Tentative Conference Program

Program at a glance
Thursday, June 30 Friday, July 1 Saturday, July 2 Sunday, July 3
Registration 10.30-18.00 Registration 8:00-17:00 Registration 8:00-13:00 Registration 8:00-15:00
08:15-08:45 Opening ceremonyRoom: Salon des Roses A
08:45-09:45 Keynote #1. Co-Design for Edge Intelligence: Perception, Control, Computing (P) Speaker: Marilyn Wolf, Elmer E. Koch Professor of Engineering Director, School of Computing University of Nebraska -- Lincoln, USA Chair: Dimitros Serpanos, University of Patras, GreeceRoom: Salon des Roses A Keynote #3. Post-Quantum Cryptography: What to Expect from this Unprecedented Migration (P) Speaker: Rafael Misoczki, Google, California, USA Chair: Michael Kounavis, Meta Platforms, New York, NY, USARoom: Salon des Roses A Keynote #4. Federated Learning for Smart City Applications (V) Speaker: Mohsen Guizani, Professor and IEEE Fellow, Mohamed Bin Zayed University of Artificial Intelligence (MBZUAI), UAE Chair: Christos Douligeris, University of Piraeus, Greece Virtual Room: Salon des Roses AIEEE Computer Society meeting
(by invitation)Room: Nefeli B
10.00-11.30 Session #1. Security I (P) Session Chair: Dimitrios Kallergis, University of West Attica, GreeceRoom: Salon des Roses ASession #2. Wireless networks (P) Session Chair: Ioannis Papaefstathiou, Associate Professor at Aristotle University of Thessaloniki (AUTH), GreeceRoom: Nefeli ATutorial #2. Distributed Resource Orchestration in Realistic 6G Wireless Systems: From Practice, to Theory, to Practice (P) Speaker: Symeon Papavassiliou, National Technical University of Athens, Greece Chair: Room: Nefeli BICTS4eHealth Session #4. Systems for eHealth (V) Session Chair: Prof. Rui Jesus, University of Aveiro, PortugalVirtual Room: Tsabika Session #5. Adhoc networks & Internet of Things I (P) Session Chair: Symeon Papavassiliou, National Technical University of Athens, GreeceRoom: Salon des Roses ASession #6. Security I (V) Session Chair: Stefano Chessa, University of Pisa, ItalyVirtual Room: Nefeli BSession #7. Cellular & 5G I (V) Session Chair: Fan-Hsun Tseng, National Cheng Kung University, TaiwanVirtual Room: TsabikaTutorial #4. Malware Analysis and Detection (P) Speaker: Dimitros Serpanos, University of Patras, Greece Chair: Room: Nefeli A Session #17. Cloud networks & computing II (V) Session Chair: Fen Zhou, IMT Nord Europe, Institut Mines-Télécom, University of Lille, FranceVirtual Room: Salon des Roses A Session #18. Network Applications & Services (V) Session Chair: Robson de Grande, Brock University, CanadaVirtual Room: Nefeli A
IEEE ISCC 2022-Computer Society (CS) Young Professional(YP) Meetup Room: Nefeli B
Session #19. Unmanned Aerial Networks & Applications II (V) Session Chair: Konstantinos Oikonomou, Ionian University, GreeceVirtual Room: Tsabika
11:30-12:00ICTS4eHealth Session #1. Signals (P)Session Chair: Antonio Celesti, University of Messina, ItalyRoom: Nefeli ADistInSys (P), Room: Nefeli B
SMS I (P), Room: Tsabika   (11:00-12:30)

( ICTS4eHealth and
DistInSys ends at 13:30 )
Coffee Break
12.00-13:30Session #3. Security II (P) Session Chair: Massimo Villari, University of Messina, ItalyRoom: Salon des Roses A Session #4. Cloud Networks & Computing (P) Session Chair: Theodoros Karvounidis, University of Piraeus, Greece Room: Nefeli A ICTS4eHealth Session #5. Signal and image processing (V)Session Chair: Muhammad Salman Haleem, University of Warwick, United KingdomVirtual Room: Tsabika Tutorial #2. (continued)Room: Nefeli B Session #8. Adhoc networks & Internet of Things II (P) Session Chair: Fabrice Theoleyre, CNRS, Paris, FranceRoom: Salon des Roses A Session #9. Security II (V) Session Chair: Panayiotis Kotzanikolaou, University of Piraeus, Greece Virtual Room: Nefeli ASession #10. Cellular & 5G II (V) Session Chair: Dimitris Zorbas, Nazarbayev University, KazakhstanVirtual Room: Nefeli B Session #25. Cloud networks & computing I (V) Session Chair: Rosa Mavropodi, University of Piraeus, GreeceVirtual Room: Tsabika Session #20. Cellular Networks (P) Session Chair: George C. Polyzos, Athens University of Economics and Business, GreeceRoom: Salon des Roses A Tutorial #5. Trusted Federated Identity Management in services and SDN (P)Speaker: Bruno Sousa, University of Coimbra, Portugal Chair: Room: Nefeli A
IEEE CS Meeting
(by invitation) Room: Nefeli B

Session #24. Core Networks (V) Session Chair: Aggeliki Sgora, Ionian University, GreeceVirtual Room: Tsabika
13:30-14:30 Lunch
14:30-16:00 Tutorial #1. Self-Sovereign Identity (SSI), Decentralized Identifiers, and Verifiable Credentials with Applications to Access Control, Web Services, the Internet of Things, and Smart Cities (P)Speaker: George C. Polyzos, Athens University of Economics and Business, Greece Chair: Room: Salon des Roses AICTS4eHealth Session #2. Algorithms and systems for eHealth (P)Session Chair: Linda Senigagliesi, Università Politecnica delle Marche, ItalyRoom: Nefeli A MoCS I, (P) Room: Nefeli B Keynote #2. Leveraging Cloud, Fog and Mist Computing for Time-Critical Applications: Resource Allocation and Scheduling Challenges (P) Speaker: Helen D. Karatza, Professor Emeritus Department of Informatics Aristotle University of Thessaloniki, Greece Chair: Periklis Chatzimisios, International Hellenic University, Greece Room: Salon des Roses A Poster & Demo (P) Room: Nefeli B(15:30-17:30) Session #11. Unmanned Aerial Networks & Applcations I (V) Session Chair: Dimitris Zorbas, Nazarbayev University, KazakhstanVirtual Room: Salon des Roses A Session #12. Security III (V) Session Chair: Laura Ricci, University of Pisa, Italy Virtual Room: Nefeli ASession #13. Artificial Intelligence (V) Session Chair: Antonio Montieri, University of Napoli Federico II, ItalyVirtual Room: Nefeli B
Cultural Program:
Half-day excursion ~14:30-20:00
Session #22. Energy sustainability (P) Session Chair: Fabrice Theoleyre, CNRS, FranceRoom: Salon des Roses A Tutorial #5. (continued)Room: Nefeli A Session #21. Network application & services (P) Session Chair: Dimitrios Kallergis, University of West Attica, GreeceRoom: Nefeli B Session #23. Security V (V) Session Chair: Periklis Chatzimisios, International Hellenic University, GreeceVirtual Room: Tsabika
Coffee break
(15:30-16:00)
16:00-16:30 Coffee Break Security Roundtable Room: Salon des Roses A(ends at 17:30)

Tutorial #3. Misbehavior Detection Systems and Security for Vehicular Communication Networks (P)Speaker: Yi Qian, University of Nebraska-Lincoln, USAChair: Room: Nefeli A(ends at 18:30)

Poster & Demo (V)Chair: Dimitrios Zorbas, Nazarbayev University, KazakhstanVirtual Room: Nefeli B(ends at 17:30)

ICTS4eHealth Session #6. Signal processing (V)Session Chair: Davide Piaggio, University of Warwick, United KingdomVirtual Room: Tsabika(ends at 17:30)

