El Mahdi El Mhamdi, Rachid Guerraoui and Sébastien Rouault.

Fast and Robust Distributed Learning in High Dimension



Yingxun Fu, Xun Liu, Jiwu Shu, Zhirong Shen, Shiye Zhang, Jun Wu, Jianyong Duan and Li Ma.

Device and Placement Aware Framework to Optimize Single Failure Recoveries and Reads for Erasure Coded Storage Systems with Heterogeneous Storage Devices



Tarcisio Junior Ceolin, Fernando Luís Dotti and Fernando Pedone.

Parallel State Machine Replication from Generalized Consensus



Junya Nakamura, Masahiro Shibata, Yuichi Sudo and Yonghwan Kim.

Self-Stabilizing Construction of a Minimal Weakly -Reachable Directed Acyclic Graph



Chenhao Ying, Haiming Jin, Xudong Wang and Yuan Luo.

Double Insurance: Incentivized Federated Learning with Differential Privacy in Mobile Crowdsensing



Qingqi Pei, Enyuan Zhou, Yang Xiao, Deyu Zhang and Dongxiao Zhao.

An Efficient Query Scheme for Hybrid Storage Blockchains Based on Merkle Semantic Trie



Xue Jiang, Hengfeng Wei and Yu Huang.

A Generic Specification Framework for Weakly Consistent Replicated Data Types



Duong Nguyen and Sandeep Kulkarni.

Benefits of Stabilization versus Rollback in Self-Stabilizing Graph-Based Applications on Eventually Consistent Key-Value Stores



Yansong Gao, Minki Kim, Sharif Abuadbba, Yeonjae Kim, Chandra Thapa, Kyuyeon Kim, Seyit A. Camtepe, Hyoungshick Kim and Surya Nepal.

End-to-End Evaluation of Federated Learning and Split Learning for Internet of Things



Carlos Segarra, Ricard Delgado-Gonzalo and Valerio Schiavoni.

MQT-TZ: Hardening IoT Brokers Using ARM TrustZone (Practical Experience Report)



Loïck Bonniot, Christoph Neumann and Francois Taïani.

PnyxDB: a Lightweight Leaderless Democratic Byzantine Fault Tolerant Replicated Datastore



Gerhard Habiger, Franz J. Hauck, Hans P. Reiser and Johannes Köstler.

Self-optimising Application-agnostic Multithreading for Replicated State Machines



Xin Xie, Chentao Wu, Gen Yang, Zongxin Ye, Xubin He, Jie Li, Minyi Guo, Guangtao Xue, Yuanyuan Dong and Yafei Zhao.

AZ-Recovery: An Efficient Crossing-AZ Recovery Scheme for Erasure Coded Cloud Storage Systems



Chao Li, Balaji Palanisamy, Runhua Xu, Jian Wang and Jiqiang Liu.

NF-Crowd: Nearly-free Blockchain-based Crowdsourcing



Si Wu, Zhirong Shen and Patrick P. C. Lee.

Enabling I/O-Efficient Redundancy Transitioning in Erasure-Coded KV Stores via Elastic Reed-Solomon Codes



Yangfan Jiang, Yipeng Zhou, Di Wu, Chao Li and Yan Wang.

On the Detection of Shilling Attacks in Federated Collaborative Filtering



Sisi Duan, Chao Liu, Xin Wang, Yusen Wu, Shuai Xu, Yelena Yesha and Haibin Zhang.

Intrusion-Tolerant and Confidentiality-Preserving Publish/Subscribe Messaging



Bo Zhang, Hongyu Zhang and Pablo Moscato.

Anomaly Detection via Mining Numerical Workflow Relations from Logs



Joel Wanner, Laurent Chuat and Adrian Perrig.

A Formally Verified Protocol for Log Replication with Byzantine Fault Tolerance



Daniela Loreti, Marcello Artioli and Anna Ciampolini.

Solving Linear Systems on High Performance Hardware with Resilience to Multiple Hard Faults



Orestis Alpos and Christian Cachin.

Consensus Beyond Thresholds: Generalized Byzantine Quorums Made Live



Xavier Défago, Adam Heriban, Sebastien Tixeuil and Koichi Wada.

Using Model Checking to Formally Verify Rendezvous Algorithms for Robots with Lights in Euclidean Space



Karim Boubouh, Amine Boussetta, Yahya Benkaouz and Rachid Guerraoui.

Robust P2P Personalized Learning



Xiaoxia Liu, Daojing He, Yun Gao, Sencun Zhu and Sammy Chen.

TLP-IDS: A Two-layer Intrusion Detection System for Integrated Electronic Systems



Yilei Zhang, Peiyun Zhang, Yonglong Luo and Liya Ji.

Towards Efficient, Credible and Privacy-preserving Service QoS Prediction in Unreliable Mobile Edge Environments



Christina Müller, Marcus Brandenburger, Christian Cachin, Pascal Felber, Christian Göttel and Valerio Schiavoni.

TZ4Fabric: Executing Smart Contracts with ARM TrustZone (Practical Experience Report)



Martin Byrenheid, Thorsten Strufe and Stefanie Roos.

Secure Embedding of Rooted Spanning Trees for Scalable Routing in Topology-Restricted Networks



Vidhya Tekken Valapil, Sandeep Kulkarni, Eric Torng and Gabe Appleton.

Efficient two-layered monitor for Partially Synchronous Distributed Systems



Travis LeCompte, Fang Qi and Lu Peng.

Robust Cache-Aware Quantum Processor Layout Design



Meng Yan, Jiajia Xu, Trent Marbach, Gang Wang and Xiaoguang Liu.

Audinet: A Decentralized Data Auditing System for Cloud Storage



Yue Li, Han Liu, Zhiqiang Yang, Bin Wang, Qian Ren, Lei Wang and Bangdao Chen.

Protect Your Smart Contract Against Unfair Payment



Jacob Nelson and Roberto Palmieri.

Performance Evaluation of the Impact of NUMA on One-sided RDMA Interactions