Program at a glance
The current program is provisional and may be subject to slight changes.
*Timing used is EST/GMT -4
Day 1 – Tuesday, October 29 |
|
Time |
Event |
08:00 – 08:30 |
Registration |
08:30 – 09:00 |
Opening Remarks |
09:00 – 10:00 |
Keynote #1: Enabling Collaborative Intelligence at the Edge: A Spatial Computing Approach with JAMScript |
10:00 – 10:30 |
Coffee break |
10:30 – 12:00 |
Technical Session #1:Internet of Things Enhancing IoT Connectivity with Matching Theory-Based Spectrum Sharing for IRS-Aided Multi-Cell Systems An Analysis on CVE Vulnerabilities of the Internet of Things IoT-enabled Pediatric Pain Care Leveraging Majority Vote-based Transfer Learning Models Comparative Performance Analysis of NDN Protocol in IoT Environments Effective IDS under constraints of modern enterprise networks: revisiting the OpTC dataset |
12:00 – 13:30 |
Lunch break |
13:30 – 15:00 |
Short papers Session #1:IoT Applications SKELETRACK: Efficient Tracking of Skeleton in Blurry Videos for Human Activity Recognition Non-reciprocal RIS-Aided Full-Duplex Communications: IoT Applications Deep Reinforcement Learning-Enabled Resilient Radio Resource Allocation for Internet-of-Things Networks with Receiver Non-Linearity An Exploratory Study on Code Quality, Testing, Data Accuracy, and Practical Use Cases of IoT Wearables AMetamorphic Testing for Investigation of Context Recognition from Smart Home Voice Commands Computation Offloading on 5G Core Network for a Highly Delay Sensitive Real Time App |
15:00 – 15:30 |
Coffee break |
15:30 – 17:00 |
Technical Session #2: Machine Learning Machine Learning and Large Language Models-based Techniques for Cyber Threat Detection: A Comparative Study S4HI: A Novel Learning-based Human Identification Method from Behavioural Data Query Prediction for Log Search for Distributed Tracing with External Monitoring Alerts AI-Based Pest Detection in Smart Agriculture: An Enhanced Tiny-YOLOV3 Approach Sustainability of AI – Energy consumption estimation of an mMTC admission control |
17:00 |
Welcome Reception |
Day 2 – Wednesday, October 30 |
|
Time |
Event |
08:00 – 09:00 |
Registration |
09:00 – 10:00 |
Keynote #2: Advancing Cloud and IoT Security through LLMs, Federated and Deep Reinforcement Learning |
10:00 – 10:30 |
Coffee break |
10:30 – 12:00 |
Technical Session #3: Resource Management Resource Management for Reduced Capability New Radio Devices in Beyond 5G Networks: Opportunities and Research Road Map Optimizing multi-service migration and downtime at the network edge using deep reinforcement learning End-to-End Decentralized Tracking of Carbon Footprint using Internet of Things and Distributed Databases Selective Excitation Technique for Wireless Power Transfer in Wearable Devices Using CMA Efficient Resource Allocation for Multi-Robot Collaboration via Traffic-Aware Pod Autoscaling |
12:00 – 13:30 |
Lunch break |
13:30 – 15:00 |
Demos/Posters Session: DEMO: Non-Reciprocal RIS Solution for Power Mismatch in WiFi-Connected IoT Devices Demo: Virtualized Wireless Sensor Networks for Distributed Applications over the Cloud Continuum DEMO of: A Policy-based System for Service Provisioning in Edge Computing (POSTER) Cloud Monitoring and Prediction of Indoor LoRa-based Air Quality Data (DEMO) An IoT toolbox for media arts (DEMO) WTTool: A Visual Web-based Topology Generator and 5G Network Simulator with ns-3 Demo-ScanIoT, an Application to collect IoT dataset for HomeGuard xApps for DDoS Attacks Detection and Mitigation in 5G-V2X O-RAN Networks |
15:00 – 15:30 |
Coffee break |
15:30 – 17:00 |
Technical Session #4:Routing and Scheduling Informed Network Routing for SD-WAN enabled SaaS Optimization: An M365 Proof of Concept An Architectural Approach for Enhanced Data Interoperability Across Building Systems A Deep Dive into Congestion Control and Buffer Management for Fluctuation-Prone 5G-A/6G Links On the Joint Placement of Blockchain and Users’ Virtualized Services in the Internet of Vehicles VizCheck: Enhancing Phishing Attack Detection through Visual Domain Name Homograph Analysis |
19:00 |
Conference Dinner |
Day 3 – Thursday, October 31 |
|
Time |
Event |
08:00 – 09:00 |
Registration |
09:00 – 10:00 |
Keynote #3: IoT Device Performance in a Non-Reciprocal Wireless Network |
10:00 – 10:30 |
Coffee break |
10:30 – 12:00 |
Technical Session #5: Cloud and Sustainability Privacy Preserved IoT Data Inquiry System using DoT Anomaly Detection in IoT Sensor Energy Consumption Using LSTM Neural Networks and Isolation Forest A Novel Communication-Efficient and Blockchain-Secured Distributed Federated Learning Enhancing Port Scan and DDoS Attack Detection using Genetic and Machine Learning algorithms Secure Cloud-based Provisioning and Managing the Complete Life Cycle of IoT Metals |
12:00 – 13:30 |
Lunch break |
13:30 – 14:30 |
Panel: |
14:30 – 15:00 |
break |
15:00 – 16:30 |
Technical Session #5: Secure Internet of Things: Anomaly Detection in Federated Learning: A Comprehensive Study on Data Poisoning and Energy Consumption Patterns in IoT Devices (FP) Beyond the Lens: False Data Injection Attacks on IIoT-Cameras through MQTT Manipulation (FP) Blockchain for Securing CI/CD Pipeline: A Review on Tools, Frameworks, and Challenges ElectroBlock: Reinforcement Learning and Blockchain-based Energy Trade to Optimize Tariffs Optimizing IoT Network Intrusion Detection: A Deep Learning Approache |
16:30 – 17:00 |
Closing Ceremony |