Program at a glance
Download here the Final Program in PDF
*Timing used is EST/GMT -4
Day 1 – Tuesday, October 29 |
|
Time |
Event |
08:00 – 08:30 |
Registration |
08:30 – 09:00 |
Opening Remarks |
09:00 – 10:00 |
Keynote #1: Enabling Collaborative Intelligence at the Edge: A Spatial
Computing Approach with JAMScript |
10:00 – 10:30 |
Coffee break |
10:30 – 12:00 |
Technical Session #1:Internet of Things Enhancing IoT Connectivity with Matching Theory-Based Spectrum Sharing for IRS-Aided Multi-Cell
Systems An Analysis on CVE Vulnerabilities of the Internet of Things IoT-enabled Pediatric Pain Care Leveraging Majority Vote-based Transfer Learning
Models Comparative Performance Analysis of NDN Protocol in IoT Environments Effective IDS under constraints of modern enterprise networks: revisiting the OpTC
dataset |
12:00 – 13:30 |
Lunch break |
13:30 – 15:00 |
Short papers Session #1:IoT Applications SKELETRACK: Efficient Tracking of Skeleton in Blurry Videos for Human Activity
Recognition Non-reciprocal RIS-Aided Full-Duplex Communications: IoT Applications Deep Reinforcement Learning-Enabled Resilient Radio Resource Allocation for Internet-of-Things
Networks with Receiver Non-Linearity An Exploratory Study on Code Quality, Testing, Data Accuracy, and Practical Use Cases of IoT
Wearables Metamorphic Testing for Investigation of Context Recognition from Smart Home Voice
Commands Computation Offloading on 5G Core Network for a Highly Delay Sensitive Real Time
App |
15:00 – 15:30 |
Coffee break |
15:30 – 17:00 |
Technical Session #2: Machine Learning Machine Learning and Large Language Models-based Techniques for Cyber Threat Detection: A
Comparative Study S4HI: A Novel Learning-based Human Identification Method from Behavioural
Data Query Prediction for Log Search for Distributed Tracing with External Monitoring
Alerts Virtualized Wireless Sensor Networks for Distributed Applications over the Cloud
Continuum Sustainability of AI – Energy consumption estimation of an mMTC admission
control |
17:00 |
Welcome Reception |
Day 2 – Wednesday, October 30 |
|
Time |
Event |
08:00 – 09:00 |
Registration |
09:00 – 10:00 |
Keynote #2: Advancing Cloud and IoT Security through LLMs, Federated
and Deep Reinforcement Learning |
10:00 – 10:30 |
Coffee break |
10:30 – 12:00 |
Technical Session #3: Resource Management Resource Management for Reduced Capability New Radio Devices in Beyond 5G Networks: Opportunities
and Research Road Map Optimizing multi-service migration and downtime at the network edge using deep reinforcement
learning End-to-End Decentralized Tracking of Carbon Footprint using Internet of Things and Distributed
Databases Selective Excitation Technique for Wireless Power Transfer in Wearable Devices Using
CMA Efficient Resource Allocation for Multi-Robot Collaboration via Traffic-Aware Pod
Autoscaling |
12:00 – 13:30 |
Lunch break |
13:30 – 15:00 |
Demos/Posters Session: DEMO: Non-Reciprocal RIS Solution for Power Mismatch in WiFi-Connected IoT
Devices Demo: Virtualized Wireless Sensor Networks for Distributed Applications over the Cloud
Continuum DEMO of: A Policy-based System for Service Provisioning in Edge Computing (POSTER) Cloud Monitoring and Prediction of Indoor LoRa-based Air Quality
Data (DEMO) An IoT toolbox for media arts (DEMO) WTTool: A Visual Web-based Topology Generator and 5G Network Simulator with
ns-3 Demo-ScanIoT, an Application to collect IoT dataset for HomeGuard xApps for DDoS Attacks Detection and Mitigation in 5G-V2X O-RAN Networks |
15:00 – 15:30 |
Coffee break |
15:30 – 17:00 |
Technical Session #4:Routing and Scheduling Informed Network Routing for SD-WAN enabled SaaS Optimization: An M365 Proof of
Concept An Architectural Approach for Enhanced Data Interoperability Across Building
Systems A Deep Dive into Congestion Control and Buffer Management for Fluctuation-Prone 5G-A/6G
Links On the Joint Placement of Blockchain and Users’ Virtualized Services in the Internet of
Vehicles VizCheck: Enhancing Phishing Attack Detection through Visual Domain Name Homograph
Analysis |
19:00 |
Conference Dinner |
Day 3 – Thursday, October 31 |
|
Time |
Event |
08:00 – 09:00 |
Registration |
09:00 – 10:00 |
Keynote #3: IoT Device Performance in a Non-Reciprocal Wireless
Network |
10:00 – 10:30 |
Coffee break |
10:30 – 12:00 |
Technical Session #5: Cloud and Sustainability Privacy Preserved IoT Data Inquiry System using DoT Anomaly Detection in IoT Sensor Energy Consumption Using LSTM Neural Networks and Isolation
Forest A Novel Communication-Efficient and Blockchain-Secured Distributed Federated
Learning Enhancing Port Scan and DDoS Attack Detection using Genetic and Machine Learning
algorithms Secure Cloud-based Provisioning and Managing the Complete Life Cycle of IoT
Metals |
12:00 – 13:30 |
Lunch break |
13:30 – 15:00 |
Technical Session #6: Secure Internet of Things: Anomaly Detection in Federated Learning: A Comprehensive Study on Data Poisoning and Energy
Consumption Patterns in IoT Devices (FP) Beyond the Lens: False Data Injection Attacks on IIoT-Cameras through MQTT Manipulation
(FP) Blockchain for Securing CI/CD Pipeline: A Review on Tools, Frameworks, and
Challenges ElectroBlock: Reinforcement Learning and Blockchain-based Energy Trade to Optimize
Tariffs Optimizing IoT Network Intrusion Detection: A Deep Learning Approache |
15:00 – 15:30 |
Closing Ceremony |