Location: Room Salon VI, JW Marriott Atlanta Buckhead Hotel
Time: 8 AM - 12 noon, Monday, June 5, 2017
Schedule:
8 AM: Workshop Opening
8:05 AM: Keynote Speech: A Markov Game Theoretic Approach for Power Grid Security
Charles A. Kamhoua (Cyber Assurance Branch, Air Force Research Laboratory)
8:50 AM: Router-based Brokering for Surrogate Discovery in Edge Computing
Julien Gedeon (Technische Universität Darmstadt)
Christian Meurisch (Technische Universität Darmstadt)
Disha Bhat (Technische Universität Darmstadt)
Michael Stein (Technische Universität Darmstadt)
Lin Wang (Technische Universität Darmstadt)
Max Mühlhäuser (Technische Universität Darmstadt)
9:10 AM: Modeling the Spread of Influence for Independent Cascade Diffusion Process in Social Networks
Zesheng Chen (Indiana University - Purdue University Fort Wayne)
Kurtis Taylor (Indiana University - Purdue University Fort Wayne)
9:30 AM: Break
9:50 AM: (Best Paper Award) Thank You For Being A Friend: An Attacker View on Online-Social-Network-based Sybil Defenses
David Koll (University of Goettingen)
Martin Schwarzmaier (University of Goettingen)
Jun Li (University of Oregon)
Xiang-Yang Li (University of Science and Technology of China)
Xiaoming Fu (University of Goettingen)
10:10 AM: Efficient Dynamic Service Function Chain Combination of Network Function Virtualization
Wenke Yan (Beijing University of Posts and Telecommunications)
Konglin Zhu (Beijing University of Posts and Telecommunications)
Lin Zhang (Beijing University of Posts and Telecommunications)
Sixi Su (Beijing University of Posts and Telecommunications)
10:30 AM: Invited Paper: When Augmented Reality meets Big Data
Carlos Bermejo (The Hong Kong university of Science and Technology)
Zhanpeng Huang (The Hong Kong university of Science and Technology)
Tristan Braud (The Hong Kong university of Science and Technology)
Pan Hui (The Hong Kong university of Science and Technology)
10:50 AM: Sampling Based Efficient Algorithm to Estimate the Spectral Radius of Large Graphs
Samar Abbas (Lahore University of Management Sciences)
Juvaria Tariq (Lahore University of Management Sciences)
Arif Zaman (Lahore University of Management Sciences)
Imdadullah Khan (Lahore University of Management Sciences)
11:10 AM: Extemporaneous Micro-Mobile Service Execution Without Code Sharing
Zheng Song (Virginia Tech)
Minh Le (Utah State University)
Young-Woo Kwon (Utah State University)
Eli Tilevich (Virginia Tech)
11:30 AM: Preventing Colluding Identity Clone Attacks in Online Social Networks
Georges A. Kamhoua (Florida International University)
Niki Pissinou (Florida International University)
S. S. Iyengar (Florida International University)
Jonathan Beltran (Florida International University)
Charles Kamhoua (Air Force Research Lab)
Brandon L. Hernandez (University of Texas at Rio Grande Valley)
Laurent Njilla (Air Force Research Lab)
11:50 AM: Concluding Remarks
Time: 8 AM - 12 noon, Monday, June 5, 2017
Schedule:
8 AM: Workshop Opening
8:05 AM: Keynote Speech: A Markov Game Theoretic Approach for Power Grid Security
Charles A. Kamhoua (Cyber Assurance Branch, Air Force Research Laboratory)
8:50 AM: Router-based Brokering for Surrogate Discovery in Edge Computing
Julien Gedeon (Technische Universität Darmstadt)
Christian Meurisch (Technische Universität Darmstadt)
Disha Bhat (Technische Universität Darmstadt)
Michael Stein (Technische Universität Darmstadt)
Lin Wang (Technische Universität Darmstadt)
Max Mühlhäuser (Technische Universität Darmstadt)
9:10 AM: Modeling the Spread of Influence for Independent Cascade Diffusion Process in Social Networks
Zesheng Chen (Indiana University - Purdue University Fort Wayne)
Kurtis Taylor (Indiana University - Purdue University Fort Wayne)
9:30 AM: Break
9:50 AM: (Best Paper Award) Thank You For Being A Friend: An Attacker View on Online-Social-Network-based Sybil Defenses
David Koll (University of Goettingen)
Martin Schwarzmaier (University of Goettingen)
Jun Li (University of Oregon)
Xiang-Yang Li (University of Science and Technology of China)
Xiaoming Fu (University of Goettingen)
10:10 AM: Efficient Dynamic Service Function Chain Combination of Network Function Virtualization
Wenke Yan (Beijing University of Posts and Telecommunications)
Konglin Zhu (Beijing University of Posts and Telecommunications)
Lin Zhang (Beijing University of Posts and Telecommunications)
Sixi Su (Beijing University of Posts and Telecommunications)
10:30 AM: Invited Paper: When Augmented Reality meets Big Data
Carlos Bermejo (The Hong Kong university of Science and Technology)
Zhanpeng Huang (The Hong Kong university of Science and Technology)
Tristan Braud (The Hong Kong university of Science and Technology)
Pan Hui (The Hong Kong university of Science and Technology)
10:50 AM: Sampling Based Efficient Algorithm to Estimate the Spectral Radius of Large Graphs
Samar Abbas (Lahore University of Management Sciences)
Juvaria Tariq (Lahore University of Management Sciences)
Arif Zaman (Lahore University of Management Sciences)
Imdadullah Khan (Lahore University of Management Sciences)
11:10 AM: Extemporaneous Micro-Mobile Service Execution Without Code Sharing
Zheng Song (Virginia Tech)
Minh Le (Utah State University)
Young-Woo Kwon (Utah State University)
Eli Tilevich (Virginia Tech)
11:30 AM: Preventing Colluding Identity Clone Attacks in Online Social Networks
Georges A. Kamhoua (Florida International University)
Niki Pissinou (Florida International University)
S. S. Iyengar (Florida International University)
Jonathan Beltran (Florida International University)
Charles Kamhoua (Air Force Research Lab)
Brandon L. Hernandez (University of Texas at Rio Grande Valley)
Laurent Njilla (Air Force Research Lab)
11:50 AM: Concluding Remarks