Paper Digest: MOBICOM 2018 Highlights
International Conference on Mobile Computing and Networking (MobiCom) is one of the top conferences on mobile computing and wireless and mobile networking.
To help the community quickly catch up on the work presented in this conference, Paper Digest Team processed all accepted papers, and generated one highlight sentence (typically the main topic) for each paper. Readers are encouraged to read these machine generated highlights / summaries to quickly get the main idea of each paper.
If you do not want to miss any interesting academic paper, you are welcome to sign up our free daily paper digest service to get updates on new papers published in your area every day. You are also welcome to follow us on Twitter and Linkedin to get updated with new conference digests.
Paper Digest Team
team@paperdigest.org
TABLE 1: MOBICOM 2018 Papers
Title | Authors | Highlight | |
---|---|---|---|
1 | Invited Keynote by Mr. Mukesh Ambani | Mukesh Ambani | We have established strong foundations in retailing and digital services business with world-class supply chain management and network infrastructure which will serve our customers well. |
2 | Surface MIMO: Using Conductive Surfaces For MIMO Between Small Devices | Justin Chan, Anran Wang, Vikram Iyer, Shyamnath Gollakota | Specifically, we introduce Surface MIMO, a technique that enables MIMO communication between small devices via surfaces coated with conductive paint or covered with conductive cloth. |
3 | FoggyCache: Cross-Device Approximate Computation Reuse | Peizhen Guo, Bo Hu, Rui Li, Wenjun Hu | In this paper, we proposecross-device approximate computation reuse, which minimizes redundant computation by harnessing the "equivalence” between different input values and reusing previously computed outputs with high confidence. |
4 | SkyCore: Moving Core to the Edge for Untethered and Reliable UAV-based LTE Networks | Mehrdad Moradi, Karthikeyan Sundaresan, Eugene Chai, Sampath Rangarajan, Z. Morley Mao | In this work, we argue for and propose an alternate, radical edge EPC design, called SkyCore that pushes the EPC functionality to the extreme edge of the core network – collapses the EPC into a single, light-weight, self-contained entity that is co-located with each of the UAV BS. |
5 | SWAN: Stitched Wi-Fi ANtennas | Yaxiong Xie, Yanbo Zhang, Jansen Christian Liando, Mo Li | This paper presents our experience in designing, implementing, testing, and applying a general-purpose antenna extension solution with commodity Wi-Fi. |
6 | Battery-Free Eye Tracker on Glasses | Tianxing Li, Xia Zhou | This paper presents a battery-free wearable eye tracker that tracks both the 2D position and diameter of a pupil based on its light absorption property. |
7 | Conductive Inkjet Printed Passive 2D TrackPad for VR Interaction | Chuhan Gao, Xinyu Zhang, Suman Banerjee | In this paper, we design Inkput, a simple passive interface attached to the unexploited backside of the headset to enable touch sensing. |
8 | Flare: Practical Viewport-Adaptive 360-Degree Video Streaming for Mobile Devices | Feng Qian, Bo Han, Qingyang Xiao, Vijay Gopalakrishnan | It takes a viewport-adaptive approach, which fetches only portions of a panoramic scene that cover what a viewer is about to perceive. |
9 | NestDNN: Resource-Aware Multi-Tenant On-Device Deep Learning for Continuous Mobile Vision | Biyi Fang, Xiao Zeng, Mi Zhang | In this paper, we present NestDNN, a framework that takes the dynamics of runtime resources into account to enable resource-aware multi-tenant on-device deep learning for mobile vision systems. |
10 | DeepCache: Principled Cache for Mobile Deep Vision | Mengwei Xu, Mengze Zhu, Yunxin Liu, Felix Xiaozhu Lin, Xuanzhe Liu | We present DeepCache, a principled cache design for deep learning inference in continuous mobile vision. |
11 | Keeping the Internet Open with an Open-Source Virtual Assistant | Monica S. Lam | We propose a collaborative research effort to develop open-source virtual assistant technology, in concert with a commercially viable distributed infrastructure that safeguards users’ data privacy, supports interoperability, and promotes open competition. |
12 | Resolving Policy Conflicts in Multi-Carrier Cellular Access | Zengwen Yuan, Qianru Li, Yuanjie Li, Songwu Lu, Chunyi Peng, George Varghese | In this paper, we study the important, yet largely unexplored, problem of inter-carrier switching for multi-carrier access. |