Virtual Coffee Break Coffee Break
16:30-18:00 Tutorial #1. (continued)Room: Salon des Roses AICTS4eHealth Session #3. Systems for eHealth (P)Session Chair: Andreia Pinto, University of Porto,PortugalRoom: Nefeli AMoCS II (P) / Pediswesa (P) Room: Nefeli B
SMS II (P), Room: Tsabika (ends at 17:30)
Session #14. Core & Fog Networks (V) Session Chair: Armir Bujari, University of Bologna, ItVirtual Room: Salon des Roses A Session #15. Security IV (V) Session Chair: Panayiotis Gotsiopoulos, University of Piraeus, GreeceVirtual Room: Nefeli A Session #16. Signal Processing & Cellular Networks (V) Session Chair: Eirini Eleni Tsiropoulou University of New Mexico, USAVirtual Room: Nefeli B Closing Ceremony
(Awards, ISCC 2023)Room: Salon des Roses A(ends at 17:15)
18:30-20:00 Welcome Reception
20:00-22:00 Welcome Drink (Mozaik cocktail bar ) Gala dinner Steering committee dinner
(by invitation)
Session Details (main track)

Session #1: Security I (P)

Date/Time: July 1st, from 10:00 to 11:30
Room: Salon des Roses A
Session Chair: Dimitrios Kallergis, University of West Attica, Greece
SMOTE-Stack for Network Intrusion Detection in an IoT Environment
Sulyman Age Abdulkareem (University of Surrey, United Kingdom (Great Britain)), Chuan Heng Foh (University of Surrey, United Kingdom (Great Britain)), Francois Carrez (University of Surrey, United Kingdom (Great Britain)), Klaus Moessner (University of Surrey, United Kingdom (Great Britain)) On Metadata Privacy in Instant Messaging
Marlon C. Domenech (Federal University of Parana (UFPR), Brazil), André Grégio (Federal University of Parana & University of Campinas, Brazil), Luis Carlos Erpen De Bona (Federal University of Paraná, Brazil) An Energy Efficiency Analysis of the Blockchain-Based eXtended Triple Diffie-Hellman Protocol for IoT
Armando Ruggeri (University of Messina, Italy), Antonino Galletta (University of Messina, Italy), Lorenzo Carnevale (University of Messina, Italy), Massimo Villari (University of Messina, Italy) A Fully Decentralized Architecture for Access Control Verification in Serverless Environments
Carlo Mazzocca (University of Bologna, Italy), Andrea Sabbioni (University of Bologna, Italy), Michele Colajanni (University of Bologna, Italy), Rebecca Montanari (University of Bologna, Italy), Antonio Corradi (University of Bologna & CIRI ICT, Italy) Secure, Mass Web of Things Actuation Using Smart Contracts-Based Digital Twins
Iakovos Pittaras (Athens University of Economics and Business, Greece), Nikos Fotiou (Athens University of Economics and Business, Greece), Christos Karapapas (Athens University of Economics and Business, Greece), Vasilios A. Siris (Athens University of Economics and Business, Greece), George C. Polyzos (Athens University of Economics and Business, Greece)

Session #2: Wireless networks (P)

Date/Time: July 1st, from 10:00 to 11:30
Room: Nefeli A
Session Chair: Ioannis Papaefstathiou, Associate Professor at Aristotle University of Thessaloniki (AUTH), Greece
Information Bottleneck Optimization of a Finite Bit Resolution Fast Fourier Transform
Clemens-Konrad Mueller (University of Rostock, Germany), Steffen Steiner (University of Rostock, Germany), Volker Kuehn (University of Rostock, Germany) DyPRO: Dynamic Probing Planning for In-Band Network Telemetry
Leandro Dallanora (UNIPAMPA, Brazil), Ariel Goes de Castro (Federal University of Pampa, Brazil), Roberto Iraja Tavares da Costa Filho (Federal University of Rio Grande do Sul, Brazil), Arthur Francisco Lorenzon (Federal University of Pampa, Brazil), Fábio Diniz Rossi (Federal Institute of Education, Science and Technology Farroupilha, Brazil), Marcelo Caggiani Luizelli (Federal University of Pampa, Brazil) Network-Controlled Physical-Layer Security: Enhancing Secrecy Through Friendly Jamming
Sayed Amir Hoseini (University of New South Wales, Australia), Parastoo Sadeghi (University of New South Wales, Australia), Faycal Bouhafs (University of New South Wales, Australia), Neda Aboutorab (University of New South Wales, Australia), Frank den Hartog (University of New South Wales & DoVes Research, Australia) Multi-Channel Learning with Preprocessing for Automatic Modulation Order Separation
Gizem Sümen (Istanbul Technical University & Informatics and Information Security Research Center (BILGEM), Turkey), Burak Ahmet Çelebi (Istanbul Technical University & Informatics and Information Security Research Center (BILGEM), Turkey), Gunes Karabulut Kurt (Ecole Polytechnique de Montreal, Canada), Ali Gorcin (Yildiz Technical University, Turkey), Semiha Tedik Başaran (Istanbul Technical University, Turkey) A Spectrum Analysis Approach for the Median Problem in Modern Network Environments
Konstantinos Oikonomou (Ionian University, Greece)

Session #3: Security II (P)

Date/Time: July 1st, from 12:00 to 13:30
Room: Salon des Roses A
Session Chair: Massimo Villari, University of Messina, Italy
Automating Environmental Vulnerability Analysis for Network Services
Dimitris Koutras (University of Piraeus & UPRC, Greece), Christos Grigoriadis (University of Piraeus, Greece), Michalis Papadopoullos (National Technical University of Athens, Greece), Panayiotis Kotzanikolaou (University of Piraeus, Greece) Mollywood: Subtitle as an Attack Vector
Elham Arshad (University of Trento, Italy), Giuliano Turri (University of Trento, Italy), Bruno Crispo (Universita di Trento & IT00340520220, Italy) Avoiding Notorious Content Sources: A Content-Poisoning Attack Mitigation Approach
Ioanna Angeliki Kapetanidou (Democritus University of Thrace & ATHENA Research and Innovation Center, Greece), Stavros Malagaris (Democritus University of Thrace, Greece), Vassilis Tsaoussidis (Democritus University of Thrace, Greece) A False Data Injection Attack Detection Approach Using Convolutional Neural Networks in Unmanned Aerial Systems
Chafiq Titouna (University of Paris, France), Farid Nait-Abdesselam (University of Missouri Kansas City, USA) Making Citizens' Systems More Secure: Practical Encryption Bypassing and Countermeasures
Marios Adam Sirgiannis (Aristotle University of Thessaloniki, Greece), Charalampos Manifavas (Foundation for Research and Technology - Hellas, Greece), Ioannis Papaefstathiou (Aristotle University of Thessaloniki, Greece)

Session #4: Cloud Networks & Computing (P)

Date/Time: July 1st, from 12:00 to 13:30
Room: Nefeli A
Session Chair: Theodoros Karvounidis, University of Piraeus, Greece
Towards the Realization of Converged Cloud, Edge and Networking Infrastructures in Smart MegaCities
Panagiotis Kokkinos (National Technical University of Athens & University of Peloponnese, Greece) B-Scale: Bottleneck-Aware VNF Scaling and Flow Routing in Edge Clouds
Chen Chen (Loughborough University, United Kingdom (Great Britain)), Lars Nagel (Loughborough University, United Kingdom (Great Britain)), Lin Cui (Jinan University, China), Fung Po Tso (Loughborough University, United Kingdom (Great Britain)) BenchPilot: Repeatable & Reproducible Benchmarking for Edge Micro-DCs
Joanna Georgiou (University of Cyprus, Cyprus), Moysis Symeonides (University of Cyprus, Cyprus), Michalis Kasioulis (University of Cyprus, Cyprus), Demetris Trihinas (University of Nicosia, Cyprus), George Pallis (University of Cyprus, Cyprus), Marios Dikaiakos (University of Cyprus, Cyprus) Private 5G Solutions for Mobile Industrial Robots: A Feasibility Study
Peter Sossalla (Technische Universität Dresden, Germany), Justus Rischke (Technische Universität Dresden, Germany) Fabian Baier (Volkswagen AG, Germany), Sebastian A. W. Itting (Technische Universität Dresden, Germany), Giang T. Nguyen (Technische Universität Dresden, Germany), Frank H.P. Fitzek (Technische Universität Dresden & ComNets - Communication Networks Group, Germany) Modeling the End-To-End Energy Consumption of a Nation-Wide Smart Metering Infrastructure
Adrien Gougeon (University Rennes, Inria, India), François Lemercier (CNRS, IRISA, France), Anne Blavette (CNRS, SATIE, France), Anne-Cécile Orgerie (CNRS & IRISA, France)

Poster & Demo (P)

