Days: Monday, March 31st Tuesday, April 1st Wednesday, April 2nd Thursday, April 3rd Friday, April 4th
View this program: with abstractssession overviewtalk overview
Presenter:
Engin Zeydan
- Senior Researcher, Centre Tecnològic de Telecomunicacions de Catalunya (CTTC)
Abdullah Aydeger
- Department of Electrical Engineering and Computer Science, Florida Institute of Technology
Abstract:
The tutorial proposal focuses on the convergence of quantum threats in the domain of 6G networks. It aims to provide an in-depth study of this convergence, starting with background information on quantum attacks, post-quantum cryptography, and quantum key distribution. It will then explore its execution to 6G networks and their quantum-based threats. The tutorial will include a step-by-step demonstration of two of the demos to illustrate the practical implementation of these concepts. The tutorial is designed for participants with no prerequisite knowledge and aims to introduce them to the application of post-quantum cryptography and quantum key distribution to protect the 6G networks. As this topic is gaining significance and relevance in the telecommunications industry, the tutorial offers attendees the opportunity to learn about cutting-edge security issues for 6G networks and their specific applications from the cybersecurity perspective.
Presenter:
Shiwei Liu
- University of Oxford
Arijit Ukil
- TCS Research
Abstract:
Large language models (LLMs) have become pivotal in modern deep learning, making it essential to understand the underlying patterns, particularly as these models scale exponentially. With parameter counts skyrocketing from billions to trillions in recent years, the associated computational costs and energy consumption for training and fine-tuning have escalated dramatically. This rapid expansion has sparked a growing interest in techniques that can achieve more compact model paradigms without sacrificing performance. Sparsitybased model compression has emerged as one of the most promising approaches for optimizing model efficiency, yet its application to LLMs has lagged behind other compression strategies. To address this gap, we revisit the existing landscape of model compression, focusing specifically on sparse neural networks, and offer a clear categorization of the methodologies employed in this space. We then explore recent advancements in sparsity for LLM compression and the caveat of sparsity in LLMs. The tutorial will conclude with identifying key challenges and opportunities in this field. Ultimately, this tutorial provides a comprehensive roadmap tracing the evolution of model compression and sparsity from traditional models to large-scale LLMs, emphasizing its critical importance in the ongoing development of efficient and scalable AI systems.
Presenter:
JJ Merelo-Guerv'os
- Department of Computer Engineering, Automatics and Robotics, University of Granada, Spain
Abstract:
Green computing is a general term that describes a host of techniques that try to minimize the carbon footprint of software applications. As such, it is not a single body of knowledge, but a series of best practices that help reduce energy consumption relying on the features of any of the different layers that are exercised by software applications. This represents a challenge at the time of designing a comprehensive syllabus that would help students develop the series of skills needed to identify energy bottlenecks and eliminate them. In this poster we will describe the different concepts involved, and how they will be delivered to guarantee the achievement of learning objectives. Green computing [2] deals, in general, with reducing the environmental impact of the creation and use of computing resources. From the software perspective, it proposes maximizing the amount of work done for every unit of energy spent. But to achieve that, how energy is spent across all the different computing layers need to be assessed and understood. This is why getting the student to achieve a certain amount of understanding of the different process involved, methodologies needed to carry out that assessment, and eventually design your code from the ground up or refactoring it to make it greener is a challenge.
Presenter:
Mike Mannion
- Department of Computing, Glasgow Caledonian University, Glasgow, UK
Hermann Kaind
- Institute of Computer Technology, TU Wien, Vienna, Austria
Abstract:
The volume, variety and velocity of products in software-intensive systems product lines is increasing. One challenge is to understand the range of similarity between products. Reasons for product comparison include (i) to decide whether to build a new product or not (ii) to evaluate how products of the same type differ for strategic positioning or branding reasons (iii) to gauge if a product line needs to be reorganized (iv) to assess if a product falls within the national legislative and regulatory boundaries. We will discuss two different approaches to address this challenge. One is grounded in feature modelling, the other in case-based reasoning. We will also describe a specific product comparison approach using similarity matching, in which a product configured from a product line feature model is represented as a weighted binary string, the overall similarity between products is compared using a binary string metric, and the significance of individual feature combinations for product similarity can be explored by modifying the weights. We will illustrate our ideas with a mobile phone example, and discuss the benefits and limitations of this approach.
View this program: with abstractssession overviewtalk overview
Title: Advancements in Edge AI for ASR
Abstract:
We present a novel Automatic Speech Recognition (ASR) model developed to operate efficiently on low-powered edge compute devices, such as those found in car infotainment systems. Our model is based on the conformer architecture and has been fine-tuned using a diverse training dataset.