13 | ECHO: A Reliable Distributed Cellular Core Network for Hyper-scale Public Clouds | Binh Nguyen, Tian Zhang, Bozidar Radunovic, Ryan Stutsman, Thomas Karagiannis, Jakub Kocur, Jacobus Van der Merwe | In this paper we present a novel cellular core network architecture, called ECHO, particularly suited to public cloud deployments, where the availability guarantees might be an order of magnitude worse compared to existing (redundant) hardware platforms. |
14 | Experience: Implications of Roaming in Europe | Anna Maria Mandalari, Andra Lutu, Ana Custura, Ali Safari Khatouni, Özgü Alay, Marcelo Bagnulo, Vaibhav Bajpai, Anna Brunstrom, Jörg Ott, Marco Mellia, Gorry Fairhurst | This paper provides an in-depth characterization of the implications of international data roaming within Europe. |
15 | How Should I Slice My Network?: A Multi-Service Empirical Evaluation of Resource Sharing Efficiency | Cristina Marquez, Marco Gramaglia, Marco Fiore, Albert Banchs, Xavier Costa-Perez | In this paper, we provide a first investigation of this trade-off via an empirical study of resource management efficiency in network slicing. |
16 | GPF: A GPU-based Design to Achieve ~100 μs Scheduling for 5G NR | Yan Huang, Shaoran Li, Y. Thomas Hou, Wenjing Lou | In this paper, we present the design of GPF — a GPU-based proportional fair (PF) scheduler that can meet the ∼100 μs time requirement. |
17 | The Future of Wireless and What it will Enable | Andrea Goldsmith | This talk will describe what the wireless future might look like along with some of the innovations and breakthroughs required to realize this vision. |
18 | Multi-Stream Beam-Training for mmWave MIMO Networks | Yasaman Ghasempour, Muhammad K. Haider, Carlos Cordeiro, Dimitrios Koutsonikolas, Edward Knightly | In this paper, we present MUlti-stream beam-Training for mm-wavE networks (MUTE) a novel system that leverages channel sparsity, GHz-scale sampling rate, and the knowledge of mm-Wave RF codebook beam patterns to construct a set of candidate beams for multi-stream beam steering. |
19 | Adaptive Codebook Optimization for Beam Training on Off-the-Shelf IEEE 802.11ad Devices | Joan Palacios, Daniel Steinmetzer, Adrian Loch, Matthias Hollick, Joerg Widmer | In this paper, we adaptively adjust the sector codebook of IEEE 802.11ad devices to optimize the transmit beam patterns for the current channel. |
20 | Towards Scalable and Ubiquitous Millimeter-Wave Wireless Networks | Sanjib Sur, Ioannis Pefkianakis, Xinyu Zhang, Kyu-Han Kim | In this work, we design and implement UbiG – a mmWave wireless access network – that can deliver ubiquitous gigabits per second wireless access consistently to the commercial-off-the-shelf IEEE 802.11ad devices. |
21 | LiSteer: mmWave Beam Acquisition and Steering by Tracking Indicator LEDs on Wireless APs | Muhammad Kumail Haider, Yasaman Ghasempour, Dimitrios Koutsonikolas, Edward W. Knightly | We present LiSteer, a novel system that steers mmWave beams at mobile devices by repurposing indicator LEDs on wireless Access Points (APs) to passively acquire direction estimates using off-the-shelf light sensors. |
22 | Towards Environment Independent Device Free Human Activity Recognition | Wenjun Jiang, Chenglin Miao, Fenglong Ma, Shuochao Yao, Yaqing Wang, Ye Yuan, Hongfei Xue, Chen Song, Xin Ma, Dimitrios Koutsonikolas, Wenyao Xu, Lu Su | To address this challenge, in this paper, we propose EI, a deep-learning based device free activity recognition framework that can remove the environment and subject specific information contained in the activity data and extract environment/subject-independent features shared by the data collected on different subjects under different environments. |
23 | CrossSense: Towards Cross-Site and Large-Scale WiFi Sensing | Jie Zhang, Zhanyong Tang, Meng Li, Dingyi Fang, Petteri Nurmi, Zheng Wang | We present CrossSense, a novel system for scaling up WiFi sensing to new environments and larger problems. |
24 | EchoPrint: Two-factor Authentication using Acoustics and Vision on Smartphones | Bing Zhou, Jay Lohokare, Ruipeng Gao, Fan Ye | We propose a novel user authentication system EchoPrint, which leverages acoustics and vision for secure and convenient user authentication, without requiring any special hardware. |
25 | Ghostbuster: Detecting the Presence of Hidden Eavesdroppers | Anadi Chaman, Jiaming Wang, Jiachen Sun, Haitham Hassanieh, Romit Roy Choudhury | In this paper, we show that even passive receivers leak RF signals on the wireless medium. |
