram and Sumohana Channappayya (Indian Institute of Technology Hyderabad, India); Bheemarjuna Reddy Tamma (IIT Hyderabad, India)<\/p>\n\n\n\n<p>SpreadFGL: Edge-Client Collaborative Federated Graph Learning with Adaptive Neighbor Generation<br>SpreadFGL\uff1a\u5177\u6709\u81ea\u9002\u5e94\u90bb\u5c45\u751f\u6210\u7684\u8fb9\u7f18\u5ba2\u6237\u7aef\u534f\u4f5c\u8054\u90a6\u56fe\u5b66\u4e60<br>Luying Zhong, Yueyang Pi and Zheyi Chen (Fuzhou University, China); Zhengxin Yu (Lancaster University, United Kingdom (Great Britain)); Wang Miao (University of Plymouth, United Kingdom (Great Britain)); Xing Chen (Fuzhou University, China); Geyong Min (University of Exeter, United Kingdom (Great Britain))<\/p>\n\n\n\n<p>Strategic Data Revocation in Federated Unlearning<br>\u8054\u90a6\u53d6\u6d88\u5b66\u4e60\u4e2d\u7684\u6218\u7565\u6570\u636e\u64a4\u9500<br>Ningning Ding, Ermin Wei and Randall A Berry (Northwestern University, USA)<\/p>\n\n\n\n<p>T-PRIME: Transformer-based Protocol Identification for Machine-learning at the Edge<br>T-PRIME\uff1a\u57fa\u4e8e\u53d8\u538b\u5668\u7684\u8fb9\u7f18\u673a\u5668\u5b66\u4e60\u534f\u8bae\u8bc6\u522b<br>Mauro Belgiovine, Joshua B Groen, Miquel Sirera, Chinenye M Tassie, Sage Trudeau, Stratis Ioannidis and Kaushik Chowdhury (Northeastern University, USA)<\/p>\n\n\n\n<p>The Reinforcement Cuckoo Filter<br>\u5e03\u8c37\u9e1f\u5f3a\u5316\u8fc7\u6ee4\u5668<br>\nMeng Li and Wenqi Luo (Nanjing University, China); Haipeng Dai (Nanjing University, China &amp; State Key Laboratory for Novel Software Technology, China); Huayi Chai (University of Nanjing, China); Rong Gu (Nanjing University, China); Xiaoyu Wang (Soochow University, China); Guihai Chen (Shanghai Jiao Tong University, China)<\/p>\n\n\n\n<p>Thor: A Virtual Payment Channel Network Construction Protocol over Cryptocurrencies<br>Thor\uff1a\u4e00\u79cd\u57fa\u4e8e\u52a0\u5bc6\u8d27\u5e01\u7684\u865a\u62df\u652f\u4ed8\u6e20\u9053\u7f51\u7edc\u6784\u5efa\u534f\u8bae<br>Qiushi Wei and Dejun Yang (Colorado School of Mines, USA); Ruozhou Yu (North Carolina State University, USA); Guoliang Xue (Arizona State University, USA)<\/p>\n\n\n\n<p>Titanic: Towards Production Federated Learning with Large Language Models<br>\u6cf0\u5766\u5c3c\u514b\u53f7\uff1a\u7528\u5927\u578b\u8bed\u8a00\u6a21\u578b\u5b9e\u73b0\u751f\u4ea7\u8054\u5408\u5b66\u4e60<br>Ningxin Su, Chenghao Hu and Baochun Li (University of Toronto, Canada); Bo Li (Hong Kong University of Science and Technology, Hong Kong)<\/p>\n\n\n\n<p>Tolerating Disasters with Hierarchical Consensus<br>\u7528\u5c42\u6b21\u5171\u8bc6\u5bb9\u5fcd\u707e\u96be<br>Wassim Yahyaoui (University of Luxembourg &amp; SnTInterdisciplinary Centre for Security, Reliability and Trust (SnT), Luxembourg); Jeremie Decouchant (Delft University of Technology, The Netherlands); Marcus V\u00f6lp (University of Luxembourg, Luxembourg); Joachim Bruneau-Queyreix (Bordeaux-INP, France)<\/p>\n\n\n\n<p>Towards Efficient Asynchronous Federated Learning in Heterogeneous Edge Environments<br>\u5f02\u6784\u8fb9\u7f18\u73af\u5883\u4e2d\u9ad8\u6548\u5f02\u6b65\u8054\u5408\u5b66\u4e60\u7684\u5b9e\u73b0<br>Yajie Zhou (Zhejiang University, China); Xiaoyi Pang (Wuhan University, China); Zhibo Wang and Jiahui Hu (Zhejiang University, China); Peng Sun (Hunan University, China); Kui Ren (Zhejiang University, China)<\/p>\n\n\n\n<p>TransformLoc: Transforming MAVs into Mobile Localization Infrastructures in Heterogeneous Swarms<br>TransformLoc\uff1a\u5c06MAV\u8f6c\u6362\u4e3a\u5f02\u6784\u96c6\u7fa4\u4e2d\u7684\u79fb\u52a8\u5b9a\u4f4d\u57fa\u7840\u8bbe\u65bd<br>Haoyang Wang, Jingao Xu and Chenyu Zhao (Tsinghua University, China); Zihong Lu (Harbin Institute of Technology, China); Yuhan Cheng, Xuecheng Chen, Xiao-Ping Zhang, Yunhao