The key innovation of our approach lies in the finetuning and the optimization techniques employed to enable the model to run on resource-constrained edge devices. Despite these optimizations, our model achieves evaluation results that surpass existing open-source and commercial ASR models.
We believe that our work represents a significant advancement in the field of edge AI and has the potential to revolutionize the way speech recognition is performed in a variety of applications, including in-car voice control.
11:00 | RepAs: Iterative Refinement for Predicting Polyadenylation Site Usage (abstract) |
11:18 | Tree-based biclustering of genomic time series (abstract) |
11:36 | MHCRule - Rule-based Model for Interpretable MHC Class I Binding Prediction (abstract) |
11:54 | Efficient Medical Image Segmentation Using Probabilistic KNN Label Downsampling (abstract) |
11:00 | BERT-based User Attribute Mapping Framework in Heterogeneous Systems (abstract) |
11:18 | Enhancing Interoperability in Controlled Environment Agriculture Systems Using Plant Electrical Signals (abstract) |
11:36 | Topic-Aware Knowledge Graph with Large Language Models for Interoperability in Recommender Systems (abstract) |
11:54 | Pursuing Interoperability in Digital Twins: An Analysis of the Current Research Landscape (abstract) |
11:00 | Enhancing User Experience with Topic-Based Message Retrieval in Telegram (abstract) |
11:18 | HARIN: A Novel Metric for Hierarchical Topic Model Assessment (abstract) |
11:36 | A News Recommendation Framework Utilizing ChatGPT: Estimating Target Audience and News Categories (abstract) |
11:54 | Language Flavors in the Lusophone World: A BERT-Based Social Media Study of Portuguese in Brazil, Portugal, and Mozambique (abstract) |
12:12 | Robustly Optimized Multimedia Local and Global Context Analysis at Multi-modal Balance (abstract) |
11:00 | BiCoq : Bigraphs Formalisation with Coq (abstract) |
11:18 | Weakest Safe Context Synthesis by Symbolic Game Semantics and Logical Abduction (abstract) |
11:36 | Verifying Timed Properties of Programs in IoT nodes using Parametric Time Petri Nets (abstract) |
11:54 | Formal Modeling and Verification of Low-Level AUTOSAR OS Specifications: Towards Portability and Correctness (abstract) |
11:00 | The Rephrased Reality: Analysing Sentiment Shifts in LLM-Rephrased Text (abstract) |
11:18 | JobSet: Synthetic Job Advertisements Dataset for Labour Market Intelligence (abstract) |
11:36 | A Comparison of the Effects of Model Adaptation Techniques on Large Language Models for Non-Linguistic and Linguistic Tasks (abstract) |
11:54 | Mixture of Modular Experts: Distilling Knowledge from a Multilingual Teacher into Specialized Modular Language Models (abstract) |
12:12 | RAGCol: RAG-Based Automatic Video Colorization Through Text Caption Generation and Knowledge Enrichment (abstract) |
14:00 | Bioinspired evolutionary metaheuristic based on COVID spread for discovering numerical association rules (abstract) |
14:18 | Privacy-Preserving Data Obfuscation for Credit Scoring (abstract) |
14:36 | Deep Generative Calibration on Stochastic Volatility Models with Applications in FX Barrier Options (abstract) |
14:54 | Self-explanatory and Retrieval-augmented LLMs for Financial Sentiment Analysis (abstract) |
15:12 | A Genetic Algorithm with Convex Combination Crossover for Software Team Formation: Integrating Technical and Collaboration Skills (abstract) |
14:00 | Detection of Read-Write Issues in Hyperledger Fabric Smart Contracts (abstract) |
14:18 | Static Detection of Untrusted Cross-Contract Invocations in Go Smart Contracts (abstract) |
14:36 | Towards Solidity Smart Contract Efficiency Optimization through Code Mining (abstract) |
14:54 | Automated Market Makers: Toward More Profitable Liquidity Provisioning Strategies (abstract) |
14:00 | MapXchange: Designing a Confidentiality-Preserving Platform for Exchanging Technology Parameter Maps (abstract) PRESENTER: Jan Pennekamp |
14:18 | SHIELD: Assessing Security-by-Design in Federated Data Spaces Using Attack Graphs (abstract) PRESENTER: Alessandro Palma |
14:36 | Bringing the Digital Product Passport to Life: Requirements Analysis for a Carbon Footprint Tracking System using Knowledge Graphs and Data Spaces (abstract) PRESENTER: Anastasiia Belova |
14:54 | Context-driven Edge-based Data Sharing for Industrial IoT Data Spaces (abstract) |
14:00 | Advancing Quantum Software Engineering: A Vision of Hybrid Full-Stack Iterative Model (abstract) |