26 | Body-Guided Communications: A Low-power, Highly-Confined Primitive to Track and Secure Every Touch | Viet Nguyen, Mohamed Ibrahim, Hoang Truong, Phuc Nguyen, Marco Gruteser, Richard Howard, Tam Vu | In this paper, we propose a body-guided communication mechanism to secure every touch when users interact with a variety of devices and objects. |
27 | CEIVE: Combating Caller ID Spoofing on 4G Mobile Phones Via Callee-Only Inference and Verification | Haotian Deng, Weicheng Wang, Chunyi Peng | In this paper, we propose CEIVE (Callee-only inference and verification), an effective and practical defense against caller ID spoofing. |
28 | Towards Replay-resilient RFID Authentication | Ge Wang, Haofan Cai, Chen Qian, Jinsong Han, Xin Li, Han Ding, Jizhong Zhao | This paper presents Hu-Fu, the first physical layer RFID authentication protocol that is resilient to the major attacks including tag counterfeiting, signal replay, signal compensation, and brute-force feature reply. |
29 | Proximity-Proof: Secure and Usable Mobile Two-Factor Authentication | Dianqi Han, Yimin Chen, Tao Li, Rui Zhang, Yaochao Zhang, Terri Hedgpeth | In this paper, we propose Proximity-Proof, a secure and usable mobile 2FA system without involving user interactions. |
30 | Verification: Accuracy Evaluation of WiFi Fine Time Measurements on an Open Platform | Mohamed Ibrahim, Hansi Liu, Minitha Jawahar, Viet Nguyen, Marco Gruteser, Richard Howard, Bo Yu, Fan Bai | This paper introduces an open platform for experimenting with fine time measurements and a general, repeatable, and accurate measurement framework for evaluating time-based ranging systems. |
31 | Closing the Gaps in Inertial Motion Tracking | Sheng Shen, Mahanth Gowda, Romit Roy Choudhury | This paper identifies room for improvement over today’s motion tracking techniques. |
32 | RainbowLight: Towards Low Cost Ambient Light Positioning with Mobile Phones | Lingkun Li, Pengjin Xie, Jiliang Wang | We present RainbowLight, a low cost ambient light 3D localization approach easy to deploy in today’s buildings. |
33 | The Science of Social Cyber-Security | Kathleen Carley | This talk will describe the nature, promise of, and challenges in social cyber-security. |
34 | Challenge: RFID Hacking for Fun and Profit | Ju Wang, Omid Abari, Srinivasan Keshav | In this paper, we show how even hobbyists can transform commodity RFID tags into sensors by physically altering (`hacking’) them using COTS sensors, a pair of scissors, and clear adhesive tape. |
35 | Parallel Backscatter in the Wild: When Burstiness and Randomness Play with You | Meng Jin, Yuan He, Xin Meng, Dingyi Fang, Xiaojiang Chen | We in this paper disclose the superclustering phenomenon, which invalidates that assumption and seriously affects the decoding performance. |
36 | Experience: Cross-Technology Radio Respiratory Monitoring Performance Study | Peter Hillyard, Anh Luong, Alemayehu Solomon Abrar, Neal Patwari, Krishna Sundar, Robert Farney, Jason Burch, Christina Porucznik, Sarah Hatch Pollard | In this paper, we deploy an extensive real-world comparative human subject study. |
37 | X-Tandem: Towards Multi-hop Backscatter Communication with Commodity WiFi | Jia Zhao, Wei Gong, Jiangchuan Liu | This paper presents X-Tandem, a multi-hop backscatter system that works with commodity WiFi devices. |
38 | Mitigating the Latency-Accuracy Trade-off in Mobile Data Analytics Systems | Anand Padmanabha Iyer, Li Erran Li, Mosharaf Chowdhury, Ion Stoica | Based on this, we present CellScope, a system that applies a domain specific formulation and application of Multi-task Learning (MTL) to RAN performance analysis. |
39 | One Billion Apples’ Secret Sauce: Recipe for the Apple Wireless Direct Link Ad hoc Protocol | Milan Stute, David Kreitschmann, Matthias Hollick | In this paper, we present the operation of the protocol as the result of binary and runtime analysis. |
40 | Experience: Android Resists Liberation from Its Primary Use Case | Noah Klugman, Veronica Jacome, Meghan Clark, Matthew Podolsky, Pat Pannuto, Neal Jackson, Aley Soud Nassor, Catherine Wolfram, Duncan Callaway, Jay Taneja, Prabal Dutta | Experience: Android Resists Liberation from Its Primary Use Case |
41 | RAVEN: Improving Interactive Latency for the Connected Car | HyunJong Lee, Jason Flinn, Basavaraj Tonshal | We study the connection quality available to connected cars today, focusing on user-facing, latency-sensitive applications. |
