Schedule
Wednesday, July 2
Wednesday, July 2 9:30 - 11:00 (Europe/Rome)
DistInSys-S1: Distributed Intelligent Systems
Wednesday, July 2 9:30 - 11:00 (Europe/Rome)
ICTS4eHealth-S1: Image Analysis
- Using OpenPose for Enhancing CPR Training: a Data-Driven Approach
- A Preliminary Study on Attention Unet Based Skin Segmentation and Vital Parameters Monitoring for Enhanced Diver Safety
- Deep Learning-Based Classification for Circulating Tumor Cells
- Automated Breast Cancer Detection and Segmentation Using Image Processing Techniques
Wednesday, July 2 9:30 - 11:00 (Europe/Rome)
MoCS-S1: Management of Cloud and Smart City Systems
- Live Migration of Stateful Microservices in UAV-Assisted Networks for Enhanced Availability
- Data Quality Detector: Automating Data Quality Detection in Smart City Environment
- Immersive Education with Mixed Reality: a Case Study at a Zoological Museum
- Benchmarking Database Query Engines for Cross-Source Data Access
Wednesday, July 2 9:30 - 11:00 (Europe/Rome)
NGSME-S1: Next-Generation Multimedia Services at the Edge
Wednesday, July 2 9:30 - 11:00 (Europe/Rome)
TrustAICyberSec-S1: Trusted Computing and Artificial Intelligence applied to Cybersecurity
- Can LLMs Classify CVEs? Investigating LLMs Capabilities in Computing CVSS Vectors
- Application Integrity Verification in Confidential Computing Scenario
- An Evaluation of Deep Learning-Based Models for Intrusion Detection in Industrial Control Systems
- TPValCert: Privacy-Preserving Trusted Proxy for Public Key Certificate Validation
- Integration of Deep Learning, Machine Learning and Blockchain for VANETs
Wednesday, July 2 9:30 - 11:00 (Europe/Rome)
WAVE-S1: Web3 Applications and the eVolution of dEcentralized finance
Wednesday, July 2 11:30 - 13:00 (Europe/Rome)
DistInSys-S2: Distributed Intelligent Systems
Wednesday, July 2 11:30 - 13:00 (Europe/Rome)
ICTS4eHealth-S2: XAI for Medical and Healthcare Systems
- Enhancing AI Explainability and Performance in Pulmonary Condition Classification with Data Segmentation and Augmentation
- Towards Automated CVD Diagnosis: Deep Learning-Based ECG Feature Extraction
- Enhancing Plankton Classification with Multimodal Learning: Combining InceptionResNetV2 and Handcrafted Features with Explainability
- Visual Question Answering and XAI: Multimodal Approach for Automatic Diagnosis from Lung Radiographs
Wednesday, July 2 11:30 - 13:00 (Europe/Rome)
MoCS-S2: Management of Cloud and Smart City Systems
- Avatar-Centric Gait Authentication Framework for Secure Metaverse
- Core Services for Managing Big Data in Smart Cities During Natural Disasters
- LSTM Based Method for Forecasting Hyperlocal Air Quality in Metropolitan Cities
- Enhancing Air Quality Forecasting Using Time-Series Interpolation with Simple Moving Average and Deep Learning-Based Models
Wednesday, July 2 11:30 - 13:00 (Europe/Rome)
NGSME-S2: Next-Generation Multimedia Services at the Edge
Wednesday, July 2 11:30 - 13:00 (Europe/Rome)
TrustAICyberSec-S2: Trusted Computing and Artificial Intelligence applied to Cybersecurity
Wednesday, July 2 11:30 - 13:00 (Europe/Rome)
WAVE-S2: Web3 Applications and the eVolution of dEcentralized finance
Wednesday, July 2 14:00 - 15:30 (Europe/Rome)
ICTS4eHealth-S3: mHealth
- eHealth and GDPR: Designing a System for People with ASD to Manage Anxiety Accessing ENT Visits
- Next-Generation Healthcare: a Secure and Voice-Driven App for Seamless Patient Engagement
- A Gamified Approach to Training Caregivers of Stroke Survivors
- Analysis on Parameters Influencing Non-Immersive Virtual Reality-Based Tele-Rehabilitation in Parkinson's Disease: an Exploratory Study
Wednesday, July 2 14:00 - 15:30 (Europe/Rome)
QSNS-S1: Quantum-Secure Networks and Systems
- Optimizing Secure Elements Implementation Methods for a Seamless Post-Quantum Transition
- PQ-CAN: a Framework for Simulating Post-Quantum Cryptography in Embedded Systems