14:18 | NISQ Quantum Algorithm for K-Means Clustering (abstract) |
14:36 | Q-Edge: Leveraging Quantum Computing for Enhanced Software Engineering in Vehicular Networks (abstract) |
14:00 | Early Detection of Online Grooming with Language Models (abstract) |
14:18 | AI-Powered Comment Triage for Efficient Collaboration and Feedback Management (abstract) |
14:36 | Improving Natural Product Knowledge Extraction from Academic Literature with Enhanced PDF Text Extraction and Large Language Models (abstract) |
14:54 | FALCON: A multi-label graph-based dataset for fallacy classification in the COVID-19 infodemic (abstract) |
15:12 | Moderating Large Scale Online Deliberative Processes with Large Language Models (LLMs): Enhancing Collective Decision-Making. (abstract) |
LogSage: Log Summarization Assistant with Guided Enhancement (abstract) |
C2|Q>: Unifying Classical and Quantum Programming (abstract) |
Generative AI in Rural High Schools: Challenges and Opportunities (abstract) |
Student Research Abstract: A CSP-based approach to the generation of case studies for clinical guidelines (abstract) |
Student Research Abstract: Dynamic Adversarial Soil Modeling: A GAN-Confident Learning Approach for Precision Agriculture (abstract) |
Automatic Functions Annotations through Concrete Procedural Debugging and ELF Libification (abstract) |
Enhanced Cross-Task Learning Architecture for Boosted Decision Trees (abstract) |
Student Research Abstract: Subculture-Driven Speculation: Meme pump dot fun metric on the Solana Blockchain (abstract) |
Sequence-to-Image Transformation for Sequence Classification Using Rips Complex Construction and Chaos Game Representation (abstract) |
Student Research Abstract: Evaluating Dialogue Summarization Using LLMs (abstract) |
16:00 | Enhancing 3D Face Analysis Using Graph Convolutional Networks with Kernel-Attentive Filters (abstract) |
16:18 | Contrasting Global and Local Representations for Human Activity Recognition using Graph Neural Networks (abstract) |
16:00 | Beyond the Blockchain Address: Zero-Knowledge Address Abstraction (abstract) ![]() ![]() PRESENTER: Sanghyeon Park |
16:18 | Attacking Anonymity Set in Tornado Cash via Wallet Fingerprints (abstract) PRESENTER: Martina Soleti |
16:00 | Feel the Wave: Using Waveguides as a Tactile Communication Interface for Deafblind People (abstract) |
16:18 | Road Accessibility Mapping through Smartphone-Based Sensing (abstract) |
16:36 | Enhancing Brazilian Portuguese Augmentative and Alternative Communication with Card Prediction and Colourful Semantics (abstract) |
16:00 | An Adversarial Model with Diffusion for Robust Recommendation against Shilling Attack (abstract) |
16:18 | An Unsupervised Approach for Aspect-Based Sentiment Classification Using Attentional Neural Models (abstract) |
16:00 | PCTL Model Checking for Temporal RL Policy Safety Explanations (abstract) |
16:18 | Identity-Focused Inference and Extraction Attacks on Diffusion Models (abstract) |
16:36 | TSPTE :Text sentiment-aware privacy protection method based on truncated exponent (abstract) |
16:54 | N-Pixels: a Novel Grey-Box Adversarial Attack for Fooling Convolutional Neural Networks (abstract) |
17:12 | D-semble: Efficient Diversity-Guided Search for Resilient ML Ensembles (abstract) |
View this program: with abstractssession overviewtalk overview
09:00 | Speed-up of Data Analysis with Kernel Trick in Encrypted Domain (abstract) |
09:18 | Supervised Contrastive Learning with Importance-based CutOut for Few-shot Image Classification (abstract) |
09:36 | GANDALF: A LLM-based approach to map bark beetle outbreaks in semantic stories of Sentinel-2 images (abstract) |
09:54 | Explainable Time Series Prediction of Tyre Energy in Formula One Race Strategy (abstract) |
09:00 | Strangers Sets: Preserving Drones' Location Privacy while Avoiding Violations of Critical Infrastructures (abstract) |
09:18 | Enhancing Room Occupancy Inference from Sparse PIR Sensor Data Using Transformer Models (abstract) |
09:36 | BISCUID: On the Feasibility of Identifying Scouting Drones Based on their Flying Behavior (abstract) |
09:54 | Leveraging Contrastive Learning and Spatial Encoding for Prediction in Traffic Networks with Expanding Infrastructure (abstract) |
10:12 | Refining Urban Microscopic Traffic Simulations Accuracy Using a Customized Random Walk Model for Dynamic Stochastic Route Choice (abstract) |
