All the workshops will take place on Tuesday (June 4th). The workshops day program is summarised below.
Additional information can be found on the workshops' website. You can access workshops details from here.
09:00 am - 9:15 am Welcome by the chairs
09:15 am - 10:10 am Fireside Chat "Protecting Future Critical Infrastructures: What are the Threats of Emerging Technologies on CI", Sanjay Jha; Surya Nepal
WIP: Performance Metrics of PUF-Based Authentication Protocols for Smart Grid: A Review, Taylah J Griffiths; Mohiuddin Ahmed; Shihao Yan
10:30 am - 11:00 am Coffee Break
Paper 1: An Enhanced Threat Intelligence Driven Hybrid Model for Information Security Risk Management, Habib EL Amin; Abed Ellatif Samhat; Maroun Chamoun; Lina Oueidat; Antoine Feghali
Paper 2: Survey and Experimentation to Compare IoT Device Model Identification Methods, Norihiro Okui; Masataka Nakahara; Ayumu Kubota
Paper 3: Preserving Data Integrity and Detecting Toxic Recordings in Machine Learning Using Blockchain, Bechir Alaya; Tarek Moulahi; Salim El khediri; Suliman Aladhadh
Paper 4: Enhancing Cybersecurity Training Efficacy: A Comprehensive Analysis of Gamified Learning, Behavioral Strategies and Digital Twins, Yagmur Yigit; Kitty Kitty Kioskli; Laura May Bishop; Nestoras Chouliaras; Leandros A. Maglaras; Helge Janicke
12.30 am -1:30 pm Lunch Break
09:00 am - 09:05 am: Welcome by the session chair/organizers
Paper 1: Efficient Binary Task Offloading Optimization in Large-Scale IoT Networks via UAV-Enhanced Mobile Edge Computing, Xiangdong Yang; Huaiwen He; Hong Shen; Aiguo Chen; Hui Tian
Paper 2: Unveiling Behavioral Transparency of Protocols Communicated by IoT Networked Assets, Savindu Wannigama; Arunan Sivanathan; Ayyoob Hamza; Hassan Habibi Gharakheili
Paper 3: Is Edge Computing Always Suitable for Image Analysis? An Experimental Analysis, Francesca Righetti and Carlo Vallati; Nirmalya Roy; Giuseppe Anastasi
10:20 am - 10:30 am Informal interaction of speakers and the audience
10:30 am - 11:00 am: Coffee Break
(Joint session with also paper submitted to NTN-6G - 4th workshop on Non-Terrestrial Networks in 6G Wireless)
Paper 1: Performance Analysis of a Cognitive Radio Assisted Cooperative NOMA UAV System, Thi My Chinh Chu; Hans-Juergen Zepernick
Paper 2: Minimizing Age of Information: Adaptive Spectrum Sharing in Ultra-Reliable and Low-Latency eVTOL Communications, Ishan Aryendu; Sudhanshu Arya; Ying Wang
Paper 3: Advancing Federated Learning: Optimizing Model Accuracy Through Privacy-Conscious Data Sharing, Rihab Saidi; Tarek Moulahi; Suliman Aladhadh; Salah Zidi
12:15 pm -12:20 pm: Closing Remarks
12:20 pm - 12:30 pm: Informal interaction of speakers and the audience
12:30 pm Close of Workshop and Lunch
2:00 pm - 2:10 pm Welcome note (Thorsten Strufe and Giang Nguyen)
Paper 1: Effect of Duration and Delay on the Identifiability of VR Motion, Mark R Miller; Vivek C Nair; Eugy Han and Cyan DeVeaux; Christian Rack; Rui Wang; Brandon Huang; Marc Erich Latoschik; James F. O'Brien; Jeremy N Bailenson
Paper 2: Threats of Extended Reality (XR) Applications to Teaching and Learning: Instructors' Perspectives (short paper), Aidrina Sofiadin
3:00 pm - 3:45 Networking and Coffee Break
Paper 1: Protecting Privacy: A Gateway to Freedom of Opinion and Expression in Virtual Reality, Hinako Sugiyama; Curtis Ferrarini; Eric Lau
Paper 2: Effect of Data Degradation on Motion Re-Identification (short paper), Vivek C Nair; Mark R Miller; Rui Wang; Brandon Huang; Christian Rack and Marc Erich Latoschik; James F. O'Brien
Paper 3: Towards Privacy-Preserving Mixed Reality: Legal and Technical Implications, Juliane Katherine Mendelsohn; Stephan Werner; Tobias Schwandt and Philipp Richter; Thomas Köllmer; Wolfgang Broll
Paper 4: Comparing Identification Accuracy Across Varying Classification Set Sizes with Multiclass AUC, Mark R Miller
5:25:00 pm - 5:30 Wrap-up
2:00 pm - 2:15 pm: Opening Remarks and Introduction
2:15 pm - 2:45 pm: Keynote Speech by Prof. Brij B. Gupta (Asia University, Taiwan)
2:45 pm - 3:05 pm Paper 1: A hybrid NFV/In-Network Computing MANO Architecture for provisioning Holographic Applications in the Metaverse, Farzaneh Ghasemi Javid; Mouhamad Dieye; Felipe Estrada-Solano;, Roch H. Glitho; Halima Elbiaze; and Wessam Ajib
3:05 pm - 3:25 pm Paper 2: First Steps Towards Game and Activity Inference on Encrypted VR Datastreams, Yushan Yang; Simon Hanisch; Mingyu Ma; Stefanie Roos; Thorsten Strufe; Giang T. Nguyen
3:30 pm - 4:00 pm: Coffee Break
4:00 pm - 4:20 pm Paper 3: Securing the Metaverse: Traffic Application Classification and Anomaly Detection, Vishal Murgai; Ventata Rama Raju Lolabhattu; Roxy Stimpson; Eishita Tripathi; Shiva Chickala
4:20 pm - 4:50 pm: Keynote Speech by Prof. Hojjat Baghban (Chang Gung University, Taiwan)
4:50 pm - 5:10 pm Paper 4: LSTM-GRU Based Efficient Intrusion Detection in 6G-Enabled Metaverse Environments, Brij B. Gupta; Akshat Gaurav;, Varsha Arya; Kwok Tai Chui
5:10 pm - 5:30 pm Paper 5: Enhanced Virtual Try-On in the Metaverse Leveraging Unet Model for Improved Cloth Detection, Akshat Gaurav; Varsha Arya; Kwok Tai Chui; Brij B. Gupta
5:30 pm - 5:50 pm Paper 6: Deep Reinforcement Learning Based Resource Allocation Method in Future Wireless Networks with Blockchain Assisted MEC Network, Prakhar Consul; Ishan Budhiraja; Deepak Garg; Sachin Sharma; Ammar Muthanna
5:50 pm - 6:00 pm: Discussion/Q&A
Organized by |
|