- Towards Quantum-Resistant Trusted Computing: Architectures for Post-Quantum Integrity Verification Techniques
- A Quantum-Safe Implementation of the NETCONF Protocol
Wednesday, July 2 14:00 - 15:30 (Europe/Rome)
SAIA-S1: Sensing, Algorithms, and Intelligent Applications
- Incentivizing Decentralized Privacy-Preserving Crowd-Sensing with Smart Contracts
- Listening to Emotions: Inferring User Mood Through Music Consumption Patterns
- Reinforcement Learning Based Whittle Index Policy for Scheduling Wireless Sensors
- Reimagining CRNN with Attention for Handwritten Chinese Text Recognition in Noisy Backgrounds
- ParkSense: an IoT Sensor System for Parking Occupancy and Environmental Monitoring
- Exploring the Capabilities and Limitations of Large Language Models for Zero-Shot Human-Robot Interaction
Wednesday, July 2 14:00 - 17:30 (Europe/Rome)
Tutorial #1: Novel Computing Paradigms for the Future IoT
The Internet of Things (IoT) has rapidly expanded, with applications spanning industrial automation, smart cities, healthcare, logistics, etc. By 2030, the IoT landscape is expected to host over 1 trillion devices, ranging from simple wearables to advanced UAVs. These devices will be connected through different network technologies. Also, they will demand diverse Quality of Service (QoS) requirements, in terms of latency, reliability, and security. The integration of Artificial Intelligence (AI) services along the Cloud-to-Things Continuum will necessitate new paradigms for computing, communication, and resource management, while addressing sustainability challenges such as energy efficiency, device disposal, and environmental impact. To address these challenges, this tutorial explores key advancements and strategies shaping the Pervasive IoT. Topics include: battery-less IoT and intermittent computing; the emergence of new communication technologies (such as 6G, WiFi7, and LiFi) to support diverse application scenarios; and the Cloud-to-Things Continuum (C2TC) for scalable and efficient resource management. Strategies for optimal joint computing-network resource allocation and dynamic service reconfiguration, will be required to ensure QoS compliance for critical applications, even in dynamic environments. By surveying the latest research and discussing open issues, this tutorial aims to provide insights into the innovative approaches shaping the future Pervasive IoT ecosystem.
Wednesday, July 2 14:00 - 17:30 (Europe/Rome)
Tutorial #2: Integrating Quantum Security in 6G Communication Systems: A Conceptual Framework
The tutorial will cover an in-depth study of the convergence of post-quantum cryptography (PQC) and quantum key distribution (QKD) in the 6G domain. The first part will provide background information on PQC, QKD, and B5G, and the second part will discuss the integration of these technologies into the 6G network architecture. In the second part, there will be a step-by-step demonstration of PQC integration within the user equipment communications and registration processes. There will also be a QKD demonstration in which the secure key exchange will be implemented and run within the quantum simulation environment. The participants do not need to have any prerequisite components. Application of PQC and QKD concepts in the security of telecommunication networks is an emerging topic and will be very important in the coming years as well for the development of secure 6G networks. The attendees of this tutorial will have the chance to learn more about security threats and potential techniques to provide defense against them from the perspective of 6G network infrastructures. Some special features of this tutorial are a clear link between the PQC and QKD ideas (including proper algorithm selection and establishing quantum channels) and recent developments in PQC, an overview of standardization efforts in 6G, and how these can improve the security of telecommunications networks.