09:00 | Distributed Tracing for Cascading Changes of Objects in the Kubernetes Control Plane (abstract) |
09:18 | FOA-Energy: A Multi-objective Energy-Aware Scheduling Policy for Serverless-based Edge-Cloud Continuum (abstract) |
09:36 | A Design Framework for Cloud-HPC Integration in MLOps (abstract) |
09:54 | CADiA: A CPU Cache Allocation System for Distributed Parallel Applications (abstract) |
10:12 | Elastic Vertical Memory Management for Container-based Stateful Applications in Kubernetes (abstract) |
09:00 | A Machine Learning-Based Approach For Detecting Malicious PyPI Packages (abstract) |
09:18 | Leveraging Search-Based and Pre-Trained Code Language Models for Automated Program Repair (abstract) |
09:36 | My Code Is Less Secure with Gen AI: Surveying Developers’ Perceptions of the Impact of Code Generation Tools on Security (abstract) |
09:54 | Supporting Software Engineers in IT Security and Privacy through Automated Knowledge Discovery (abstract) |
10:12 | A Two-stage Approach for Structurally-similar Cross-language Code-pair Detection (abstract) |
09:00 | MAPLe: A B+-tree with Multi-Access Parallel Leaves to Improve Access Concurrency and Locality (abstract) |
09:18 | SkipLSM: Fast Retrieval of Hot Key-Value Pairs on LSM Tree (abstract) |
09:36 | A Novel Traffic Flow Prediction Model based on a Direct Spatio-Temporal Graph (abstract) |
09:54 | Partition Strategies for Vertex-Centric Historical Graph Systems (abstract) |
10:12 | Triangle Counting in Large Historical Graphs (abstract) |
11:00 | Explainable Reinforcement Learning for Formula One Race Strategy (abstract) |
11:18 | Univariate vs multivariate prediction for containerised applications auto-scaling: a comparative study (abstract) |
11:36 | Advancing Chronic Disease Prediction with Your First-Visit: Ensemble and Deep Learning Models (abstract) |
11:54 | DDSNet: A Lightweight Dense Depthwise Separable Network for Tumor Classification (abstract) |
11:00 | PreMatch: A Prediction-based Scheduler for Dataflow Asynchronous Processing on the Computing Continuum (abstract) PRESENTER: Narges Mehran |
11:18 | Modelling Dependable Systems with Modular Rewritable Stochastic Petri Nets (abstract) |
11:36 | Towards Adaptive Transactional Consistency for Georeplicated Datastores (abstract) |
11:54 | Exploiting Fuzzy Controllers for Adapting Messaging Systems (abstract) |
11:00 | An Attention-based Dual Stream Network for Efficient Electricity Price Forecasting (abstract) |
11:18 | Knowledge Distillation for Reduced Footprint Semantic Segmentation with the U-Net (abstract) |
11:36 | Visualizing Streaming Data in Industrial Scale IoT Systems (abstract) |
11:54 | Energy-Aware Vision Model Partitioning for Edge AI (abstract) |
11:00 | MedTiny Code Generation for Enhancing RegLang Smart Contract Reliability (abstract) |
11:18 | VeriFogOps: Automated Deployment Tool Selection and CI/CD Pipeline Generation for Verifying Fog Systems at Deployment Time (abstract) PRESENTER: Hiba Awad |
11:36 | MigrationMapper: Fine-Grained Detection of Third-Party Java Library Migration (abstract) |
11:54 | Towards Enforcing Structural OCL Constraints using Constraint Programming (abstract) |
12:12 | Migrating Monolithic Web Applications to Microservice Architectures Considering Dependencies on Databases and Views (abstract) |
11:00 | FERAT: A New Expansion-Based Certification Framework for Quantified Boolean Formulas (abstract) |
11:18 | Solution Counts of Some Prominent Quantified Boolean Formulas Families (abstract) |
11:36 | Reasoning with Plausibility in Incomplete Argumentation Frameworks (abstract) |
11:54 | Beyond Optimal: Interactive Identification of Better-than-optimal Repairs (abstract) |
Unlinkable Data Sharing with Dynamic Access Control (abstract) |
Debiasing Classifiers by Amplifying Bias with Latent Diffusion and Large Language Models (abstract) |
From RAG to QA-RAG: Integrating Generative AI for Pharmaceutical Regulatory Compliance Process (abstract) |
Learning Visual Servoing for Nonholonomic Mobile Robots with Uncalibrated Cameras (abstract) |
Exploration and Active Recognition Strategy using Meta-MDP (abstract) |
Curriculum Demonstration Selection for In-Context Learning (abstract) PRESENTER: Duc Anh Vu |
Assessing Argument-based Natural Language Explanations in Medical Text (abstract) |
Cognitive Biases in Large Language Models: A Survey and Mitigation Experiments (abstract) |
Quantitative Assessment of Explainability in Machine Learning Models : A Study on the OULA Dataset (abstract) |