42 | The Early International Activities in the Arpanet, Its Mutation into the Internet, and Some Further Regional Extensions | Peter T. Kirstein | This talk will consider some of the activities involved in setting up the International Internet and its precursors. |
43 | ChromaCode: A Fully Imperceptible Screen-Camera Communication System | Kai Zhang, Chenshu Wu, Chaofan Yang, Yi Zhao, Kehong Huang, Chunyi Peng, Yunhao Liu, Zheng Yang | In this paper, we present the design and implementation of ChromaCode, a screen-camera communication system that achieves all three goals simultaneously. |
44 | VSkin: Sensing Touch Gestures on Surfaces of Mobile Devices Using Acoustic Signals | Ke Sun, Ting Zhao, Wei Wang, Lei Xie | In this paper, we propose VSkin, a system that supports fine-grained gesture-sensing on the back of mobile devices based on acoustic signals. |
45 | Simultaneous Localization and Mapping with Power Network Electromagnetic Field | Chris Xiaoxuan Lu, Yang Li, Peijun Zhao, Changhao Chen, Linhai Xie, Hongkai Wen, Rui Tan, Niki Trigoni | This paper presents a first systematic study on using the electromagnetic field (EMF) induced by a building’s electric power network for simultaneous localization and mapping (SLAM). |
46 | Cross-Frequency Communication: Near-Field Identification of UHF RFIDs with WiFi! | Zhenlin An, Qiongzheng Lin, Lei Yang | We design and implement TiFi with commodity WiFi chipsets (e.g., Broadcom BCM43xx, Murata KM6D280 40, and Qualcomm WCN3990). |
47 | Achieving Receiver-Side Cross-Technology Communication with Cross-Decoding | Wenchao Jiang, Song Min Kim, Zhijun Li, Tian He | We present XBee, a unique receiver-side CTC that fills in the gap and makes a critical step towards achieving CTC bidirectionality. |
48 | MobiCom’18 Panel: Hammer & Nail vis-a-vis AI / ML Applications to Networked Systems | Pravin Bhagwat, Andrea Goldsmith, Manish Gupta, Rajeev Rastogi, Gautam Shroff | MobiCom’18 Panel: Hammer & Nail vis-a-vis AI / ML Applications to Networked Systems |
49 | Chip-to-chip RF Communications and Power Delivery via On-chip Antennas | Larry Richard Carley | In this Tutorial, we will apply simplifying approximations in order to develop basic equations relating the size and geometry of the antennas to the ability of the OCA-IC to harvest ambient RF energy; and, we will validate those equations with electromagnetic field simulations. |
50 | Edge Computing with ParaDrop Tutorial | Suman Banerjee | With our tutorial, we aim to foster awareness of the possibilities that exist with edge computing and promote the advancement of research toward good standards for its realization. |
51 | 5G: An Evolution Towards a Revolution | Karthik Sundaresan | The aim of this tutorial is to give the audience an overview of the landscape of the future generation of mobile networks, namely 5G. |
52 | Dynamic Network Analytics: Tutorial Outline | Kathleen M. Carley, Larry Richard Carley | This tutorial will cover the basics of Network analytics and demonstrate the use of ORA to support social media analytics using high dimensional network analytics and visualization for social media networks, semantic networks, geo-spatial networks, and dynamic networks. |
53 | Proximity Detection with Single-Antenna IoT Devices | Timothy J. Pierson, Travis Peters, Ronald Peterson, David Kotz | Researchers have previously proposed methods for multi-antenna devices to ascertain physical proximity with other devices, but devices with a single antenna, such as those commonly used in the Internet of Things, cannot take advantage of these techniques. |
54 | A SDN/NFV-Based IoT Network Slicing Creation System | Meng Wang, Bo Cheng, Xuan Liu, Yi Yue, Biyi Li, Junliang Chen | In this paper, we propose a novel IoT network slicing creation system which based on two emerging SDN and NFV technologies. |
55 | Service Level Virtualization (SLV): A Preliminary Implementation of 3GPP Service Based Architecture (SBA) | Bo-Jun Qiu, Yu-Sen Hsueh, Jyh-Cheng Chen, Jia-Ru Li, You-Min Lin, Ping-Fan Ho, Tze-Jie Tan | To realize the idea of SBA, we propose Service Level Virtualization (SLV) in which each network entity is decomposed into different service blocks to provide respective services. |
56 | An SDN Based Content Cache at the WiFi Edge | Lalhruaizela Chhangte, D Manjunath, Nikhil Karamchandani | We describe the current version of Wi-Cache, a SDN framework for caching at the WiFi edge. |
