康国钦老师.png

A.Prof. Guo-qin Kang

College of Information and Communication, National University of Defense Technology, China


Speech Title: Analysis on the New Progress of Spectrum Planning of IMT-2020(5G)

Speech Abstract:  

In order to allocate reasonable spectrum resources above 6 GHz for 5th-Generation (5G) in China, this paper analyzes the new progress of upcoming World Radio Conference-2019 (WRC-19) agenda 1.13, the 3rd Generation Partnership Project (3GPP) 5G New Radio (NR), and Chinese 5G spectrum planning. It analyses the possibility of Chinese spectrum planning in several candidate frequency bands with Monte-Carlo simulation, including 24.75-27.5 GHz, 31.8-33.4 GHz, 37-43.5 GHz, 64-71 GHz, 71-76 GHz and 81-86 GHz. The compatibility is viable between mobile service (MS) and earth exploration satellite service (EESS), radio astronomy service (RAS), inter-satellite service (ISS) in 24.75-27.5 GHz. It’s likely to allocate 24.75-27.5 GHz to 5G in China. There is coexisting difficulty and adverse propagation condition in 31.8-33.4 GHz. It is almost impossible to allocate 31.8-33.4 GHz to 5G in China. It is compatible between MS and fixed-satellite service (FSS), EESS (passive) with additional isolation and out-of- band emission limitation in 37-43.5 GHz. It is possible to allocate 37-43.5 GHz to 5G in China.




Xiaoyan Jiang.jpg

A.Prof. Xiaoyan Jiang

Shanghai University of Engineering Science, China


Speech Title:  to be added...
Speech Abstract:  to be added...






Chuan-Ming Liu.jpg

Prof. Chuan-Ming Liu

National Taipei University of Technology (Taipei Tech), Taiwan, China


Speech Title: Data Management on Uncertain Data Streams in Edge Computing Environments 

Speech Abstract: 

Nowadays many applications of IoT, Big Data, and Cloud computing have been proposed and discussed. With the evolution of computing for real-time applications, cloud edge computing has become the promising architecture to improve the response time in recent years. One of the common critical issues in these applications is data management and processing. The data in such an emerging environment, such as the sensed data, may not be accurate and are thus referred to as uncertain data. The uncertainty complicates the computing or processing on the data and is inherent in many applications. In addition, the data produced or generated are dynamic and continuous. For example, the monitored data on the product lines in a factory are generated and collected ceaselessly. One of the objectives in such a system is to derive the feedbacks from the data streams instantly. Therefore, the data we now face and manipulate have the properties of velocity, veracity, and volume. The conventional approaches for query processing therefore need to be examined, adapted, or re-designed if necessary. In this talk, the recent issues about managing the data with such properties are introduced and the processes of some interesting query types are presented as well, including probabilistic nearest neighbor Query, probabilistic skyline query, and probabilistic top-k dominating query. 




主讲嘉宾-Hamid R. Ghaeini.jpg

Dr. Hamid R. Ghaeini  

CISPA - Helmholtz Center for Information Security, Saarbrücken, Germany


Speech Title: Anomaly Detection in Control Processes

Speech Abstract:  

Anomaly detection is an umbrella term for the techniques that identifies changes in the data that significantly differ from the majority of the data. Anomaly detection was widely used to detect the unwanted changes over cyber and physical behavior of the industrial control systems. In this talk, we will discuss the practical implementation of stealthy attacks on industrial control systems. We start by reviewing the attacks proposed in prior works. Then, we will present Zero-Residual Attacks, which allow the attacker to launch stealthy attacks leveraging estimation of the stateful anomaly detector and matching of residuals as a fraction of actual estimate residual. Then, we propose to use a Stateful Detector (SD) as an anomaly detection counter-measure to precisely detect such stealthy attacks





Supported by

Media Support

Indexing Information

Official Wechat