Date/Time: July 1st, from 15:30 to 17:30
Room: Nefeli B
Demo: Usage Control Using Controlled Privacy Aware Face Recognition
Arpad Müller and Wisam Abbasi (IIT-CNR, Italy); Andrea Saracino (Istituto di Informatica e Telematica, Italy) Wi-Fi Rate Adaptation Using a Simple Deep Reinforcement Learning Approach
Rúben M Queirós (INESC TEC and FEUP, Portugal); Eduardo Nuno Almeida (INESC TEC and Faculdade de Engenharia, Universidade Do Porto, Portugal); Helder Fontes (INESC TEC and FEUP, Portugal); José Ruela (INESC Porto, Portugal); Rui Campos (INESC TEC and Faculty of Engineering, University of Porto, Portugal) Demo: The RAINBOW Analytics Stack for the Fog Continuum
Moysis Symeonides (University of Cyprus, Cyprus); Demetris Trihinas (University of Nicosia, Cyprus); Joanna Georgiou, Michalis Kasioulis, George Pallis and Marios Dikaiakos (University of Cyprus, Cyprus); Theodoros Toliopoulos (Aristotle University of Thessaloniki, Greece); Anna-Valentini Michailidou (University of Thessaloniki, Greece); Anastasios Gounaris (Aristotle University of Thessaloniki, Greece) Re-Configuration from the Edge: Alternative Software Models for Time-Sensitive IoT Applications
Christos Tselikis (University of Piraeus, Greece); Sarandis Mitropoulos (Ionian University, Greece); Christos Douligeris (University of Piraeus, Greece); Leandros A. Maglaras (De Montfort University, United Kingdom (Great Britain)) Using MACsec to Protect a Network Functions Virtualisation Infrastructure
Antonio Lioy, Ignazio Pedone and Silvia Sisinni (Politecnico di Torino, Italy) Poster SIMPATICO 3D
Ester Zumpano (University of Calabria, Italy); Pasquale Iaquinta (e way Enterprise Business Solutions, Italy); Luciano Caroprese (University of Calabria, Italy); Giuseppe Lucio Cascini (University of Catanzaro, Italy); Francesco Dattola, Ivana Pellegrino and Miriam Iusi (e way Enterprise Business Solutions, Italy); Pierangelo Veltri (Università Magna Graecia, Italy); Eugenio Vocaturo (CNR- Nanotec, Italy)

Poster & Demo (V)

Date/Time: July 1st, from 16:00 to 17:30
Virtual Room: Nefeli B
Flexible Function Estimation of IoT Malware Using Graph Embedding Technique
Kei Oshio and Satoshi Takada (Kyushu University, Japan); Chansu Han and Akira Tanaka (National Institute of Information and Communications Technology, Japan); Junichi Takeuchi (Kyushu University, Japan) Demo: Automated Multi-Site E2E Orchestration of Hybrid Network Services Mixing PNF, VNF and CNFs
Jorge Baranda and Luca Vettori (Centre Tecnològic de Telecomunicacions de Catalunya (CTTC/CERCA), Spain); Josep Mangues-Bafalluy (Centre Tecnològic de Telecomunicacions de Catalunya (CTTC), Spain); Ricardo Martinez (Centre Tecnològic de Telecomunicacions de Catalunya (CTTC/CERCA), Spain); Engin Zeydan (Centre Tecnològic de Telecomunicacions de Catalunya (CTTC), Spain) Experiments with SDN-Based Adaptable Non-IP Protocol Stacks in Smart-City Environments
Sarantis Kalafatidis (University of Macedonia, Greece); Vassilis Demiroglou (Democritus University of Thrace, Greece); Sotiris Skaperas (University of Macedonia, Greece); Georgios Tsoulouhas (Democritus University of Thrace, Greece); Polychronis Valsamas and Lefteris Mamatas (University of Macedonia, Greece); Vassilis Tsaoussidis (Democritus University of Thrace, Greece) Enhancing Privacy of Online Chat Apps Utilising Secure Node End-To-End Encryption (SNE2EE)
Nithish Velagala (De Montfort University, Greece); Leandros A. Maglaras (De Montfort University, United Kingdom (Great Britain)); Nicholas Ayres (DeMontfort University, United Kingdom (Great Britain)); Sotiris Moschoyiannis (University of Surrey, United Kingdom (Great Britain)); Leandros Tassiulas (Yale University, USA)

Session #5: Adhoc networks & Internet of Things I (P)

Date/Time: July 2nd, from 10:00 to 11:30
Room: Salon des Roses A
Session Chair: Symeon Papavassiliou, National Technical University of Athens, Greece
GreenLoRaWAN: An Energy Efficient and Resilient LoRaWAN Communication Protocol
Thomas Dimakis (University of Western Macedonia, Greece), Malamati Louta (University of Western Macedonia, Greece), Thomas Kyriakidis (University of Western Macedonia, Greece), Alexandros-Apostolos A Boulogeorgos (University of Piraeus, Greece), Konstantina Banti (University of Western Macedonia, Greece), Ioanna Karampelia (University of Western Macedonia, Greece), Nikos Papadimitriou (University of Western Macedonia, Greece) Energy Consumption in LoRa IoT: Benefits of Adding Relays to Dense Networks
Jorge F. Schmidt (Alpen-Adria-Universität Klagenfurt, Austria), Udo Schilcher (University of Klagenfurt, Austria), Siddhartha S. Borkotoky (Indian Institute of Technology Bhubaneswar, India), Christian Schmidt (University of Rennes, INSA Rennes, IETR, UMR-CNRS. & Instituto de Investigaciones en Ingeniería Eléctrica - CONICET - Universidad Nacional del Sur., Argentina) SDN-TSCH: Enabling Software Defined Networking for Scheduled Wireless Networks with Traffic Isolation
Farzad Veysi (CNRS / University of Strasbourg, France), Julien Montavont (ICube Laboratory (CNRS) - University of Strasbourg, France), Fabrice Theoleyre (CNRS, France) A Lightweight Fluid Model for Mobile Ad Hoc Distributed Systems
Bruno Chianca Ferreira (Institut National des Sciences Appliquées & Ecole Nationale de l'Aviation Civile, France), Guillaume Dufour (ONERA, France), Guthemberg Silvestre (ENAC, France) A Spatio-Temporal Attentive Network for Video-Based Crowd Counting
Marco Avvenuti (University of Pisa, Italy), Marco Bongiovanni (University of Pisa, Italy), Luca Ciampi (ISTI-CNR, Italy), Claudio Gennaro (ISTI - CNR, Italy), Fabrizio Falchi (ISTI-CNR, Italy), Nicola Messina (ISTI - CNR, Italy)

Session #6: Security I (V)

Date/Time: July 2nd, from 10:00 to 11:30
Virtual room: Nefeli B
Session Chair: Stefano Chessa, University of Pisa, Italy
Implicit Continuous Authentication Model Based on Mobile Terminal Touch Behavior
Rui Mao (School of Cyber Security, University of Chinese Academy of Sciences & Institute of Information Engineering, Chinese Academy of Sciences, China), Heming Ji (Chinese Academy of Sciences, China), Di Cheng (Chinese Academy of Sciences, China), Xiaoyu Wang (University of Chinese Academy of Sciences & Institute of Information Engineering,Chinese Academy of Sciences, China), Yan Wang (Institute of Information Engineering, Chinese Academy of Sciences, China), Degang Sun (Chinese Academy of Sciences, China), Understanding the Characteristics of Public Blocklist Providers
Mitsuhiro Umizaki (National Institute of Information and Communications Technology, Japan), Tomohiro Morikawa (Saitama Institute of Technology & National Institute of Information and Communications Technology, Japan), Akira Fujita (National Institute of Information and Communications Technology, Japan), Takeshi Takahashi (National Institute of Information and Communications Technology, Japan), Tsung-Nan Lin (National Taiwan University, Taiwan), Daisuke Inoue (National Institute of Information and Communications Technology, Japan), Towards Privacy-Preserving Neural Architecture Search
Fuyi Wang (Deakin University, Australia), Leo Yu Zhang (Deakin University, Australia), Lei Pan (Deakin University, Australia), Shengshan Hu (Huazhong University of Science and Technology, China), Robin Doss (Deakin University, Australia), WebIoT: Classifying Internet-Of-Thing Devices at Internet Scale Through Web Characteristics
Yichao Wu (Tsinghua University, China), Li Chenglong (Tsinghua University, China), Jiahai Yang (Tsinghua University, China), Zhiliang Wang (Tsinghua University, China), Wei Hu (State Grid Information & Telecommunication Branch, China), Ang Xia (State Grid Information & Telecommunication Branch, China), Yong Jiang (Graduate School at Shenzhen, Tsinghua University, China), Yao Wang (Unit 61660 of PLA, Beijing, China), Liu-Li Wu (Unit 61660 of PLA, Beijing, China), PSCM: Towards Practical Encrypted Unknown Protocol Classification
Hua Wu (Southeast University, China), Chaoqun Cui (Southeast University, China), Guang Cheng (Southeast University, China), Xiaoyan Hu (Southeast University, China) Dynamic Authentication Mechanism Research and Security Protocol Design of HIOT
Rui Mao (School of Cyber Security, University of Chinese Academy of Sciences & Institute of Information Engineering, Chinese Academy of Sciences, China), Xiaoyu Wang (University of Chinese Academy of Sciences & Institute of Information Engineering,Chinese Academy of Sciences, China), Heming Ji (Chinese Academy of Sciences, China),