Wednesday, July 2 16:00 - 17:30 (Europe/Rome)
ICTS4eHealth-S4: Machine Learning
- Deep Learning in Multiomics Sciences: Where We are, Emerging Topics, and Future Challenges
- Intelligent Gait-Based Access Control System
- Federated and Split Learning with Frugal Labelling and Label Scarcity in Healthcare Datasets
- Machine Learning Based Assessment of Cognitive Performance Under Sleep Deprivation
- A Secure and Privacy-Preserving Blockchain-Based Framework for Fraud-Resilient E-Health Systems
- Deep Learning Approaches to Enhance COVID-19 Detection
Wednesday, July 2 16:00 - 17:30 (Europe/Rome)
QSNS-S2: Quantum-Secure Networks and Systems
- Implementation of PQ/T Hybrid Signatures for Self-Sovereign Identity
- Implementation of a Post-Quantum Anonymous Verifiable Credential Framework
- Onion Routing Key Distribution for QKDN
- QKD-KEM: Hybrid QKD Integration into TLS with OpenSSL Providers
- A Parameter Study for LLL and BKZ with Application to Shortest Vector Problems
Wednesday, July 2 16:00 - 17:30 (Europe/Rome)
SAIA-S2: Sensing, Algorithms, and Intelligent Applications
- Evaluating Dialogue Adaptability: a Comparative Study of Self-Feeding Mechanisms in Federated and Centralized Chatbot Architectures
- Empowering Patients Through Data: Usability and UX of a Healthcare Visualization Tool
- A Cross-Sectional Study of Occupational Stress and Sleep Quality Among Nurses at a Medical Center Using Wearable Sensor Technology
- Supporting Data-Oriented Industrial Applications Along the Cloud Continuum
- Efficient Wild Animal Detection and Collection Using Quantized Models on Low-End Edge Devices
- A System for Monitoring and Querying LoRa Mesh Network Nodes
Thursday, July 3
Thursday, July 3 9:00 - 10:30 (Europe/Rome)
Welcome & Keynote #1: At the Edge of Everything: Unlocking Infinite Intelligence
As we accelerate into the era of 6G and hyper-connectivity, intelligence is no longer centralized. It is ambient, distributed, and increasingly agentic. This keynote explores how Edge Intelligence, Large Language Models (LLMs), and next-generation networks are converging to create a powerful new paradigm: a world where machines reason, adapt, and collaborate autonomously at the network's edge. From the battlefield to the city street, intelligent agents embedded in edge environments are already transforming critical sectors. I will delve into recent advances, including LLM-powered autonomous defense vehicles, real-time multimodal traffic cognition systems, and language-model-guided network optimization. The audience will gain insight into how techniques such as prompt engineering, federated learning, and lightweight language models are enabling secure, low-latency decision-making without compromising trust or privacy. Drawing from real-world implementations and collaborative research, this keynote outlines a bold vision for the future: a seamless edge ecosystem that brings together distributed intelligence, multimodal data, and next-generation connectivity to support responsive and scalable AI solutions. The edge is no longer the edge. It is the origin of infinite intelligence.
Thursday, July 3 10:30 - 11:00 (Europe/Rome)
PS1: Poster Session
Thursday, July 3 11:00 - 12:00 (Europe/Rome)
ICTS4eHealth-SS1: Non-contact Medical Diagnostics
- Respiration Monitoring Through Depth Camera in Moving Scenarios
- A Biopsy / Non-Biopsy Approach to Voice Disorder Classification Using Deep Learning
- Indoor Tracking for Motion-Robust Respiration Rate Extraction with FMCW Radar
Thursday, July 3 11:00 - 13:00 (Europe/Rome)
TC1: Privacy and Anonymization
- Privacy Preserving of Multi-Party Multiplication Based on Multi-Layer (K, N) Threshold Secret Sharing
- MSAnony: a Dynamic Anonymization Algorithm Supporting on-Demand Update Through Merging and Split
- A Secure and Verifiable Data Sharing Scheme Based on Cloud-Edge Collaboration in the Internet of Vehicles
- PrivGuide: a Planning Tool for Proactive Privacy Integration in the DevPrivOps Lifecycle
- Methodology for Evaluating k-Anonymity-Based Anonymization in Machine Learning Models
- Enabling Privacy-Preserving Network Anomaly Detection Through Federated Learning: a Comparative Study
Thursday, July 3 11:00 - 13:00 (Europe/Rome)
TC2: Federated Learning & Edge AI
- FedEdge-Learn: a Semi-Supervised Federated Learning Framework for Industry 5.0
- A Unified Analysis of Accelerated Methods for Federated Learning
- SyndFL: Addressing Class Imbalance to Enhance Fairness in Healthcare Image Processing Through Syndicated Federated Learning