57 | Redesigning MPTCP for Edge Clouds | Nitinder Mohan, Tanya Shreedhar, Aleksandr Zavodavoski, Otto Waltari, Jussi Kangasharju, Sanjit K. Kaul | In this paper, we show that the default MPTCP design does not adequately support reliability in these environments, which makes it unfit for use in edge clouds. |
58 | Caching Static and Transient Data | Rudrabhotla Sri Prakash, Sharayu Moharir | We propose a caching policy which divides the cache into sub-caches, such that each sub-cache is reserved for data of a specific size and lifetime. |
59 | Sparse Signal Recovery and Energy Harvesting for Potential 5G Applications | Neha Jain, Vivek Ashok Bohara, Anubha Gupta | In this paper, a new protocol for simultaneous wireless information and power transfer (SWIPT) has been proposed, which randomly switches the signal for information decoding (ID) and energy harvesting (EH). |
60 | Scalable Network Slicing Architecture for 5G | Tulja Vamshi Kiran Buyakar, Amogh PC, Bheemarjuna Reddy Tamma, Antony Franklin A. | In this paper, we demonstrate scaling of network slices based on the type of network slice such as enhanced Mobile Broadband (eMBB), massive Machine Type Communication (mMTC) in order to ensure Service Level Agreement (SLA) guarantees of the network slices with the help of our proposed Network Slicing Profiler (NSP) and Network Slice Scaling Function (NSSF) in an ETSI MANO based network slicing framework. |
61 | Bringing mmWave Communications to Raspberry Pi | Mohammad H. Mazaheri, Ali Abedi, Omid Abari | Recently there has been a huge interest in performing research on millimeter wave (mmWave) communications. |
62 | Uplink and Downlink Resource Allocation for Energy Efficient Cellular Networks with Dual Connectivity | Yoghitha Ramamoorthi, Abhinav Kumar | In this paper, given a partially shared deployment (PSD) of subchannels between macro BS (MBS) and the small cell base stations (SCBSs), the DC uplink (UL) resource allocation problem is formulated. |
63 | HISC NEMO: High Scalability in Nested Network Mobility Using Hierarchical Attachment Approach | Avijit Gayen, Nilotpal Chakraborty | In this paper, we address the scalability issue of nested-NEMO and propose a hierarchical node attachment process for the mobile devices. |
64 | Age-of-Information Aware Scheduling for Heterogeneous Sources | Bejjipuram Sombabu, Sharayu Moharir | We propose a policy called SQRT-Weight which schedules updates from sensors at a frequency proportional to the square-root of the corresponding weights and show that this policy is asymptotically 8–optimal. |
65 | ACP: Age Control Protocol for Minimizing Age of Information over the Internet | Tanya Shreedhar, Sanjit K. Kaul, Roy D. Yates | We propose the Age Control Protocol (ACP), which, in a network-transparent manner, enables a source to keep the age at the monitor small. |
66 | iCALM: A Topology Agnostic Socio-inspired Channel Assignment Performance Prediction Metric for Mesh Networks | Srikant Manas Kala, Vanlin Sathya, M Pavan Kumar Reddy, Bheemarjuna Reddy Tamma | In this work, we propose an improved Channel Assignment Link-Weight Metric (iCALM) that is independent of these constraints. |
67 | AMuSe: An | Swetank Kumar Saha, Shivang Aggarwal, Dimitrios Koutsonikolas, Joerg Widmer | In this work, we explore using Multipath TCP (MPTCP) to engage both 802.11ad and 802.11ac interfaces simultaneously for performance speed-up and improved reliability. |
68 | Frame Aggregation in 802.11ac: Need for Modified Block ACK | Muhammad Inamullah, Bhaskaran Raman | In this paper, we explain how fixed block ACK size coupled with subframe retransmission are the main causes of reduction in A-MPDU size. |
69 | Joint Data Latency and Packet Loss Optimization for Relay-Node Selection in Time-Varying IoT Networks | Surender Redhu, Mukund Maheshwari, Kshitij Yeotikar, Rajesh M. Hegde | In this work, a relay-node selection method is proposed for mobility-tolerant data forwarding. |
70 | A Raspberry Pi Based Data-Centric MAC for Robust Multicast in Vehicular Network | Mohammed Elbadry, Bing Zhou, Fan Ye, Peter Milder, YuanYuan Yang | We propose V-MAC, a data-centric MAC layer that filters frames by content. |
71 | Analyzing Bitrates in Modern Wi-Fi Networks | Yixuan Gao, Ali Abedi, Tim Brecht, Ramya Bhagavatula | We describe preliminary findings from a large-scale study obtained from 448 Google Wifi and Google OnHub access points with 2,975 clients. |
72 | Wi-Fi User’s Video QoE in the Presence of Duty Cycled LTE-U | Mohit Kumar Singh, Anand M. Baswade, Antony Franklin A, Bheemarjuna Reddy Tamma | In this work, we study the video quality performance of a Wi-Fi user in the presence of LTE-U, in a testbed system. |