Session #7: Cellular & 5G I (V)

Date/Time: July 2nd, from 10:00 to 11:30
Virtual room: Tsabika
Session Chair: Fan-Hsun Tseng, National Cheng Kung University, Taiwan
Sorted Channel Based User Search for Initial Access in 5G and Beyond Cellular Networks
Taimoor Islam (National University of Sciences and Technology, Pakistan) Fahd Ahmed Khan (King Abdullah University of Science and Technology, Saudi Arabia) Ant Colony Optimization for Programmable Wireless Environments: Enabling Model and Initial Results
George Dimopoulos (University of Ioannina, Greece) Georgios Megas (University of Ioannina, Greece) Evangelos Papapetrou (University of Ioannina, Greece) Christos Liaskos (Institute of Computer Science, Foundation of Research and Technology, Hellas, Greece) Enabling the SLA Management of Federated Network Services Through Scaling Operations
Jorge Baranda (Centre Tecnològic de Telecomunicacions de Catalunya (CTTC/CERCA), Spain) Josep Mangues-Bafalluy (Centre Tecnològic de Telecomunicacions de Catalunya (CTTC), Spain) Luca Vettori (Centre Tecnològic de Telecomunicacions de Catalunya (CTTC/CERCA), Spain) Ricardo Martinez (Centre Tecnològic de Telecomunicacions de Catalunya (CTTC/CERCA), Spain) Engin Zeydan (Centre Tecnològic de Telecomunicacions de Catalunya (CTTC), Spain) Integrating Software-Defined Metasurfaces into Wireless Communication Systems: Design and Prototype Evaluation
Christos Liaskos (Institute of Computer Science, Foundation of Research and Technology, Hellas, Greece) Georgios G. Pyrialakos (Aristotle University of Thessaloniki, Greece) Alexandros Pitilakis (Aristotle University of Thessaloniki, Greece) Ageliki Tsioliaridou (Foundation for Research and Technology, FORTH, Greece) Michail Christodoulou (Aristotle University of Thessaloniki, Greece) Nikolaos V. Kantartzis (Aristotle University of Thessaloniki, Greece) Sotiris Ioannidis (Technical University of Crete, Greece) Andreas Pitsillides (University of Cyprus, Cyprus) Ian F. Akyildiz (Georgia Institute of Technology, USA) Α Machine Learning Mechanism for Improved Energy Consumption in 5G Small Cells
Christos J Bouras (University of Patras, Greece) Vasileios Kokkinos (University of Patras & Greek Research and Technology Network S.A., Greece) Foivos Allayiotis (University of Patras, Greece)

Session #8: Adhoc networks & Internet of Things II (P)

Date/Time: July 2nd, from 12:00 to 13:30
Room: Salon des Roses A
Session Chair: Fabrice Theoleyre, CNRS, Paris, France
A Deep Reinforcement Learning-Based Context-Aware Wireless Mobile Charging Scheme for the Internet of Things
Michael Mahamat (Université de Technologie de Compiègne, France), Ghada Jaber (Universite de Technologie de Compiegne, France), Abdelmadjid Bouabdallah (Universite de Technologie - Compiegne, France) The Antarctic Delay Tolerant Network
Adrià Mallorquí (Enginyeria La Salle - Universitat Ramon Llull, Spain), Agustin Zaballos (Enginyeria La Salle - Universitat Ramon Llull, Spain), Daniel Serra (Enginyeria La Salle - Universitat Ramon Llull, Spain) Towards IoT Rejuvenation: A Study on HY-SRF05 Ultrasonic Sensor Ageing for Intelligent Street Pole Lamp Control in a Smart City
Valeria Lukaj (University of Messina, Italy), Francesco Martella (University of Messina, Italy), Antonino Quattrocchi (University of Messina, Italy), Maria Fazio (University of Messina, Italy), Roberto Montanini (University of Messina, Italy), Massimo Villari (University of Messina, Italy), Antonio Celesti (University of Messina, Italy) Anomaly Detection in Logical Sub-Views of WSNs
Robert Zakrzewski (University of Bristol, United Kingdom (Great Britain)), Trevor Martin (University of Bristol, United Kingdom (Great Britain)), George Oikonomou (University of Bristol, United Kingdom (Great Britain))

Session #9: Security II (V)

Date/Time: July 2nd, from 12:00 to 13:30
Virtual room: Nefeli A
Session Chair: Panayiotis Kotzanikolaou, University of Piraeus, Greece
Mobile Device Identification Based on Two-Dimensional Representation of RF Fingerprint with Deep Learning
Jing Li (Institute of Information Engineering Chinese Academy of Sciences, China), Shunliang Zhang (Institute of Information Engineering, Chinese Academy of Sciences, China), Mengyan Xing (Institute of Information Engineering, Chinese Academy of Sciences, China), Zhuang Qiao (Institute of Information Engineering, Chinese Academy of Sciences, China), Xiaohui Zhang (Institute of Information Engineering, Chinese Academy of Sciences, China), Physical Layer Authentication Based on Full Channel Information Under Dual-Polarized Antenna Communication Systems
Wu Yuemei (Institute of Information Engineering, Chinese Academy of Sciences, China), Dong Wei (Chinese Academy of Sciences & Institute of Information Engineering, China), Weiqing Huang (Institute of Information Engineering, Chinese Academy of Sciences, China), Li Jing (Institute of Information Engineering, Cas, China), Meng Xiang (Institute of Information Engineering, Cas, China), Specific Emitter Identification via Spatial Characteristic of Polarization Fingerprint
Jinlong Xu (University of Chinese Academy of Sciences, China), Dong Wei (Chinese Academy of Sciences & Institute of Information Engineering, China), Weiqing Huang (Institute of Information Engineering, Chinese Academy of Sciences, China), Lilac: Parallelizing Atomic Cross-Chain Swaps
Donghui Ding (Institute of Computing Technology, Chinese Academy of Sciences, China), Bo Long (Institute of Computing Technology, Chinese Academy of Sciences, China), Feng Zhuo (Institute of Computing Technology, Chinese Academy of Sciences, China), Zhongcheng Li (Institute of Computing Technology, Chinese Academy of Sciences, China), Hanwen Zhang (Institute of Computing Technology, Chinese Academy of Sciences, China), Chen Tian (Nanjing University, China), Yi Sun (Institute of Computing Technology, Chinese Academy of Sciences, China), BMKS: A Blockchain Based Multi-Keyword Search Scheme for Medical Data Sharing
Guangjun Wu (Institute of Information Engineering, Chinese Academy of Sciences, China), Bingqing Zhu (University of Chinese Academy of Sciences, China), Jun Li (University of Chinese Academy of Sciences, China), BC-MCSDT: A Blockchain-Based Trusted Mobile Crowdsensing Data Trading Framework
Weiwei Hu (Sun Yat-sen University, China), Bo Gu (Sun Yat-sen University, China), Jinming Li (Sun Yat-sen University, China), Zhen Qin (Sun Yat-sen University, China)

Session #10: Cellular & 5G II (V)