Dynamic Programming Algorithms for Probabilistic Bipolar Argumentation Frameworks (abstract) |
zkEC@0.0.1: Evolutionary Computation Meets Programmable Cryptography on Blockchain (abstract) |
Energy consumption of evolutionary algorithms implemented in low-level languages (abstract) |
Integrating Access Control with Retrieval-Augmented Generation: A Proof of Concept for Managing Sensitive Patient Profiles (abstract) |
ChatGPT, what is a ‘Glasanwalt’? - Linguistic strategies in a large language model’s interpretation of novel compounds (abstract) |
Sampling Frequent and Diversified Patterns Through Compression (abstract) |
One-mode Projection of Bipartite Graphs for Text Classification using Graph Neural Networks (abstract) |
Mamba-PKD: A Framework for Efficient and Scalable Model Compression in Image Classification (abstract) |
GSHAPA: Gene Set Analysis for Single-Cell RNAseq Using Random Forest and SHAP Values (abstract) |
AI-Enhanced Learning: Comparing Outcomes in Introductory and Advanced Programming Courses (abstract) |
Supporting Accessibility Auditing and HTML Validation using Large Language Models (abstract) |
Tailoring Adaptive-Zero-Shot Retrieval and Probabilistic Modelling for Psychometric Data (abstract) |
Enhancing user reliability using a contextual-based approach on heterogeneous graph (abstract) |
On exploiting LLMs and Statistical Methods for testing Contractual Clarity (abstract) |
Information Flow in Deep Learning Classification Networks (abstract) |
PacECG-Net: A Multi-modal Approach Integrating LLMs and ECG for LVSD Classification in Pacemaker Patients (abstract) |
From Theory to Practice: Demonstrators of FAIR Data Spaces Across Different Sectors (abstract) |
14:00 | Bounded Editing: Multi-Object Image Manipulation with Region-Specific Control (abstract) |
14:18 | FEFM: Feature Extraction and Fusion Module for Enhanced Time Series Anomaly Detection (abstract) |
14:36 | High-Fidelity Face Age Transformation via Hierarchical Encoding and Contrastive Learning (abstract) |
14:54 | Unsupervised Training Framework for 3D Point Cloud Object Detection Mode (abstract) |
14:00 | Predicting Battery Levels of Sensor Nodes Using Reinforcement Learning in Harsh Underground Mining Environments (abstract) |
14:18 | Towards Efficient Mobility Management in 5G-Advanced: A Predictive Model for Network Slice Availability (abstract) |
14:36 | Balancing the Scales: Using GANs and Class Balance for Superior Malware Detection (abstract) |
14:54 | Enhancing Cybersecurity in Internet of Vehicles: A Machine Learning Approach with Explainable AI for Real-Time Threat Detection (abstract) |
15:12 | HyPoPE: A Hybrid Proof of Participation and Efficiency Protocol for Secure IoT Blockchain Networks (abstract) |
14:00 | Incentivizing Crowdsensing in IoT through Micropayments: an Architecture and Simulation Study (abstract) |
14:18 | Advanced Knowledge Transfer: Refined Feature Distillation for Zero-Shot Quantization in Edge Computing (abstract) |
14:36 | Efficient PUF-Based IoT Authentication Framework without Fuzzy Extractor (abstract) |
14:54 | EdgeMiner: Distributed Process Mining at the Data Sources (abstract) |
14:00 | Claim vs. Capability: A Comparative Analysis of the SBOM Generation Tools for Rust Projects (abstract) |
14:18 | LLM-guided Predicate Discovery and Data Augmentation for Learning Likely Program Invariants (abstract) |
14:36 | Quality trade-offs in ML-enabled systems: a multiple-case study (abstract) PRESENTER: Vladislav Indykov |
14:54 | A self-managing IoT-Edge-Cloud architecture for improved robustness in environmental monitoring (abstract) |
14:00 | Multicriteria File-Level Placement Policy for HPC Storage (abstract) |
14:18 | CRAZNS: A Case for Conventional Namespace Support for RAID with ZNS SSDs (abstract) |
14:36 | Efficient Kernel Source Code Management for BMC Optimization (abstract) |
14:54 | lwFSCK: Light-weight Filesystem Check (abstract) PRESENTER: Juwon Kim |
A qualitative study for understanding professionals' perspectives of Quantum Business (abstract) |
Securing MQTT using Pseudo Random Number Generation (abstract) |
Poster: Decentralized Finance Withdrawal Delays (abstract) |
Creating Scala-Embedded Domain-Specific Languages (abstract) |
A Software-Defined Overlay Networking Middleware for a Simplified Deployment of Distributed Application at the Edge (abstract) |
Measuring the Impact of Fuzzing Activity in Networking Software (abstract) |
