In each session, the video-recordings of the papers will be presented in sequence. As the attendees watch the video presentations, they can write questions in a text area for the authors of the corresponding paper. At the end of all presentations, approximately 15 minutes will be devoted to Q&A. At least one author of each accepted paper should be present at the corresponding session for the Q&A. All times shown in the conference schedule are in ET (Boston/New York) timezone.

Tuesday, November 23

10:00-10:15 Conference Opening

10:15-11:50 Session 1: Wireless Networks I

Arnaud Favier, Luciana Arantes, Jonathan Lejeune and Pierre Sens
Centrality-Based Eventual Leader Election in Dynamic Networks

Mahsa Sadeghi Ghahroudi, Alireza Shahrabi and Tuleen Boutaleb
Collective Movement Inspired Distributed Blanket Coverage Algorithm Using Nearest Neighbour Rule

Souvik Deb and Sasthi Ghosh
An RIS deployment strategy to overcome static obstacles in millimeter wave D2D communication

Jasmine Grosso and Arshad Jhumka
Fault-Tolerant Ant Colony Based-Routing in Many-to-Many IoT Sensor Networks

11:35-11:50 Questions and Answers

11:50-13:25 Session 2: Cyber Security I

Geeta Yadav and Kolin Paul
Global Monitor using SpatioTemporally Correlated Local Monitors

Shlomi Dolev and Arseni Kalma
Verifiable Computing Using Computation Fingerprints Within FHE

Lukasz Krzywiecki, Hannes Salin and Mateusz Jachniak
Certificateless Multi-Party Authenticated Encryption Mitigating Ephemeral Key Leakage

Andrea Venturi and Claudio Zanasi
On the feasibility of adversarial machine learning in malware and network intrusion detection

13:10-13:25 Questions and Answers

13:25-14:20 Session 3: Storage for distributed systems

Hasan Heydari, Guthemberg Silvestre and Luciana Arantes
Efficient Consensus-Free Weight Reassignment for Atomic Storage

Tanaya Roy, Jit Gupta, Krishna Kant, Amitangshu Pal and Dave Minturn
PLMLight: Emulating Predictable Latency Mode in Regular SSDs

14:05-14:20 Questions and Answers

Wednesday, November 24

10:00-11:45 Session 4: Edge and Fog Computing

Leonardo Epifânio, Cláudio Correia and Luis Rodrigues
Cathode: A Consistency-Aware Data Placement Algorithm for the Edge

Matthias Frei, Thomas Deinlein, Reinhard German and Anatoli Djanatliev
An Evaluation of the Communication Performance of MEC-Dependent Services in 5G Networks

Claudia Canali, Riccardo Lancellotti and Stefano Rossi
Impact of theoretical performance models on the design of fog computing infrastructures

Gabriele Proietti Mattia and Roberto Beraldi
Leveraging Reinforcement Learning for online scheduling of real-time tasks in the Edge/Fog-to-Cloud computing continuum

Diogo Dias, José Simão and Luís Veiga
RATEE – Resource Auction Trading at Edge Environments

11:32-11:45 Questions and Answers

11:45-13:00 Session 5: Cloud Computing and Machine Learning I

André Bento, Jaime Correia, João Durães, João Soares, Luís Ribeiro, António Ferreira, Rita Carreira, Filipe Araújo and Raul Barbosa
A layered framework for root cause diagnosis of microservices

Daniel Wladdimiro, Luciana Arantes, Pierre Sens and Nicolas Hildago
A Multi-Metric Adaptive Stream Processing System

M. Reza Hoseinyfarahabady, Javid Taheri, Albert Zomaya and Zahir Tari
A QoS-Aware Controller for Distributed Execution of Batch & Streaming Analytic in Spark Platform

12:45-13:00 Questions and Answers

13:00-14:10 Session 6: Wireless Networks II

Souvik Deb, Shankar Ghosh and Sasthi Ghosh
A Multi-Arm-Bandit Based Resource Block Allocation in RIS Assisted Wireless Network

Luubaatar Badarch, Munkhjargal Gochoo, Ganzorig Batnasan, Fady Alnajjar and Tan-Hsu Tan
Ultra-Low Resolution Infrared Sensor-Based Wireless Sensor Network for Privacy-Preserved Recognition of Daily Activities of Living

Shankar Ghosh and Sasthi Ghosh
An Energy Efficient Component Carrier Selection Mechanism for LTE-NR Dual Connectivity

Shlomi Dolev, Ehud Gudes, Hannah Yair
Automatic Real Time Platoon Formation Using the Road Graph