Date/Time: July 2nd, from 12:00 to 13:30
Virtual room: Nefeli B
Session Chair: Dimitris Zorbas, Nazarbayev University, Kazakhstan
Efficient OFDM Channel Estimation with RRDBNet
Wei Gao (Qilu University Of Technology, China) Mei Yang (Shandong Computer Science Center, China) Wei Zhang (Qilu University of Technology(Shandong Academy of Sciences), China) Li Liu (Shandong Computer Science Center, China) Ring-Based Intelligent Reflecting Surface Placement for 5G and Beyond
Hao-Kai Hong (National Cheng Kung University, Taiwan) Fan-Hsun Tseng (National Cheng Kung University, Taiwan) Intelligent Analog Radio over Fiber Aided C-RAN for Mitigating Nonlinearity and Improving Robustness
Yichuan Li (Harbin Institute of Technology, Shenzhen, China) Mohammed El-Hajjar (University of Southampton, United Kingdom (Great Britain)) Novel Handover Algorithms Using Pattern Recognition for Hybrid LiFi Networks
Guanghui Ma (Monash University, Australia) Rajendran Parthiban (Monash University Sunway Campus, Malaysia) Nemai Karmakar (MONASH University, Australia) Frequency Hopping Signal Recognition Based on Horizontal Spatial Attention
Pengcheng Liu (Institute of Information Engineering, Chinese Academy of Sciences, China) Zhen Han (Beijing jiaotong University, China) Zhixin Shi (Institute of Information Engineering, Chinese Academy of Sciences, China) Meimei Li (Institute of Information Engineering, Chinese Academy of Sciences, China) Meichen Liu (Institute of Information Engineering, Chinese Academy of Sciences, China)

Session #25: Cloud networks & computing I (V)

Date/Time: July 2nd, from 12:00 to 13:30
Virtual room: Tsabika
Session Chair: Rosa Mavropodi, University of Piraeus, Greece
Joint Task Offloading and VM Placement for Edge Computing with Time-Sequential IIoT Applications
Mingzhu Qiang (Nanjing University of Aeronautics and Astronautics, China), Changyan Yi (Nanjing University of Aeronautics and Astronautics, China), Juan Li (Nanjing University of Aeronautics and Astronautics, China), Kun Zhu (Nanjing University of Aeronautics and Astronautics, China), Jun Cai (Concordia University, Canada), Real-Time Audit Scheme Based on Multilevel Roles in a Medical Cloud Environment
Yuan Wan (Chinese Hebei University, China), Online Decentralized Task Allocation Optimization for Edge Collaborative Networks
Yaqiang Zhang (INSPUR, China), Ruyang Li (Inspur (Beijing) Electronic Information Industry Co., Ltd, China), Yaqian Zhao (INSPUR, China), Rengang Li (INSPUR, China), Xuelei Li (INSPUR, China), Tuo Li (INSPUR, China), Deep Reinforcement Learning Based Mobility-Aware Service Migration for Multi-Access Edge Computing Environment
Yaqiang Zhang (INSPUR, China), Rengang Li (INSPUR, China), Yaqian Zhao (INSPUR, China), Ruyang Li (Inspur (Beijing) Electronic Information Industry Co., Ltd, China)

Session #11: Unmanned Aerial Networks & Applcations I (V)

Date/Time: July 2nd, from 14:30 to 16:00
Virtual room: Salon des Roses A
Session Chair: Dimitris Zorbas, Nazarbayev University, Kazakhstan
Reducing Hovering and Motion Energy Consumptions for UAV-Enabled Collaborative Beamforming
Shuang Liang (Jilin University, China), Zhiyi Fang (Jilin University, China), Geng Sun (Jilin University, China), Jiahui Li (Jilin University, China) UAV-Enabled Wireless Powered Communication Networks: A Joint Scheduling and Trajectory Optimization Approach
Ziwen An (Jilin University, China), Yanheng Liu (Jilin University, China), Geng Sun (Jilin University, China), Hongyang Pan (Jilin University, China), Aimin Wang (Jilin University, China) Reliable UAV Communication via Collaborative Beamforming: A Multi-Objective Optimization Approach
Geng Sun (Jilin University, China), Xiaoya Zheng (Jilin University, China), Yuying Lian (Jilin University, China), Jiahui Li (Jilin University, China), Fang Mei (Jilin University, China) Dual-UAV Aided Secure Dynamic G2U Communication
Hongyue Kang (Beijing Jiaotong University, China), Wei Li (Beijing Jinghang Computation and Communication Research Institute, China), Jelena Mišić (Ryerson University, Canada), Vojislav B. Mišić (Ryerson University, Canada), Xiaolin Chang (Beijing Jiaotong University, China)

Session #12: Security III (V)

Date/Time: July 2nd, from 14:30 to 16:00
Virtual room: Nefeli A
Session Chair: Laura Ricci, University of Pisa, Italy
Fighting Against Piracy: An Approach to Detect Pirated Video Websites Enhanced by Third-Party Services
Zhao Li (Institute of Information Engineering, CAS, China), Shijun Zhang (University of Chinese Academy of Sciences, China), Jiangyi Yin (Institute of Information Engineering. CAS, China), Zhongyi Zhang (Institute of Information Engineering, Chinese Academy of Sciences, China), Meijie Du (Institute of Information Engineering, Chinese Academy of Sciences, UCAS, China), Qingyun Liu (Institute of Information Engineering, Chinese Academy of Sciences, China), Assessing Anonymous and Selfish Free-Rider Attacks in Federated Learning
Jianhua Wang (Beijing Jiaotong University, China), Xiaolin Chang (Beijing Jiaotong University, China), Ricardo Rodríguez (University of Zaragoza, Spain), Yixiang Wang (Beijing Jiaotong University, China) MMSP: A LSTM Based Framework for Multi-Step Attack Prediction in Mixed Scenarios
Zijun Cheng (University of Chinese Academy of Science, China & Institute of Information Engineering, Chinese Academy of Sciences, China), Degang Sun (Chinese Academy of Sciences, China), Leiqi Wang (University of Chinese Academy of Science & Institute of Information Engineering, Chinese Academy of Science, China), Qiujian Lv (Institute of Information Engineering,Chinese Academy of Sciences, China), Yan Wang (Institute of Information Engineering, Chinese Academy of Sciences, China), StinAttack: A Lightweight and Effective Adversarial Attack Simulation to Ensemble IDSs for Satellite-Terrestrial Integrated Network
ShangYuan Zhuang (University of Chinese Academy of Sciences, China), Jiyan Sun (Institute of Information Engineering, Chinese Academy of Sciences, China), Hangsheng Zhang (University of Chinese Academy of Sciences & School of Cyber Security, China), Xiaohui Kuang (Institute of System and Engineering, Academy of Military Science, Beijing, China), Ling Pang (National Key Laboratory of Science and Technology on Information System Security, China), Haitao Liu (Computer Network Information Center, CAS, China), Yinlong Liu (Institute of Information Engineering, Chinese Academy of Sciences & School of Cyber Security, University of Chinese Academy of Sciences, China), ActDetector: A Sequence-Based Framework for Network Attack Activity Detection
Jiaqi Kang (Institute of Information Engineering, Chinese Academy of Sciences, China), Huiran Yang (Chinese Academy of Sciences, China), Yan Zhang (Institute of Information Engineering, Chinese Academy of Sciences, China), Yueyue Dai (Huazhong University of Science and Technology, China), Mengqi Zhan (Institute of Information Engineering, Chinese Academy of Sciences & University of Chinese Academy of Sciences, China), Weiping Wang (Institute of Information Engineering, Chinese Academy of Sciences, China), Breaking Tor's Anonymity by Modifying Cell's Command
Yi Qin (Shanghai Jiao Tong University, China), Jiahe Wu (Shanghai Jiao Tong University, China), Futai Zou (Shanghai Jiao Tong University, China), Yue Wu (Shanghai Jiaotong University, China)

Session #13: Artificial Intelligence (V)