A Decentralized Strategy for Unweighted Minimum Vertex Cover (abstract) |
Dynamic Pricing for Electric Vehicle Charging (abstract) |
HCN-TA: Hierarchical Capsule Network with Temporal Attention for a Generalizable Approach to Audio Deepfake Detection (abstract) |
A2SC: Adaptive Speed and Sensorless Control System for Motor Controllers based on Deep-RL (abstract) |
Complex Knowledge Graph Matching with Large Language Model Embeddings (abstract) |
Leveraging C++20 Concepts for Fast and Feature-Rich IO (abstract) |
Online Learning from Capricious Data streams with Flexible Hoeffding Tree (abstract) |
On the Time Predictability of AXI4 (abstract) |
An AI-augmented Framework for Automated and Intelligent Process Monitoring (abstract) |
Automated Cybersecurity Risk Assessment and Visualization Framework for Resilient Cloud IT Asset Management (abstract) |
State of Obfuscation: A Longitudinal Study of Code Obfuscation Practices in Google Play Store (abstract) |
Looseness for Choreography-based Software Architectures on Blockchain (abstract) |
Xook-Flow: an abstract communication channel model for the data exchange in computing continuum (abstract) |
Mobile App Quality Assessment: Leveraging LLM-Driven Data Augmentation for Enhanced User Reviews Analysis (abstract) |
A Lightweight and Accurate Localization Model for Anatomical Landmark in Medical Imaging Using Depth-Wise Separable Convolution (abstract) |
NFR4SUSTAIN: Catalog of Requirements for Software Sustainability (abstract) |
Can Less Accurate Be More Accurate? Surpassing Exact Multiplier with Approximate Design on NISQ Quantum Computers (abstract) |
Scalable Orchestration Design for Mixed-Critical Task Scheduling in SDI-based Mobility Systems (abstract) |
Detecting Co-change Using Categorized Commit Data (abstract) |
Requirements Traceability: A Systematic Literature Review (abstract) |
Decentralized Bridge Between Polkadot and Cosmos (abstract) |
Controlling VC disclosure with Terms of Use and ABAC in SSI (abstract) |
Data-Driven Orchestration for Distributed RAN Intelligent Controller Placement in 6G Networks (abstract) |
Automating Data Quality Monitoring for Environmental Air Quality System (abstract) |
16:00 | A Hybrid Self-Correcting Approach for Embedding Ontology-based Knowledge Graphs (abstract) |
16:18 | Spatial Information Integration in Small Language Models for Document Layout Generation and Classification (abstract) |
16:36 | Unlearn and Protect: Selective Identity Removal in Diffusion Models for Privacy Preservation (abstract) |
16:54 | TAECE : T2I-Adapter with Enhanced Color Expression for Improving Conditional Text-to-Image Generation Capabilities (abstract) |
16:00 | Deep Reinforcement Learning for Context-Aware Online Service Function Chain Deployment and Migration over 6G Networks (abstract) |
16:18 | Multiple Policy Approach for Efficient Resource Allocation in SDM-EONs (abstract) |
16:36 | Improving Kademlia Lookup Privacy through Query Obfuscation (abstract) |
16:00 | An Early Exit Deep Neural Network for Fast Inference Intrusion Detection (abstract) |
16:18 | LonelyTracker: An IoT Solution with Multimodal Data and Split Computing for Secure Loneliness Detection (abstract) |
16:36 | Optimized Model Selection for Wind Farm Power Forecasting using Dynamic Time Warping (abstract) |
16:54 | Paprika: Replica Placement for Multi-Region Edge Publish-Subscribe Systems (abstract) |
16:00 | On the Difficulty of NOT being Unique: Fingerprinting Users from Wi-Fi Data in Mobile Devices (abstract) |
16:18 | Transparent Smartphone Memory Expansion (abstract) |
16:36 | What’s in an Embedding? Harnessing Deep Learning to Fuse Multi-Sensor Embeddings for Room Identification (abstract) |
View this program: with abstractssession overviewtalk overview
Title: The Pursuit of Privacy in the AI Age
Abstract:
We generate and share vast amounts of data that reveal a detailed portrait of our lives, exposing our identity, behaviors, and preferences. To enable individuals to exercise greater control over their personal information, I will present novel approaches to identify and protect sensitive attributes within data. I will present feature representations that effectively disentangle sensitive information from non-sensitive attributes. Furthermore, I will present perturbation techniques designed to obfuscate sensitive attributes while preserving or potentially enhancing the overall quality of the data, thereby safeguarding sensitive information from unwanted inference.