13:56-14:10 Questions and Answers

Thursday, November 25

10:00-11:35 Session 7: Internet of Things

Sameh Khalfaoui, Jean Leneutre, Arthur Villard, Ivan Gazeau, Jingxuan Ma, Jean-Luc Danger and Pascal Urien
Water-PUF: An Insider Threat Resistant PUF Enrollment Protocol Based on Machine Learning Watermarking

Frédérique Robin, Bruno Sericola and Emmanuelle Anceaume
Stochastic Analysis of Algorithms for Collecting Longitudinal Data

Luca D'Agati, Zakaria Benomar, Francesco Longo, Giovanni Merlino, Antonio Puliafito and Giuseppe Tricomi
IoT/Cloud-Powered Crowdsourced Mobility Services For Green Smart Cities

Miguel Francisco, Miguel Pardal and Samih Eisa
Secure protocol buffers for Bluetooth Low-Energy communication with wearable devices

11:20-11:35 Questions and Answers

11:35-12:55 Session 8: Routing, Networking and Software Defined Networks

Yves Mocquard, Bruno Sericola and Emmanuelle Anceaume
Analysis of Rumor Spreading with 2-pull or 3-pull Operations

Esmaeil Amiri, Ning Wang, Serdar Vural and Rahim Tafazolli
Hierarchical Software Defined Distributed Mobility Management (HSD-DMM)

Jad Bassil, Benoît Piranda, Abdallah Makhoul and Julien Bourgeois
Enhanced Precision Time Synchronization for Modular Robots

Tapadhir Das, Raj Mani Shukla and Shamik Sengupta
The Devil is in the Details: Confident & Explainable Anomaly Detector for Software-Defined Networks

12:39-12:55 Questions and Answers

12:55-14:10 Session 9: Cyber Security II

Francesco Pollicino, Luca Ferretti, Dario Stabili and Mirco Marchetti
Accountable and privacy-aware flexible car sharing and rental services

Pedro Marques, Luis Filipe Dias and Miguel Correia
CyberVTI: Cyber Visualization Tool for Intrusion Detection

Dobrin Dobrev and Dimiter Avresky
DDoS attack identification based on SDN

13:55-14:10 Questions and Answers

Friday, November 26

10:00-11:25 Session 10: Network Traffic Analysis

Aleksandr Vaskevich, Thilini Dahanayaka, Suranga Seneviratne and Guillaume Jourjon
SMAUG: Streaming Media Augmentation Using CGANs as a Defence Against Video

Maya Kapoor, Garrett Fuchs and Jonathan Quance
RExACtor: Automatic Regular Expression Signature Generation for Stateless Packet Inspection

Edward Chuah, Neeraj Suri, Arshad Jhumka and Samantha Alt
Challenges in Identifying Network Attacks Using Netflow Data

Sashank Sridhar and Sowmya Sanagavarapu
Darknet Traffic Classification Pipeline with Feature Selection and Conditional GAN-based Class Balancing

11:12-11:25 Questions and Answers

11:25-12:35 Session 11: Cloud Computing and Machine Learning II

M. Reza Hoseinyfarahabady, Javid Taheri, Albert Zomaya and Zahir Tari
Data-Intensive Workload Consolidation in Serverless (Lambda) Platform

Plamen Hristov, Dimiter Avresky and Ognian Boumbarov
Human-Object Interaction Detection: 1D Convolutional Neural Network Approach Using Skeleton Data

Pedro Fernandes Neto and Luís Antunes Veiga
A Model for Stream Processing using Stateful Functions

12:21-12:35 Questions and Answers

12:35-13:45 Session 12: Cyber Security III

Adam Cassell, Tapadhir Das, Zachary Black, Farhan Sadique, James Schnebly, Sergiu Dascalu, Shamik Sengupta and Jeff Springer
Sharing is Caring: Optimized Threat Visualization for a Cybersecurity Data Sharing Platform

Giorgio Valenziano Santangelo, Vincenzo Giuseppe Colacino and Mirco Marchetti
Analysis, prevention and detection of ransomware attacks on Industrial Control Systems

Lukasz Krzywiecki, Adam Adam Polubek and Hannes Salin
Multi-Signature Scheme Resistant to Randomness Injection Attacks – A Bitcoin Case

Georgi Iliev, Maria Nenova, Dimiter Avresky and Marian Hristov
Integration of Splunk Enterprise SIEM for DDoS Attack Detection in IoT

13:31-13:45 Questions and Answers

13:45-13:57 Session 13: Work in progress

Petra Loncar
Modeling and Simulation of Heterogeneous Resources in the Cloud

13:57-14:02 Questions and Answers

14:02-14:12 Conference Closing