73 | Facilitating Low Latency and Reliable VR over Heterogeneous Wireless Networks | Arunkumar Ravichandran, Ish Kumar Jain, Rana Hegazy, Teng Wei, Dinesh Bharadia | In this poster, we present an idea of using both WiFi and WiGig interfaces to transmit the VR content. |
74 | Wireless Caching in Large-Scale Edge Access Points: A Local Distributed Approach | Ge Ma, Zhi Wang, Jiahui Ye, Wenwu Zhu | In this paper, we study the wireless caching problem, i.e., which contents should be stored by which APs. |
75 | Development of an LAA-LTE Transmitter with Lightweight Wi-Fi Frame Detection | Harim Lee, Hyoil Kim, Hyun Jong Yang | As a remedy, we design and develop an LAA-LTE transmitter based on a software-defined radio system proposing lightweight but effective Wi-Fi frame detection with which an LAA-LTE device can capture a Wi-Fi preamble by only using LTE’s own time-domain samples. |
76 | Exploring Visible Light Communication System using RTS/CTS Mechanism for Mobile Environment | Kashi Nath Datta, Pradipta Das, Mousumi Saha, Sujoy Saha, Sandip Chakraborty | This work presents a software-centric visible light communication (VLC) system in full duplex mode with CSMA/CA and RTS-CTS in mobile environment. |
77 | A Lightweight Timestamp-based MAC Detection Scheme for XOR Network Coding in Wireless Sensor Networks | Zhongyi Zhai, Junyan Qian, Yuan Tao, Lingzhong Zhao, Bo Cheng | In the paper, we present a lightweight timestamp-based message authentication code method, called as TMAC. |
78 | Maintaining UAV Stability using Low-Power WANs | Akshay Gadre, Revathy Narayanan, Swarun Kumar | We demonstrate how our system estimates and corrects for UAV drift in GPS-denied settings with minimal impact on the cost and flight life of a UAV. |
79 | Using Barometer on Smartphones to Improve GPS Navigation Altitude Accuracy | Ping-Fan Ho, Chia-Che Hsu, Jyh-Cheng Chen, Tao Zhang | In this paper, we show how to use the barometers, which come with off-the-shelf smartphones, to improve vertical positioning accuracy. |
80 | SaFePlay+: A Wearable Cycling Measurement and Analysis System of Lower Limbs | Tse-Yu Lin, Shih-Yao Wei, Heng-Yi Chen, Li-Yang Huang, Chih-Yun Liu, An-Chun Chen, Yin-Yu Chou, Hsing-Mang Wang | SaFePlay+: A Wearable Cycling Measurement and Analysis System of Lower Limbs |
81 | Networked Acoustics Around Human Ears | Sheng Shen, Nirupam Roy, Junfeng Guan, Haitham Hassanieh, Romit Roy Choudhury | We re-envision this area by combining wireless communication with acoustics. |
82 | Effectiveness of Deep Neural Network Model in Typing-based Emotion Detection on Smartphones | Surjya Ghosh, Niloy Ganguly, Bivas Mitra, Pradipta De | In this work, we developed a DNN model based on typing features to predict four emotion states (happy, sad, stressed, relaxed) and investigate its performance on a smartphone. |
83 | Type2Motion: Detecting Mobility Context from Smartphone Typing | Soumyajit Chatterjee, Bivas Mitra, Sandip Chakraborty | We in this paper propose an alternative modality for obtaining mobility context using smartphone keyboard interaction patterns using a personalized framework. |
84 | Pose-assisted Active Visual Recognition in Mobile Augmented Reality | Bing Zhou, Sinem Guven, Shu Tao, Fan Ye | This paper proposes an active visual recognition approach to this problem, leveraging camera pose data available on mobile devices. |
85 | Low Cost Platform Design for Pollution Measurement in Delhi-NCR using Vehicle-Mounted Sensors | Tanishka Goyal, Ankita Singh, Smriti Chhaya, Aditi Vikas, Poorva Garg, Ritika Malik, Rijurekha Sen | Low Cost Platform Design for Pollution Measurement in Delhi-NCR using Vehicle-Mounted Sensors |
86 | Your Phone Tells Us The Truth: Driver Identification Using Smartphone on One Turn | Fatemeh Tahmasbi, Yan Wang, Yingying Chen, Marco Gruteser | For this purpose the turns done by the drivers are being studied. |
87 | SensingGO: Toward Mobile/Cellular Data Measurement with Social and Rewarding Activities | Yi-Hao Lin, Jyh-Cheng Chen, Chih-Yu Lin, Bo-Yue Su, Pei-Yu Lee | In this paper, we present SensingGO, a system which encourages people to keep sensing data by integrating incentive mechanisms. |
88 | Utilizing Social Networks Data for Trust Management in a Social Internet of Things Network | Nishit Narang, Subrat Kar | In this paper, we analyze the accuracy of using tie information from the Facebook Friend Graph to mimic real-world SIoT network ties. |