10:30 | Collaborative filtering through weighted similarities of user and item embeddings (abstract) |
10:48 | Network-based instance hardness measures for classification problems (abstract) PRESENTER: Márcio Basgalupp |
11:06 | Data Balancing for Mitigating Sampling Bias in Machine Learning (abstract) PRESENTER: Márcio Basgalupp |
11:24 | MoRSE: Bridging the Gap in Cybersecurity Expertise with Retrieval Augmented Generation (abstract) |
11:42 | PULLM: A Multimodal Framework for Enhanced 3D Point Cloud Upsampling Using Large Language Models (abstract) |
10:30 | Communication Isolation For Multi-Robot Systems Using ROS2 (abstract) |
10:48 | MARTES: Multi-Agent Reinforcement learning Training Environment for Scheduling (abstract) PRESENTER: Karen Yadira Lliguin León |
11:06 | A Semantic Mapping Framework for Service Robots (abstract) |
11:24 | Lightweight Decentralized Neural Network-Based Strategies for Multi-Robot Patrolling (abstract) |
11:42 | ST-CBS: Spatio-Temporal Conflict Based Search in Continuous Space for Multi-Agent Pathfinding (abstract) |
10:30 | Rabbitail: A Tail Latency-Aware Scheduler for Deep Learning Recommendation Systems with Hierarchical Embedding Storage (abstract) |
10:48 | Relay Memory Analysis via Constraint Satisfaction Modeling for Malware Detection in the Electrical Power Grid (abstract) |
11:06 | WMN-CDA: Contrastive Domain Adaptation for Wireless Mesh Network Configuration (abstract) |
11:24 | Harnessing Sub-blocks Erase of NAND flash for Secure Deletion Performance Enhancement on CPS (abstract) |
11:42 | Leveraging BRSKI to Protect the Hardware Supply Chain of Operational Technology: Opportunities and Challenges (abstract) |
10:30 | U Can Touch This! Microarchitectural Timing Attacks via Machine Clears (abstract) |
10:48 | MemBERT: Foundation model for memory forensics (abstract) |
11:06 | Swiss Cheese CAPTCHA: A Novel Multi-barrier Mechanism for Bot Detection (abstract) PRESENTER: P. Sahithi Reddy |
11:24 | Anomaly Detection and Mitigation for Electric Vehicle Charging-Based Attacks on the Power Grid (abstract) |
11:42 | Improving Anomaly Detection for Electric Vehicle Charging with Generative Adversarial Networks (abstract) |
13:30 | Hierarchical Contrastive Learning with Multiple Augmentations for Sequential Recommendation (abstract) |
13:48 | Hybrid Flow Shop Scheduling through Reinforcement Learning: A systematic literature review (abstract) PRESENTER: Victor Pugliese |
14:06 | Neighbor-Based Decentralized Training Strategies for Multi-Agent Reinforcement Learning (abstract) PRESENTER: Davide Domini |
14:24 | SC-Block++: A Blocking Algorithm Based on Adaptive Flood Regularization (abstract) |
13:30 | Soilcast: a Multitask Encoder-Decoder AI Model for Precision Agriculture (abstract) |
13:48 | Fusing Expert Knowledge and Internet of Things Data for Digital Twin Models: Addressing Uncertainty in Expert Statements (abstract) PRESENTER: Michelle Jungmann |
14:06 | Deep Reinforcement Learning of Simulated Students Multimodal Mobility Behavior: Application to the City of Toulouse (abstract) |
14:24 | A DIF-Driven Threshold Tuning Method for Improving Group Fairness (abstract) |
13:30 | Strengthening Application Security through Integrity Protection of System Call Usage (abstract) |
13:48 | Stealth Extension Exfiltration (SEE) Attacks: Stealing User Data without Permissions via Browser Extensions (abstract) PRESENTER: Chaejin Lim |
14:06 | Detecting Cache-based Side-Channel Attacks by Leveraging Mesh Interconnect Traffic Monitoring (abstract) PRESENTER: Xingchao Bian |
14:24 | Data Distribution and Redistribution - A formal and practical Analysis of the DDS Security Standard (abstract) |
14:42 | GUARD: Generic API De-obfuscation and Obfuscated Malware Unpacking with sIAT (abstract) |
15:30 | Comparative Study of Lexical and Semantic Approaches in Closed-domain Product Search (abstract) |
15:48 | Towards Robust Facial Recognition: Gabor Filter-Based Feature Extraction for NIR-VIS Heterogeneous Face Recognition (abstract) |
16:06 | MELA: Multi-Event Localization Answering Framework for Video Question Answering (abstract) |
15:30 | A Retrieval-Augmented Framework For Meeting Insight Extraction (abstract) |
15:48 | Deciphering Social Behaviour: a Novel Biological Approach For Social Users Classification (abstract) |
16:06 | Supervised Ensemble-based Causal DAG Selection (abstract) |