- Blockchain Federated Learning for Sustainable Retail: Reducing Waste Through Collaborative Demand Forecasting
- Federated Learning of Decision Trees in Cooperative IoT Edge Computing
- OPALA: Optimized Pruning Adaptive Learning Approach for Federated Learning Scenarios
Thursday, July 3 11:00 - 13:00 (Europe/Rome)
TC3: AI/ML for Networking & Resource Management
- Network Traffic Matrix Imputation via Large Language Models
- A Multi-Agent Reinforcement Learning Approach for Enhanced Spectrum Resource Allocation in NR-V2X Mode 2
- Deterministic Computing Power Network Routing Algorithm Based on Hierarchical Reinforcement Learning
- OmniFORE: Attention-Based Generalization Framework for Edge-Cloud Workload Predictions
- A Reinforcement Learning Approach on Self-Optimizing Heterogeneous Networks
- Latency and Bandwidth-Aware Orchestrator for QoS-Sensitive Applications Using a Reinforcement Learning-Based Scheduler with Kubernetes
Thursday, July 3 11:00 - 13:00 (Europe/Rome)
TC4: IoT and Industrial IoT
- Cloud-Trained Neural Networks on Microcontrollers for IoT Applications: an Educational Perspective with LittleBits
- ML-Enabled Eavesdropper Detection in Beyond 5G IIoT Networks
- Highly Reliable and Mobility-Enabled Real-Time Industrial Applications via Enhanced 6TiSCH Resource Scheduling
- Edge-Assisted Key Provisioning in Industrial IoT Systems with Mobile Nodes
- From Benchmarking to Prediction: Energy Profiling of Industrial Systems Using Machine Learning
- Sense'Z: a System for Real-Time Hand Gesture Recognition with Embedded Machine Learning and IoT Applications
Thursday, July 3 12:00 - 13:00 (Europe/Rome)
ICTS4eHealth-SS2: Generative AI for Healthcare
- Evaluating LLMs for Healthcare-Related Named Entity Recognition in Brazilian Judicial Decisions
- Applying Large Language Models for Summarizing Oncology Patients' Electronic Health Records
- Fine-Tuning of a BERT Model for Oncology EHR Analysis in Brazilian Portuguese
Thursday, July 3 14:00 - 15:00 (Europe/Rome)
Keynote #2: Multi-modality approaches for medical support systems: where we are and where we are going
In this speech we will describe the transformative impact of multi-modality approaches in healthcare. Traditional single-modality methods have long limited the scope of medical decision-making, but we are now at a turning point. The convergence of advanced technologies and diverse data sources has opened unprecedented opportunities to revolutionize patient care. This keynote will examine where we are today in the integration of multi-modality approaches, focusing on their role in enhancing disease diagnosis and prognosis. By fusing medical images, bio-signals, clinical records, and other critical data, these methods provide a holistic view of a patient's condition, paving the way for truly personalized medicine. We will explore how multi-modality approaches enable a comprehensive patient profile, integrating genetic, imaging, and clinical data to inform precise, tailored treatments. Looking ahead, we will address the technical challenges in synthesizing heterogeneous data and highlight the emergence of deep learning as a groundbreaking tool for multi-modal integration. Together, we'll uncover the possibilities and potential of multi-modality in shaping the future of medical support systems.
Thursday, July 3 15:30 - 17:30 (Europe/Rome)
ICTS4eHealth-SS3: Signal Processing
- Challenges and Opportunities in Quantum-Enhanced XAI for Medical and Healthcare Systems
- Enhancing Alzheimer's Diagnosis Through Spontaneous Speech Recognition: Deep Learning Approach with Data Augmentation
- Quality Assurance for Home Spirometry Using Machine Learning
- Machine Learning-Based Classification of Cognitive Workload via in-Ear EEG
- AI-Based Low-Cost Approach for Cardiac Anomaly Detection
Thursday, July 3 15:30 - 17:30 (Europe/Rome)
TC5: Routing & Traffic Management
- Dhana: an Economic-Oriented Approach for Traffic Management Using Software-Defined Networking
- Energy Efficient Temperature Aware Routing in Wireless Networks
- Bi-Level Traffic Steering Decision in High-Mobile and Ultra-Dense Multi-RAT Networks
- FLASK-Sketch: Identifying Sparse Superspreaders in High Speed Network
- Two-Stage Deep Q Learning Routing in Entanglement Networks
- EVAOR: an Efficient and Void-Avoidable Opportunistic Routing Protocol for Underwater Wireless Sensor Networks
Thursday, July 3 15:30 - 17:30 (Europe/Rome)