89 | VeData: Promoting AI Assisted Autonomous Vehicles | Wei Quan, Nan Cheng, Peipei Jing, Gang Liu, Xuemin (Sherman) Shen | To make effectively use of AI technologies to optimize self-driving maneuver, we develop an open VeData platform to share the collected datasets. Based on this, we have incrementally collected diversified first-hand data in many different vehicular scenarios, including driving-in-campus, driving-around-campus, driving-in-downtown, and driving-on-highway. |
90 | META: Memory Exploration Tool for Android Devices | Nisarg Parikh, Varun Gohil, Manu Awasthi | In this paper, we present META, a trace based tool for facilitating the exploration of memory hierarchies in mobile devices. |
91 | Magneto: Leveraging Magnetic Field Changes for Inferring Smartphone App Usage | Meenu Rani Dey, Satadal Sengupta, Bhabendu Kr. Mohanta, Debasish Jena, Sandip Chakraborty | In this work, we present Magneto, a magnetic field based app classification mechanism. |
92 | GPU based High Definition Parallel Video Codec Optimization in Mobile Device | Baichuan Su, Bo Cheng, Ming Wang, Junliang Chen | In this paper, we proposed a GPU based High Definition Parallel Video Codec on mobile devices, which is an efficient video codec with the cooperation of CPU and GPU. |
93 | Your Heart Won’t Lie: PPG-based Continuous Authentication on Wrist-worn Wearable Devices | Tianming Zhao, Yan Wang, Jian Liu, Yingying Chen | This paper presents a photoplethysmography (PPG)-based continuous user authentication (CA) system, which especially leverages the PPG sensors in wrist-worn wearable devices to identify users. |
94 | Leveraging Breathing for Continuous User Authentication | Jian Liu, Yudi Dong, Yingying Chen, Yan Wang, Tianming Zhao | This work proposes a continuous user verification system based on unique human respiratory-biometric characteristics extracted from the off-the-shelf WiFi signals. |
95 | Inferring Mobile Payment Passcodes Leveraging Wearable Devices | Chen Wang, Jian Liu, Xiaonan Guo, Yan Wang, Yingying Chen | This work demonstrates a serious security breach and aims to raise the awareness of the public that the passcodes for authorizing transactions in mobile payments can be leaked by exploiting the embedded sensors in wearable devices (e.g., smartwatches). |
96 | Detection of Topology Poisoning by Silent Relay Attacker in SDN | Pragati Shrivastava, Annanay Agarwal, Kotaro Kataoka | Detection of Topology Poisoning by Silent Relay Attacker in SDN |
97 | A Learning Automata-based DDoS Attack Defense Mechanism in Software Defined Networks | Kshira Sagar Sahoo, Mayank Tiwary, Sampa Sahoo, Rohit Nambiar, Bibhudatta Sahoo, Ratnakar Dash | Asthe control layer is vulnerable to DDoS attack, the goal of this paper is to provide a defense system which is based on Learning Automata (LA) concepts. |
98 | Hybrid Android Malware Detection by Combining Supervised and Unsupervised Learning | Anshul Arora, Sateesh K. Peddoju, Vikas Chouhan, Ajay Chaudhary | In this work, we propose a hybrid malware detector that examines both the permissions and the traffic features to detect malicious Android samples. |
99 | Feasibility of Desynchronization Attack in LTE/SAE Networks | Pranay Agarwal, Abhinav Kumar | Hence, in this paper, we propose the conditions essential for the occurrence of DA. |
100 | A lightweight Mutually Authenticated Key-Agreement scheme for Wireless Body Area Networks in Internet of Things Environment | Ankur Gupta, Meenakshi Tripathi | As the wearable devices are resource-constraint, we propose a lightweight mutually authenticated key-agreement scheme for wireless body area networks using simple XOR and one-way cryptographic hash functions. |
101 | RainbowLight: Design and Implementation of a Low Cost Ambient Light Positioning System | Lingkun Li, Pengjin Xie, Jiliang Wang | In this demo, we present RainbowLight, a low cost ambient light 3D localization approach easy to deploy in today’s buildings. |
102 | Cisco DNA-C as a Platform | Prabhu S, Biju Raju, Laxmi Mukund | Cisco DNA-C as a Platform |
103 | Mitigating Multiple Narrowband Interferers in SDR IEEE 802.11g Diversity Receiver | Sumit Kumar, Florian Kaltenberger | In our demonstration, we will present Software Defined Radio (SDR) based single antenna and multi-antenna prototype of standard-compliant IEEE 802.11g receiver. |