Date/Time: July 2nd, from 14:30 to 16:00
Virtual room: Nefeli B
Session Chair: Antonio Montieri, University of Napoli Federico II, Italy
A Discrete-Event-Based Simulator for Distributed Deep Learning
Xiaoyan Liu (Inner Mongolia University of Technology, China), Zhiwei Xu (Institute of Computing Technology, Chinese Academy of Sciences, China), Yana Qin (Inner Mongolia University of Technology, China), Jie Tian (Amazon, USA) Deep-Learning for Cooperative Spectrum Sensing Optimization in Cognitive Internet of Things
Hind Boukhairat (Mohammed VI Polytechnic University, Morocco), Mohammed-Amine Koulali (University Mohammed I & ENSAO, Morocco), A Data-Driven Digital Twin for Urban Activity Monitoring
Matteo Mendula (University of Bologna, Italy), Armir Bujari (University of Bologna, Italy), Luca Foschini (University of Bologna, Italy), Paolo Bellavista (University of Bologna, Italy) Learning Auction in Coded Distributed Computing with Heterogeneous User Demands
Jiawei Liang (Nanjing University of Aeronautics and Astronautics, China), Juan Li (Nanjing University of Aeronautics and Astronautics, China), Kun Zhu (Nanjing University of Aeronautics and Astronautics, China), Changyan Yi (Nanjing University of Aeronautics and Astronautics, China) MD-Roofline: A Training Performance Analysis Model for Distributed Deep Learning
Tianhao Miao (University of Chinese Academy of Sciences, China), Qinghua Wu (Institute of Computing Technology, Chinese Academy of Sciences, China), Ting Liu (Institute of Computing Technology(CAS), University of Chinese Academy of Sciences, China), Penglai Cui (University of Chinese Academy of Sciences, China), Rui Ren (Institute of Computing Technology, Chinese Academy of Sciences, China), Zhenyu Li (Institute of Computing Technology, Chinese Academy of Sciences, China), Gaogang Xie (CNIC Chinese Academy of Sciences & University of Chinese Academy of Sciences, China), LibHunter: An Unsupervised Approach for Third-Party Library Detection Without Prior Knowledge
Huajun Cui (Institute of Information Engineering, Chinese Academy of Sciences, China), Guozhu Meng (SKLOIS, Institute of Information Engineering, Chinese Academy of Sciences, China), Yueqi Li (University of Chinese Academy of Sciences, China), Yuejun Li (Institute of Information Engineering, Chinese Academy of Sciences, China), Yan Zhang (Institute of Information Engineering, Chinese Academy of Sciences, China), Jiyan Sun (Institute of Information Engineering, Chinese Academy of Sciences, China), Dali Zhu (Institute of Information Engineering, Chinese Academy of Sciences, China), Weiping Wang (Institute of Information Engineering, Chinese Academy of Sciences, China),

Session #14: Core & Fog Networks (V)

Date/Time: July 2nd, from 16:30 to 18:00
Virtual room: Salon des Roses A
Session Chair: Armir Bujari, University of Bologna, It
BGNN: Detection of BGP Anomalies Using Graph Neural Networks
Kevin Hoarau (Université de la Réunion, Reunion), Pierre-Ugo Tournoux (Université de la Réunion, Reunion), Tahiry Razafindralambo (University of la Reunion, France), On Flow-Based Directed p-Cycle Design in Elastic Optical Networks
Yuanhao Liu (Xidian University, France & Avignon Université, France), Fen Zhou (IMT Nord Europe, Institut Mines-Télécom, University of Lille, France), Michal Pióro (Warsaw University of Technology, Poland), Tao Shang (Xidian University, China), Juan-Manuel Torres-Moreno (Université d'Avignon, France & Polytechnique Montréal, Canada), Abderrahim Benslimane (University of Avignon & LIA/CERI, France), Reliable Free-Space Optical Communication System Performance for Matching Multi-Level Customer Needs: Using Hybrid Modulation System with Deep Reinforcement Learning
Alaa A. Algamal, Eng. (Egypt-Japan University of Science and Technology (E-JUST), Egypt), Ahmed Hassan Abd El-Malek (Egypt-Japan University for Science and Technology (E-JUST), Egypt), Hossam Shalaby (Alexandria University, Egypt), A First Look at Accurate Network Traffic Generation in Virtual Environments
Giuseppe Aceto (University of Napoli Federico II, Italy), Ciro Guida (Università degli Studi di Bergamo & Università degli Studi di Napoli Federico II, Italy), Antonio Montieri (University of Napoli Federico II, Italy), Valerio Persico (University of Napoli Federico II, Italy), Antonio Pescapé (University of Napoli Federico II, Italy), Look-Ahead Reinforcement Learning for Load Balancing Network Traffic
Isadora Possebon (Federal University of Rio Grande do Sul, Brazil), Bruno Castro da Silva (University of Massachusetts, USA), Alberto E. Schaeffer-Filho (Federal University of Rio Grande do Sul (UFRGS), Brazil), A Federated Learning Framework for Resource Constrained Fog Networks
Wassila Lalouani (University of Maryland, Baltimore County, USA), Mohamed Younis (University of Maryland Baltimore County, USA),

Session #15: Security IV (V)

Date/Time: July 2nd, from 16:30 to 18:00
Virtual room: Nefeli A
Session Chair: Panayiotis Gotsiopoulos, University of Piraeus, Greece
MAC-Layer Traffic Shaping Defense Against WiFi Device Fingerprinting Attacks
Mnassar Alyami (University of Central Florida, USA), Mohammed Alkhowaiter (University of Central Florida, USA), Mansour Al Ghanim (University of Central Florida, USA), Cliff Zou (University of Central Florida, USA), Yan Solihin (University of Central Florida, USA), A Reputation and Security Mechanism for Heterogeneous Vehicular Networks
Ana Maria B. C. Quevedo (State University of Ceará (UECE), Brazil), Joaquim Celestino Júnior (State University of Ceará, Brazil), Carlos Quevedo (State University of Ceará (UECE), Brazil), Rafael L. Gomes (State University of Ceará (UECE) & University of Campinas (UNICAMP), Brazil) Active Eavesdroppers Detection System in Multi-Hop Wireless Sensor Networks
Masih Abedini (University of Regina, Canada), Irfan S. Al-Anbagi (Faculty of Engineering and Applied Science, University of Regina, Canada), Rapid Identification and Characterization of Laser Injected Clock Faults Through OBIC Mapping
Nicholas J Lurski (Johns Hopkins University Applied Physics Laboratory), Andrew Monica (Johns Hopkins University Applied Physics Laboratory, USA), Brooke Peterson (Johns Hopkins University Applied Physics Laboratory, USA), Stergios Papadakis (JHU/APL, USA) A Web Infrastructure for Certifying Multimedia News Content for Fake News Defense
Edward L Amoruso (University of Central Florida, USA), Raghu Avula (University of Central Florida, USA), Cliff Zou (University of Central Florida, USA), Stephen Johnson (UCF, USA)

Session #16: Signal Processing & Cellular Networks (V)

Date/Time: July 2nd, from 16:30 to 18:00
Virtual room: Nefeli B
Session Chair: Eirini Eleni Tsiropoulou University of New Mexico, USA
Traffic Volume Prediction with Automated Signal Performance Measures (ATSPM) Data
Leah Kazenmayer (The College of New Jersey, USA) Gabriela Ford (University of Central Florida, USA) Jiechao Zhang (University of Central Florida, USA) Rezaur Rahman (University of Central Florida, USA) Furkan Cimen (University of Central Florida, USA) Damla Turgut (University of Central Florida, USA) Samiul Hasan (University of Central Florida, USA) CNN-Aided Channel and Carrier Frequency Offset Estimation for HAPS-LEO Links
Eray Guven (Ecole Polytechnique de Montreal, Canada) Gunes Karabulut Kurt (Ecole Polytechnique de Montreal, Canada) Joint Cache Placement and Request Routing Optimization in Heterogeneous Cellular Networks
Marisangila Alves (Santa Catarina State University - Graduate Program in Applied Computing - Brazil, Brazil) Guilherme Koslovski (Santa Catarina State University, Brazil) A New Soccer Game Optimization Modeling for Flexible Functional Splitting Dimensioning in CF-RAN Networks
Matias R. P. Santos (Federal University of Bahia, Brazil) Marcel Mei (Federal University of Piaui, Brazil) Antonio Oliveira (Federal University of Piaui, Brazil) Ricardo A. L. Rabelo (Federal University of Piaui (UFPI), Brazil) Gustavo Bittencourt Figueiredo (Federal University of Bahia, Brazil) Convergence-Time Analysis for the HTE Link Quality Estimator
Lucas de Souza (Universidade Federal Fluminense, Brazil) Celio Albuquerque (Universidade Federal Fluminense, Brazil) Fernanda G. O. Passos (Universidade Federal Fluminense, Brazil) Diego Passos (Instituto Politécnico de Lisboa, Portugal & Laboratório MídiaCom, Brazil)