TC6: Security and Anomaly Detection
- BERT for Dynamic Malware Detection: a Sequence-Based Classification Approach
- Epidemic Oracle: an Approach to Boost Security and Performance of Delay Tolerant Networks
- AuRA: Remote Attestation over EDHOC for Constrained Internet-of-Things Use Cases
- MV-TFNet: Malware Traffic Detection Based on Multi-View Flow Sequence and Time-Frequency Feature Fusion
- AnomalyTrack: Scalable and Self-Adaptive Anomaly Detection in Large-Scale 5G Networks
- DarkDC: Analysis of Scanning Behavior Subject Portrait Based on Deep Clustering
Thursday, July 3 15:30 - 17:30 (Europe/Rome)
TC7: LLMs and AI Applications
- Joint Communication and Sensing in Metaverse over UAVs: a Deep Reinforcement Learning Approach
- UAV-Assisted Real-Time Disaster Detection Using Optimized Transformer Model
- LLM-Enabled Data Transmission in End-to-End Semantic Communication
- Integrating Language Models for Enhanced Network State Monitoring in DRL-Based SFC Provisioning
- Leveraging Multimodal-LLMs Assisted by Instance Segmentation for Intelligent Traffic Monitoring
- Improving Diversity and Efficiency in Content-Based Recommender Systems: a Genetic Algorithm Approach
Friday, July 4
Friday, July 4 9:00 - 10:00 (Europe/Rome)
Keynote #3: Retrospective and Future Challenges and Opportunities from a Quarter of Century of Systems Security Research
This talk will go through a journey of critical developments in systems security over the last 25 years. The journey starts from a summary of high-level objectives, protecting user privacy and sensitive information and ensuring the continuous operation of critical infrastructures. It then reviews key underpinnings - cryptography, interoperability via standardization, wide-spread adoption of open-source and commoditized hardware components. Recently, several challenges to these underpinnings have become evident: traditional asymmetric cryptography is at risk due to the emergence of quantum computing. Supply chain security, for both hardware and software components are recognized as a critical area of concern. Finally, the rise and accelerated adoption of AI is imposing additional challenges while at the same time offering huge opportunities. We discuss how the systems security community is trying to address these challenges, including the transition to Post Quantum Cryptography, securing AI models and systems and leveraging AI for Security.
Friday, July 4 10:00 - 10:30 (Europe/Rome)
PS2: Poster Session
Friday, July 4 10:30 - 12:30 (Europe/Rome)
TC10: Quantum and Next-Gen Communication
- Analysis of Eavesdropping Probability in QKD and Its Implications for Post-Processing Strategies
- Key Management System for Continuous Variable Quantum Key Distribution
- Robust Multimodal Information Bottleneck for Satellite-to-Ground Task-Oriented Communication
- Astraeus: Rapid Container Deployment with Lazy Pulling in Satellite Edge Cloud
- Routing in Memoryless Quantum Networks: a Lexicographic Approach with Fidelity Guarantee
- Exploring Communication Efficient Methods for Homomorphic Encryption Federated Learning
Friday, July 4 10:30 - 12:30 (Europe/Rome)
TC8: Autonomous Sensing and Cyber Intelligence
- Energy-Efficient Trajectory Design for Multi-UAV Assisted IoT Data Collection: a Multi-Agent Deep Reinforcement Learning Approach
- Multi-Objective Optimization for Charging Paths Planning and Energy Efficiency in UAV-Assisted Wireless Rechargeable Sensor Networks
- Secure Data Collection in UAV-Assisted IoT via Diffusion Model-Enabled Deep Reinforcement Learning
- Multi-Modal Fake News Detection with LLMs and Knowledge-Aligned Attention Networks
- LLM-QGraph: Threat Intelligence Query Graph Construction with Large Language Models
- Addressing Challenges in FANETs - Applied UAV Experiments with Cost-Effective Hardware
Friday, July 4 10:30 - 12:30 (Europe/Rome)
TC9: Network Orchestration and Management
- Optimal Provisioning of Hybrid Service Function Chains with Guaranteed Disaster Resilience
- Extending the TOSCA Standard to Support the Orchestration of Distributed Applications in Multi-Cluster Environments
- A Serverless Quantization-as-a-Service Model to Run Compression Jobs for Edge Intelligence
- MLCOps: a Platform to Support Cloud Continuum Machine Learning Operations
- Scalable Deterministic Task Offloading and Resource Allocation in the IoT-Edge-Cloud Continuum
- Efficient Request Management in Data Center Elastic Optical Networks
Friday, July 4 13:30 - 15:30 (Europe/Rome)