Liu and Xinlei Chen (Tsinghua University, China)<\/p>\n\n\n\n<p>vCrypto: a Unified Para-Virtualization Framework for Heterogeneous Cryptographic Resources<br>vCrypto\uff1a\u5f02\u6784\u52a0\u5bc6\u8d44\u6e90\u7684\u7edf\u4e00\u51c6\u865a\u62df\u5316\u6846\u67b6<br>Shuo Shi (Shanghai Jiao Tong University, China); Chao Zhang (Alibaba Group, China); Zongpu Zhang and Hubin Zhang (Shanghai Jiao Tong University, China); Xin Zeng and Weigang Li (Intel, China); Junyuan Wang (Intel Asia-Pacific Research &amp; Development Ltd., China); Xiantao Zhang and Yibin Shen (Alibaba Group, China); Jian Li and Haibing Guan (Shanghai Jiao Tong University, China)<\/p>\n\n\n\n<p>VisFlow: Adaptive Content-Aware Video Analytics on Collaborative Cameras<br>VisFlow\uff1a\u534f\u4f5c\u76f8\u673a\u4e0a\u7684\u81ea\u9002\u5e94\u5185\u5bb9\u611f\u77e5\u89c6\u9891\u5206\u6790<br>Yuting Yan, Sheng Zhang, Xiaokun Wang, Ning Chen and Yu Chen (Nanjing University, China); Yu Liang (Nanjing Normal University, China); Mingjun Xiao (University of Science and Technology of China, China); Sanglu Lu (Nanjing University, China)<\/p>\n\n\n\n<p>Your Mega-Constellations Can be Slim: A Cost-Effective Approach for Constructing Survivable and Performant LEO Satellite Networks<br>\u4f60\u7684\u5de8\u578b\u661f\u5ea7\u53ef\u4ee5\u5f88\u5c0f\uff1a\u4e00\u79cd\u6784\u5efa\u53ef\u751f\u5b58\u548c\u9ad8\u6027\u80fd\u4f4e\u5730\u7403\u8f68\u9053\u536b\u661f\u7f51\u7edc\u7684\u6210\u672c\u6548\u76ca\u65b9\u6cd5<br>Zeqi Lai, Yibo Wang, Hewu Li and Qian Wu (Tsinghua University, China); Qi Zhang (Zhongguancun Laboratory, China); Yunan Hou (Beijing Forestry University, China); Jun Liu and Yuanjie Li (Tsinghua University, China)<\/p>\n\n\n\n<p>ZETA: Transparent Zero-Trust Security Add-on for RDMA<br>ZETA:RDMA\u7684\u900f\u660e\u96f6\u4fe1\u4efb\u5b89\u5168\u63d2\u4ef6<br>Hyunseok Chang and Sarit Mukherjee (Nokia Bell Labs, USA)<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>\u8be6\u60c5\uff1ahttps:\/\/infocom2024.ieee-infocom.org\/program\/accepted-paper-list-main-conference<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Conference\uff1aIEEE International Conference on Computer CommunicationsCCF level\uff1aCCF ACategories\uff1aComputer Network FieldConference time\uff1a2024number\uff1a17 A Generic Blockchain-based Steganography Framework with High Capacity via Reversible GAN\u57fa\u4e8e\u533a\u5757\u94fe\u7684\u901a &hellip; <a href=\"https:\/\/www.ndnlab.com\/?p=344\">\u7ee7\u7eed\u9605\u8bfb <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[18,4,6],"tags":[],"class_list":["post-344","post","type-post","status-publish","format-standard","hentry","category-web3-0","category-blockchain","category-weilaiwangluo"],"_links":{"self":[{"href":"https:\/\/www.ndnlab.com\/index.php?rest_route=\/wp\/v2\/posts\/344","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ndnlab.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.ndnlab.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.ndnlab.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ndnlab.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=344"}],"version-history":[{"count":1,"href":"https:\/\/www.ndnlab.com\/index.php?rest_route=\/wp\/v2\/posts\/344\/revisions"}],"predecessor-version":[{"id":345,"href":"https:\/\/www.ndnlab.com\/index.php?rest_route=\/wp\/v2\/posts\/344\/revisions\/345"}],"wp:attachment":[{"href":"https:\/\/www.ndnlab.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=344"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ndnlab.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=344"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ndnlab.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=344"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}