104 | RF-iCare: An RFID-based Approach for Infusion Status Monitoring | Keyan Zhang, Bingbing He, Lei Xie, Yanling Bu, Chuyu Wang, Sanglu Lu | In this demo, we propose RF-iCare, an RFID-based approach for monitoring the infusion status, including the liquid level and the drop speed. |
105 | Tile-Based Viewport-Adaptive Panoramic Video Streaming on Smartphones | Feng Qian, Bo Han, Qingyang Xiao, Vijay Gopalakrishnan | Flare consists of a novel framework for the end-to-end streaming pipeline, introduces innovative streaming algorithms, and brings numerous system-level optimizations. |
106 | Linux Goes Apple Picking: Cross-Platform Ad hoc Communication with Apple Wireless Direct Link | Milan Stute, David Kreitschmann, Matthias Hollick | We have reverse engineered the protocol and explain its frame format and operation in our MobiCom ’18 paper "One Billion Apples’ Secret Sauce: Recipe of the Apple Wireless Direct Link Ad hoc Protocol." |
107 | Elixir: Efficient Data Transfer in WiFi-based IoT Nodes | Dheryta Jaisinghani, Gursimran Singh, Harish Fulara, Mukulika Maity, Vinayak Naik | We present Elixir, a protocol for WiFi-based IoT nodes that enables them to transmit data without the need of a WiFi association. |
108 | Near-Field Identification of UHF RFIDs with WiFi! | Zhenlin An, Qiongzheng Lin, Lei Yang | In this demo, we present a practical CTC application, called øursystem, allowing a 2.4GHz WiFi receiver (eg. |
109 | Low Latency Mobile Augmented Reality with Flexible Tracking | Wenxiao Zhang, Bo Han, Pan Hui | In this demo, we will show that our Jaguar client recognizes movie posters within the camera view by offloading computation intensive tasks to edge cloud and augments these posters with their movie trailers in 3D upon receiving the recognition results. |
110 | E-Witness: Preserve and Prove Forensic Soundness of Digital Evidence | Priyanka Samanta, Shweta Jain | In this demo we present E-Witness, a system that uses blockchain technology to prove the integrity and spatio-temporal properties of digital evidence captured through a smart-phone. |
111 | EasyGO: A Rapid Indoor Navigation and Evacuation System Using Smartphones through Internet of Things Technologies | Lien-Wu Chen, Jun-Xian Liu | This paper proposes a smartphone-based indoor navigation and evacuation system, called EasyGO, to minimize moving time for mobile users through Internet of Things (IoT) technologies. |
112 | COIN by SenseGiz | Abhishek Latthe | COIN by SenseGiz |
113 | HAMS: Driver and Driving Monitoring using a Smartphone | Akshay Uttama Nambi, Shruthi Bannur, Ishit Mehta, Harshvardhan Kalra, Aditya Virmani, Venkata N. Padmanabhan, Ravi Bhandari, Bhaskaran Raman | Many studies have found that the primary factors responsible for road accidents center on the driver and her/his driving. |
114 | MegaSense: Megacity-scale Accurate Air Quality Sensing with the Edge | Eemil Lagerspetz, Samu Varjonen, Francesco Concas, Julien Mineraud, Sasu Tarkoma | We address this significant open problem for dense urban areas by developing a calibration scheme that detects and automatically corrects drift. |
115 | Combating Caller ID Spoofing on 4G Phones Via CEIVE | Haotian Deng, Chunyi Peng | We present the demonstration of CEIVE (Callee-only inference and verification), an effective and practical defense against caller ID spoofing. |
116 | Android Resists Liberation from Its Primary Use Case | Noah Klugman, Meghan Clark, Pat Pannuto, Prabal Dutta | Android Resists Liberation from Its Primary Use Case |
117 | A Software-Defined Radio for Wireless Brain Implants Network | Haili Cai, Mustafa Lokhandwala, Joey Zhu, Chester Kilfoyle, Jihun Lee, Lawrence Larson, Arto Nurmikko, Farah Laiwalla, Vincent W. Leung | A Software-Defined Radio for Wireless Brain Implants Network |
118 | Design and Implementation of LTE Advanced Underlay Device to Device Communication Framework | Khagendra Joshi, Vivek Ashok Bohara, Parag Aggarwal | In this paper, we design and develop a test-bed to evaluate the real-world performance of the underlay D2D communication framework. |
119 | Optical Wireless Communication | Deepak Solanki | Multiple forward & backward integration are poised to happen in coming years when lighting players will develop enterprise communication enabled lighting products. |
120 | Minion – The World’s Smallest Energy Auditor | Gokul Shrinivas | Minion captures voltage and energy signatures at microsecond intervals and uses machine learning techniques to identify the individual assets used and the patterns of their consumption. |