TC11: 5G and Beyond 5G Networks
- Predictive OMS Switchover Towards Proactive Disaster Recovery in 5G Networks
- ANFIS-Based Regression for vBS Computing Usage Prediction in Open Radio Access Networks
- Predictive Dynamic Scheduling for Deterministic Communications in Beyond 5G
- CP-OFDM PUSCH Model-Based Design for 5G New Radio Transmitter on ZCU216 RFSoC
- Mobility-Oriented Virtual Cell Handover Management in 5G Vehicular Networks
- Optimizing Path Planning and VNF Allocation in 6G for Autonomous Vehicles: an Analysis of Rainbow-DQN Training Strategies
Friday, July 4 13:30 - 15:30 (Europe/Rome)
TC12: Digital Twin and Advanced Concepts
- Price of Anarchy for Green Digital Twin Enabled Logistics
- Building Network Digital Twin Architectures from Architectural Representation
- Multitask Age of Federated Information via Game Theoretic Distributed Control
- A Dynamic Bayesian Deep Learning Approach to Structural Health Monitoring
- Enabling Hardware-in-the-Loop for Digital Substations: Virtual Protection Tester
- TADC-SBM: a Time-Varying, Attributed, Degree-Corrected Stochastic Block Model
Friday, July 4 13:30 - 15:30 (Europe/Rome)
TC13: Network Performance and Measurement
- Performance Analysis of Live Streaming Controllers Using TCP and QUIC Transport Protocols
- HyPM: Hybrid Performance Metric Transmission in Low-Power Wireless Networks
- SkyNetPredictor: Network Performance Prediction in Avionic Communication Using AI
- Assessing the Performance of LiFi Wireless Networks Through Experimental Measurements
- Enhancing Internet Traffic Prediction Accuracy Using an Ensemble Approach with a Novel Weight Integration Method and Temporal Convolutional Networks
- Data-Driven Joint Optimization of Channel Estimation and Signal Detection for Robust OFDM Receivers
Friday, July 4 16:00 - 18:00 (Europe/Rome)
TC14: IoT Security and Attacks
- Stratification and Profiling of IoT Botnet Variants
- Dynamics of Large-Scale DDoS Attacks Orchestrated by IoT Botnets
- Securing DevOps by Identifying the Most Common Vulnerabilities in CI/CD Pipelines
- Exposing Data Poison Threats in Smart Home Recommendation Systems
- Insight of Command & Control Behavior: Identifying Red-Team Traffic from Sub-Flow Aspect
- How Risky is It? a Closer Look at Game anti-Cheat Software
Friday, July 4 16:00 - 18:00 (Europe/Rome)
TC15: Network Programmability & Acceleration
- An eBPF-Based Programmable Network Architecture for OT Digital Resilience Use-Cases
- Dataplane-Only DNS Caching in P4
- Farrow-Based True Time-Delay FPGA Wideband Digital Beamforming Architecture
- SV-NPR: an Open-Set RF Fingerprint Identification Framework Based on Siamese Network
- IRSA over Spreading Factors for Spatio-Temporal SIC in Scalable LoRaWAN IoT Networks
- An Efficient and Resilience Mechanism for Immersive Service Using Microservice Chaining
Friday, July 4 16:00 - 18:00 (Europe/Rome)
TC16: Smart Systems and Urban Applications
- Evaluating Angle of Arrival and Distance with Ultra Wide Band Technology for Indoor Localization
- Design and Implementation of Scalable and Low-Latency LoRaWAN IoT Architecture for Smart Cities
- Data-Driven Approaches for Bus Transportation Demand Forecasting: Enhancing Urban Mobility with Machine Learning Algorithms
- Enhancing 2-Wheeler Safety Through Adaptive Data Management with Fuzzy Logic
- Multipres: Recommender Platform for Smart Tourism
- On the 2-Wheelers Sensing for the Roads Safety
Saturday, July 5
Saturday, July 5 9:00 - 10:00 (Europe/Rome)
Keynote #4: From Clouds for 5G Systems to Clouds for 6G Systems: A Bumpy Road Ahead
Each generation of telecommunication systems brings additional levels of sophistication to the services offered to end-users. The Ultra Reliable Low Latency Communications (URLLC) services (e.g. remote robotic surgery) promised by the fifth-generation (5G) are compelling examples. They are a far cry from the Short Message Service (SMS) offered by the second-generation (2G), and the simple multimedia services offered the third and fourth generations (3G/4G). The deployment of 6G systems is expected for the 2030s, and much more sophisticated services (e.g. immersive holographic type - communications services) are expected. Clouds are the pillars of 5G and Beyond (5GB) due to the fact that features such as elasticity, scalability, and provisioning on-demand can successfully tackle the everlasting challenges such as lack of flexibility and over provisioning faced by telecommunication systems. 