Session #17: Cloud networks & computing II (V)

Date/Time: July 3nd, from 10:00 to 11:30
Virtual room: Salon des Roses A
Session Chair: Fen Zhou, IMT Nord Europe, Institut Mines-Télécom, University of Lille, France
OCVC: An Overlapping-Enabled Cooperative Computing Protocol in Vehicular Fog Computing
Zhiwei Wei (Tongji University, China), Bing Li (Tongji University, China), Rongqing Zhang (Tongji University, China), Xiang Cheng (Peking University, China), Liuqing Yang (University of Minnesota, USA) Adaptive Q-Learning-Supported Resource Allocation Model in Vehicular Fogs
Md Tahmid Hossain (Brock University, Canada), Robson E. De Grande (Brock University, Canada) Fair Connectivity-Oriented Allocation for Combined Resources in VCC Networks
Binal Tejani (Brock University, Canada), Robson E. De Grande (Brock University, Canada) City-Scale Fingerprint Positioning Framework Based on MDT Data
Junjun Si (Peking University, China)

Session #18: Network Applications & Services (V)

Date/Time: July 3nd, from 10:00 to 11:30
Virtual room: Nefeli A
Session Chair: Robson de Grande, Brock University, Canada
Scalable Digital Pathology Platform over Standard Cloud Native Technologies
Tibério Baptista (University Of Aveiro, Portugal), Rui Jesus (University of Aveiro, Portugal), Luís Bastião Silva (BMD Software, Portugal), Carlos Costa (University of Aveiro, Portugal) Non-Contact Heart Rate Signal Extraction and Identification Based on Speckle Image
Tianyu Meng (Institute of Information Engineering, Chinese Academy of Sciences, China), Dali Zhu (Institute of Information Engineering, Chinese Academy of Sciences, China), Xiaodong Xie (Institute of Information Engineering, Chinese Academy of Sciences, China), Hualin Zeng (Institute of Information Engineering, CAS, China) LL-VAS: Adaptation Method for Low-Latency 360-Degree Video Streaming over Mobile Networks
Duc Nguyen (Tohoku Institute of Technology, Japan), Ngan Thi Le (Ha Noi University of Science and Technology, Vietnam), Thuong Huyen Lai (Hanoi University of Science and Technology, Vietnam), Huong Thu Truong (Hanoi University of Science and Technology, Vietnam) Deep Reinforcement Learning Based Adaptive 360-Degree Video Streaming with Field of View Joint Prediction
Yuanhong Zhang (Xi'an Jiaotong University, China), Zhiwen Wang (Xi'an Jiaotong University, China), Junquan Liu (Xi'an Jiaotong University, China), Haipeng Du (Xi'an Jiaotong University, China), Qinghua Zheng (Xi'an Jiaotong University, China), Weizhan Zhang (Xi'an Jiaotong University, China), Spatial-Based Bayesian Hidden Markov Models with Dirichlet Mixtures for Video Anomaly Detection
Guojian Luo (Chongqing University, China), Jianfeng Qu (Chongqing University, China), Lina Zhang (Chongqing University Three Gorges Hospital, China), Xiaoyu Fang (Chongqing University, China), Yi Zhang (Chongqing University, China), Tong Zhou (Chongqing University, China), TKDA: An Improved Method for K-Degree Anonymity in Social Graphs
Nan Xiang (Inner Mongolia University, China), XueBin Ma (Inner Mongolia University, China),

Session #19: Unmanned Aerial Networks & Applications II (V)

Date/Time: July 3nd, from 10:00 to 11:30
Virtual room: Tsabika
Session Chair: Konstantinos Oikonomou, Ionian University, Greece
Bi-Objective Optimization for Collaborative UAV Secure Communication Under Forest Channel
Ruonan Li (Jilin University, China) Aimin Wang (Jilin University, China) Geng Sun (Jilin University, China) Jiahui Li (Jilin University, China) Xiaoya Zheng (Jilin University, China) Drone-Small-Cell-Assisted Spectrum Management for 5G and Beyond Vehicular Networks
Hang Shen (Nanjing Tech University, China) Yilong Heng (Nanjing Tech University, China) Ning Shi (Nanjing Trusted Blockchain and Algorithm Economics Institute, China) Tianjing Wang (Nanjing Tech University, China) Guangwei Bai (Nanjing Tech University, China) Position Errors Analysis, Prediction and Recovery for UAV-Enabled Virtual Antenna Array
Hao Wang (Jilin University, China) Hui Kang (JiLin University, China) Geng Sun (Jilin University, China) Jiahui Li (Jilin University, China) Jingwu Xiao (Jilin University, China) Ning Li (Jilin University, China) A Platform for Autonomous Swarms of UAVs
Margarida Silva (Instituto de Telecomunicacoes, University of Aveiro, Portugal) André Mourato (Instituto de Telecomunicacoes, University of Aveiro, Portugal) Goncalo Marques (Instituto de Telecomunicacoes, University of Aveiro, Portugal) Susana Sargento (Instituto de Telecomunicações, Universidade de Aveiro, Portugal), Andre B. Reis (Instituto de Telecomunicacoes, USA) The INCLUDING Platform for Radiological and Nuclear Exercises and Training: The Joint Action at the Piraeus Port
Luigi De Dominicis (ENEA, Italy) Spyridion Kolovos (Hellenic Ministry of Defence, Greece) Kakia Panagidi (NKUA, Greece) Ralf Hedel (Fraunhofer Institute for Transportation and Infrastructure Systems IVI, Germany) Ilias Mitsoulas (Hellenic Ministry of Defence, Greece) Karim Boudergui (CEA-LIST, France) Argiro Boziari (Greek Atomic Energy Commission, Greece) Stathes Hadjiefthymiades (University of Athens, Greece)

Session #20: Cellular Networks (P)

Date/Time: July 3nd, from 12:00 to 13:30
Room: Salon des Roses A
Session Chair: George C. Polyzos, Athens University of Economics and Business, Greece
Precise Latency Guarantee with Mobility and Handover in 5G and Beyond
Lijun Dong (Futurewei Technologies, USA), Richard Li (Futurewei Technologies, USA) MBSFN and SC-PTM as Solutions to Reduce Energy Consumption in Cellular Networks
Juan Vargas (IMT Atlantique & Enensys Technologies, France), Cédric Thienot (Enensys Technologies, France), Xavier Lagrange (IMT Atlantique & IRISA, Université Bretagne Loire, France) Minimizing Power Consumption by Joint Radio and Computing Resource Allocation in Cloud-RAN
Mahdi Sharara (Université Paris Saclay, France), Sahar Hoteit (University Paris-SACLAY & CentraleSupélec, France), Véronique Vèque (University Paris-Saclay, France), Francesca Bassi (IRT, France) Deep Reinforcement Learning-Based Radio Resource Allocation and Beam Management Under Location Uncertainty in 5G mmWave Networks
Yujie Yao (University of Ottawa, Canada), Hao Zhou (University of Ottawa, Canada), Melike Erol-Kantarci (University of Ottawa & Ericsson, Canada) Traffic-Aware UAV Placement Using a Generalizable Deep Reinforcement Learning Methodology
Eduardo Nuno Almeida (INESC TEC and Faculdade de Engenharia, Universidade do Porto, Portugal), Rui Campos (INESC TEC and Faculty of Engineering, University of Porto, Portugal), Manuel Ricardo (Universidade do Porto & INESC TEC, Portugal) On the Minimum Collisions Assignment Problem in Interdependent Networked Systems
Maria Diamanti (National Technical University of Athens (NTUA), Greece), Nikolaos Fryganiotis (National Technical University of Athens, Greece), Symeon Papavassiliou (National Technical University of Athens), Christos Pelekis (National Technical University of Athens, Greece), Eirini Eleni Tsiropoulou (University of New Mexico, USA)

Session #24: Core Networks (V)