15:30 | [Invited Talk] Formal and Practical Aspects of Domain-Specific Languages (abstract) |
16:06 | A Mechanized Formalization of an FRP Language with Effects (abstract) |
16:24 | A Platform-Independent Software-Intensive Workflow Modeling Language And An Open-Source Visual Programming Tool: A Bottom-Up Approach Using Ontology Integration Of Industrial Workflow Engines (abstract) |
16:42 | Breadth-first Cycle Collection Reference Counting: Theory and a Rust Smart Pointer Implementation (abstract) |
15:30 | Towards a Comprehensive Evaluation of Voltage-Based Fingerprinting for the CAN Bus (abstract) |
15:48 | Detection of Device Triggerable Vulnerabilities in Android Companion Apps through Interactive Triaging (abstract) |
16:06 | Formally Verifying Robustness and Generalisation of Network Intrusion Detection Models (abstract) |
16:24 | Clogging DoS Resilient Bootstrapping of Efficient V2V Validation (abstract) |
View this program: with abstractssession overviewtalk overview
09:00 | Affordably Fine-tuned LLMs Provide Better Answers to Course-specific MCQs (abstract) |
09:18 | Fine-Tuning GPT-3.5-Turbo for Automatic Feedback Generation (abstract) |
09:36 | Assessing the Real-World Impact of Disagreement Between Human Graders and LLMs (abstract) |
09:54 | Beyond Text-to-Text: An Overview of Multimodal and Generative Artificial Intelligence for Education Using Topic Modeling (abstract) |
09:00 | A Scalable Approach for Memory Optimization in AUTOSAR Schedule Tables (abstract) |
09:18 | Exploiting Omega Network and Inexact Accumulative Parallel Counter to Enhance Energy Efficiency in Stochastic Computing (abstract) |
09:36 | Optimizing Compute Core Assignment for Dynamic Batch Inference in AI Inference Accelerator (abstract) |
09:54 | Efficient Scheduling of Weakly-Hard Real-Time Tasks with Sufficient Schedulability Condition (abstract) |
09:00 | X3A: Efficient Multimodal Deepfake Detection with Score-Level Fusion (abstract) |
09:18 | GAN or DM? In-depth Analysis and Evaluation of AI-generated Face Data for Generalizable Deepfake Detection (abstract) |
09:36 | Finger Vein Spoof GANs: Issues in Presentation Attack Detector Training (abstract) |
09:54 | Features Leverage in Graph Models for Mineral ProspectivityMapping (abstract) |
09:00 | A Circular Construction Product Ontology for End-of-Life Decision-Making (abstract) |
09:18 | LogBabylon: A Unified Framework for Cross-Log File Integration and Analysis (abstract) |
09:36 | Taxonomy Expansion through Collaborative LLM Mapping (abstract) |
09:54 | SkiLLMo: Normalized ESCO Skill Extraction through Transformer Models (abstract) PRESENTER: Antonio Serino |
11:00 | Knowledge Distillation in RNN-Attention Models for Early Prediction of Student Performance (abstract) |
11:18 | The Use of Generative Artificial Intelligence for Upper Secondary Mathematics Education Through the Lens of Technology Acceptance (abstract) |
11:36 | UKTA: Unified Korean Text Analyzer (abstract) |
11:54 | Measuring (meta)emotion, (meta)motivation, and (meta)cognition using digital trace data: A systematic review of K-12 self-regulated learning (abstract) |
11:00 | SeismicSense: Phase Picking of Seismic Events with Embedded Machine Learning (abstract) |
11:18 | Software-Hardware Binding for Protection of Sensitive Data in Embedded Software (abstract) |
11:36 | asmMBA: Robust Virtualization Obfuscation with Assembly-Based Mixed Boolean-Arithmetic (abstract) |
11:54 | Probabilistic Timing Estimates in Scenarios Under Testing Constraints (abstract) |
11:00 | Mapillary Street Vegetation Scoring: End-to-End Process (abstract) |
11:18 | MorphoLayerTrace (MLT): A Modified Automated Radio-Echo Sounding Englacial Layer-tracing Algorithm for Englacial Layer Annotation in Ice Penetrating Radar Data (abstract) |
11:36 | Sanity Checks in Smart Home Sensor Streams (abstract) |
11:54 | Efficient Instance Selection in Tree-Based Models for Data Streams Classification (abstract) |
12:12 | ASML-REG: Automated Machine Learning for Data Stream Regression (abstract) |
11:00 | UTL: A Unified Language for Requirements Templates (abstract) |
11:18 | Advances in Requirements Engineering for Well-Being, Aging, and Health: A Systematic Mapping Study (abstract) |
11:36 | Enhancing Device-Goal-Norm Modeling for Ambient Assisted Living with Large Language Models (abstract) |
11:54 | SimRE: A Requirements Similarity Tool for Software Product Lines (abstract) |