6G requirements are now known and are far more stringent than their 5G counterparts. Expected end-to-end latency for instance is now 0.1 milli-second instead of the 1 milli-second that is hardly met nowadays. Clouds for 5G will certainly fail when it comes to meeting 6G challenges. Thus, the need of a new generation of clouds for 6G. However, the road ahead from clouds for 5G to clouds for 6G will certainly be bumpy due to the numerous challenges. In the first part of this keynote speech, we will introduce the expectations of 6G systems on clouds, and discuss why clouds for 5G cannot meet them. In the second part, we will sketch the research directions that may bring us to clouds for 6G. The third part will show that clouds alone will not be sufficient for 6G. It will be necessary to complement them by other paradigms. In-Network Computing (INC) is a good candidate. This is likely to bring us to a paradigm of "cloud-edge continuum enriched by INC" for 6G.
Saturday, July 5 10:00 - 10:30 (Europe/Rome)
PS3: Poster Session
Saturday, July 5 10:30 - 12:30 (Europe/Rome)
TC17: Energy Efficiency and Resource Optimization
- AI-Driven Low-Cost Sensors for Wildfire Detection: Performance Issues and Energy Efficiency
- TORNADO: TOSCA-Enabled Orchestration for RAN Network Functions Automating DevOps in O-Cloud
- Predicting Transient Overloads Related to ADAS in Time-Sensitive Vehicular Networks
- High-Level Power Control in Energy Harvesting and Wireless Power Transmission IoT Star Networks
- A High-Level Data Placement Approach for Load Balancing on Parallel File Systems
- Energy-Efficient Deep Learning for Traffic Classification on Microcontrollers
Saturday, July 5 10:30 - 12:30 (Europe/Rome)
TC18: Emerging Technologies and Concepts
- Next-Gen Space-Based Surveillance: Blockchain for Trusted and Efficient Debris Tracking
- On the Impact of Marketplaces on the Availability of NFT Assets on the IPFS Network
- Unlocking Advanced Graph Machine Learning Insights Through Knowledge Completion on Neo4j Graph Database
- Multi-Cluster MLOps Platform for Industry 5.0
- LOPRIVE: LOA-Based Priority-Driven Task Allocation in the Vehicular Edge
- Context-Aware Data Exchange in the Energy Sector: a Retrieval-Augmented Ontology Approach
Saturday, July 5 10:30 - 12:30 (Europe/Rome)
TC19: Network Orchestration and Management S2
- DDPG-Based Automatic Antenna Tilt Angle Configuration with Counterfactual Explanations
- Dike: Deep Reinforcement Learning for Function Scheduling in SLO-Targeted Serverless Edge Computing
- Adaptive Multi-Connectivity Scheduling for Low-Latency, High-Reliability Communication in Dynamic Network Environments
- SLO-Targeted Congestion Control with Deep Reinforcement Learning
- OLEO: Optimizing LEO Satellites Offloading of Cloud-Edge Applications
- RRC Signaling Storm Detection in O-RAN
Saturday, July 5 10:30 - 12:30 (Europe/Rome)
TC20: Federated Intelligence and Security in Distributed Systems
- Fuse and Federate: Enhancing EV Charging Station Security with Multimodal Fusion and Federated Learning
- DEDT: Concept Drift Detection with Difference Embedding and Drift Type Awareness
- Trust Management and Federated Resource Utilization in the Cloud Edge Computing Continuum
- MTDos-SDN: Moving Target Defense for Mitigating Distributed Denial Service in SDN
- Zero-Day Botnet Attack Detection in IoV: a Modular Approach Using Isolation Forests and Particle Swarm Optimization
Saturday, July 5 10:30 - 12:30 (Europe/Rome)
Tutorial #3: From Automation to Orchestration: The New Frontiers of Network Softwarization
The importance of software in communication environments has significantly increased over the past decades, thanks to the widespread adoption of virtualization techniques, Cloud-native solutions, and advancements such as service-based architecture, user/control plane decoupling, and network slicing, giving rise to the concept of Network Softwarization. Software-defined Networking (SDN) advocates for a logically centralized view of network infrastructure and resources, utilizing open, standardized interfaces to control packet processing and forwarding. Network Function Virtualization (NFV) imagines software-based network elements and functions, applying a Cloud-like (*aaS) approach to virtualized network infrastructures, offering benefits such as scalability, elasticity, mobility, and replicability. These concepts collectively contribute to Network Programmability, facilitating a programmatic approach to network resource