Date/Time: July 3nd, from 12:00 to 13:30
Virtual room: Tsabika
Session Chair: Aggeliki Sgora, Ionian University, Greece
Rule Placement and Switch Migration-Based Scheme for Controller Load Balancing in SDN
Gengbiao Yue (Beijing University of Posts and Telecommunications, China), Yumei Wang (Beijing University of Posts and Telecommunications, China), Yu Liu (Beijing University of Posts and Telecommunications, China), Fast-Converging Congestion Control in Datacenter Networks
Yukun Zhou (National University of Defense Technology, China), Dezun Dong (National University of Defense Technology, China), Pang Zhengbin (National University of Defense Technology, China), Junhong Ye (Tencent Inc., China), Feng Jin (Tencent Inc, China), The Design and Specification of Path Adjustable SFC Using YANG Data Model
Yintan Ai (Inner Mongolia University, China), Hua Li (Inner Mongolia University, China), Xianrong Wang (Inner Mongolia University, China), Jiafeng Wang (Inner Mongolia University, China), Yaru Ding (Inner Mongolia University, China), Dynamic Graph Convolutional Network for Long Short-Term Traffic Flow Prediction
Yan Wang (Heilongjiang University, China), Qianqian Ren (Heilongjiang University, China), Automated Privacy Network Traffic Detection via Self-Labeling and Learning
Yuejun Li (Institute of Information Engineering, Chinese Academy of Sciences, China), Huajun Cui (Institute of Information Engineering, Chinese Academy of Sciences, China), Jiyan Sun (Institute of Information Engineering, Chinese Academy of Sciences, China), Yan Zhang (Institute of Information Engineering, Chinese Academy of Sciences, China), Yueqi Li (University of Chinese Academy of Sciences, China), Guozhu Meng (SKLOIS, Institute of Information Engineering, Chinese Academy of Sciences, China), Weiping Wang (Institute of Information Engineering, Chinese Academy of Sciences, China), Digital Twin Networks: Learning Dynamic Network Behaviors from Network Flows
Guozhi Lin (School of Cyber Security, University of Chinese Academy of Science & Institute of Information Engineering, Chinese Academy of Science, China), Jingguo Ge (Institute of Information Engineering, Chinese Academy of Sciences, China), Yulei Wu (University of Exeter, United Kingdom (Great Britain)), Hui Li (Institute of Information Engineering, Chinese Academy of Science, China), liangxiong Li (Insitute of Information Engineering, CAS, China),

Session #21: Network application & services (P)

Date/Time: July 3nd, from 14:30 to 16:00
Virtual room: Nefeli B
Session Chair: Dimitrios Kallergis, University of West Attica, Greece
A Comparative Study on Shared Precomputed Restoration and Shared Backup Path Protection in EONs
Farhad Arpanaei (Universidad Carlos III de Madrid, Spain), Shayan Hajipour (Amirkabir University of Technology, Iran), Hamzeh Beyranvand (Amirkabir University of Technology, Iran), José Alberto Hernández (Universidad Carlos III de Madrid, Spain), David Larrabeiti (Universidad Carlos III de Madrid, Spain) Dynamic Anchor Point Selection in Software Defined Distributed Mobility Management
Esmaeil Amiri (University of Surrey & 5GIC & 6GIC, Institute for Communication Systems (ICS), United Kingdom (Great Britain)), Ning Wang (University of Surrey, United Kingdom (Great Britain)), Serdar Vural (5GIC, University of Surrey, United Kingdom (Great Britain)), Rahim Tafazolli (University of Surrey, United Kingdom (Great Britain)) Dimensioning Resources of Network Slices for Energy-Performance Trade-Off
Wei Huang (Telecom Sudparis, France), Andrea Araldo (Institut Polytechnique de Paris & Télécom SudParis, France), Hind Castel-Taleb (Samovar UMR 5157, Telecom SudParis, Université Paris Saclay, France), Badii Jouaber (SAMOVAR & Telecom SudParis, Institut Polytechnique de Paris, France) Machine Learning for the Selection of the Best Modular Robots Self-Reconfiguration Algorithm
Baptiste Buchi (Université Bourgogne Franche-Comté & FEMTO-ST, France), Francesco Witz (Université Bourgogne Franche-Comté, France), Hakim Mabed (University of Franche-Comte, France), Lassabe Frédéric (Université de Technologie de Belfort-Montbéliard, France), Jaafar Gaber (UTBM, France), Wahabou Abdou (University of Burgundy, France)

Session #22: Energy sustainability (P)

Date/Time: July 3nd, from 14:30 to 16:00
Room: Salon des Roses A
Session Chair: Fabrice Theoleyre, CNRS, France
Task Scheduling Stabilization for Solar Energy Harvesting Internet of Things Devices
Antonio Caruso (University of Salento, Italy), Stefano Chessa (Universita' di Pisa, Italy), Soledad Escolar (University of Castilla-La Mancha, Spain), Fernando Rincón (University of Castilla-La Mancha, Spain), Juan Carlos López (University of Castilla-La Mancha, Spain) A Federated Learning Model with Short Sequence to Point Mechanism for Smart Home Energy Disaggregation
Shamisa Kaspour (Lakehead University, Canada), Abdulsalam Yassine (Lakehead University, Canada) Data-Plane Energy Efficiency of a Next-Generation Internet Architecture
Seyedali Tabaeiaghdaei (ETH Zurich, Switzerland), Adrian Perrig (ETH Zurich Switzerland & Carnegie Mellon University, USA) Real-Time Resource Management in Smart Energy-Harvesting Systems
Mohamed Irfanulla Mohamed Abdulla (University of Nantes & E-COBOT, France), Audrey Queudet (University of Nantes, France), Maryline Chetto (Universite de Nantes CNRS & LS2N Lab, France)

Session #23: Security V (V)

Date/Time: July 3nd, from 14:30 to 16:00
Virtual room: Tsabika
Session Chair: Periklis Chatzimisios, International Hellenic University, Greece
MalPro: Learning on Process-Aware Behaviors for Malware Detection
Xiaohui Chen (Institute of Information Engineering, CAS and School of Cyber Security, UCAS, China), Ying Tong (Jiangsu Provincial Public Security Department, China), Chunlai Du (North China University of Technology, China), Yongji Liu (Institute of Information Engineering, Chinese Academy of Sciences, China), Zhenquan Ding (School of Cyber Security, University of Chinese Academy of Sciences & Institute of Information Engineering, China), Qingyun Ran (Jiangsu Provincial Public Security Department, China), Yi Zhang (Jiangsu Provincial Public Security Department, China), Lei Cui (Institute of Information Engineering, Chinese Academy of Sciences, China), Zhiyu Hao (Institute of Information Engineering, Chinese Academy of Sciences, China), DICOF: A Distributed and Collaborative Framework for Hybrid DDoS Attack Detection
SiYuan Leng (Institute of Information Engineering, Chinese Academy of Sciences, China), YingKe Xie (Institute of Information Engineering, CAS, China), YiFan Zhang (Xidian University, China), Yunchuan Guo (Institute of Information Engineering, Chinese Academy of Sciences, China), Liang Fang (Institute of Information Engineering, Chinese Academy of Sciences, China), Fenghua Li (State Key Laboratory of Information Security, Institute of Information Engineering, CAS, China), Differential Cryptanalysis of K-Cipher
Mohammad Mahzoun (Eindhoven University of Technology, The Netherlands), Liliya Kraleva (Katholieke Universiteit Leuven, Belgium), Raluca Posteuca (Katholieke Universiteit Leuven, Belgium), Tomer Ashur (Katholieke Universiteit Leuven, Belgium & Eindhoven University of Technology, The Netherlands) A Blockchain-Based Architecture for Access Control Management of IoT Applications
Islam A. Moursy (Alexandria University & Bibliotheca Alexandrina, Egypt), Sahar M. Ghanem (Alexandria University, Egypt), Mohamed Nazih ElDerini (Faculty of Engineering, Alexandria University, Egypt), Selective Disclosure in Self-Sovereign Identity Based on Hashed Values
Andrea De Salve (National Research Council (CNR), Italy), Andrea Lisi (University of Pisa, Italy), Paolo Mori (IIT, CNR, Italy), Laura Ricci (University of Pisa, Italy) CHFL: A Collaborative Hierarchical Federated Intrusion Detection System for Vehicular Networks
Parya Haji Mirzaee (University of Surrey, United Kingdom (Great Britain)), Mohammad Shojafar (University of Surrey, United Kingdom (Great Britain)), Haitham Cruickshank (University of Surrey, United Kingdom (Great Britain)), Rahim Tafazolli (University of Surrey, United Kingdom (Great Britain))