management and service deployment. The goal of this tutorial is twofold: on one side, to review how network management and automation evolved towards a more comprehensive network orchestration approach; on the other side, to show participants that they too can be part of this software (r)evolution in communication networks, demonstrating how easy it can be to "build your own SDN controller" leveraging the available architectures and technologies. This tutorial will address current challenges of network orchestration, such as interoperability and automation across multi-vendor, multi-technology environments characterized by dynamic resource availability, typical of edge/fog computing scenarios. Then, to effectively meet the demands of network orchestration, the idea of disaggregating the network control plane will be illustrated, and a playground framework will be introduced for the design and evaluation of microservice-based SDN controllers, demonstrating how to use it to effectively develop and test customized functionalities for a fully fledged SDN controller running in a sandboxed environment. The ultimate objective is to facilitate participants in understanding the current developments and best practices - and anticipating the upcoming ones - in network softwarization, so that they can drive innovation in their field of work.
Saturday, July 5 10:30 - 12:30 (Europe/Rome)
Tutorial #4: Attested TLS and Formalization
Transport Layer Security (TLS) is a widely used protocol for secure channel establishment. However, TLS lacks any inherent mechanism for validating the security state of the endpoint software and its platform. To overcome this limitation, recent works have combined remote attestation (RA) and TLS, named attested TLS. We present the state-of-the-art attested TLS protocols in an emerging application domain, namely confidential computing, and use federated learning as the running example. We present an approach based on ProVerif to discover attacks on such protocols. After introducing network security (via TLS 1.3) and endpoint security (via RA), the tutorial explores the ways to combine the two protocols. Then, we introduce formal methods and the approach to discover protocol-level attacks in attested TLS protocols. Finally, we present open research problems in this domain for the attendees.
Saturday, July 5 13:30 - 14:30 (Europe/Rome)
Keynote #5: Parallel Computing Systems Software for Science, AI and Beyond
Recent advances in computational methods for CSE and AI - such as computational drug discovery and LLMs - combined with new parallel computing hardware like GPUs, demand more than just parallel programming software (e.g., CUDA, MPI, Hadoop) to harness computing power for these applications. To ensure programmer productivity, parallel programming software relies on critical parallel computing system software - compilers, runtime systems, job schedulers - that enable performance, efficiency, and scalability, correctness, and resilience of the application. Moreover, as applications grow in complexity and computational demands evolve, applications require support of such system software across different parallel programming abstraction layers, from intra-node computation to cluster-level parallelism to cross-datacenter work orchestration. This keynote explores advances in system software frameworks that have enabled traditional scientific and emerging AI workloads. We will focus discussing systems software innovations across four layers of programming abstraction: (1) low-level parallel programming models (e.g. CUDA, OpenMP, MPI), (2) libraries for base-language-parallelism (e.g. Charm, Kokkos, C++ and Fortran StdPar), (3) Domain-Specific Libraries (DSLs) offering parallel programming (e.g. Triton, PyTorch, PetaBricks), and (4) AI agent and scientific workflow orchestration tools (e.g. NVIDIA's AgentIQ, Pegasus). In doing so, we will share real-world parallel computing systems software from our research that has supported production workloads in science and AI at the Department of Energy (DOE), and we will discuss how such systems software used in the DOE has impacted systems software for today's rapidly evolving computing needs to enable high-demand genAI in industry. We will close with a perspective of how current parallel computing system software will extend to emerging and future application domains such as robotics, blockchain, and other domains involving real-time computing systems.