All times listed are in Central European Summer Time (CEST)
MONDAY, 25 APRIL 2022
09:00-10:30 | MC1: Security Management (I)
Room Boróka I, Chair: Fulvio Valenza |
09:00-09:22 - Hybrid Collaborative Architectures For Intrusion Detection In Multi-Access Edge Computing
Authors:
Rahul Sharma, The University of Melbourne, Australia
Chien Aun Chan, The University of Melbourne, Australia
Christopher Leckie, University of Melbourne, Australia
09:23-09:45 - Towards a Zero-Trust Micro-segmentation Network Security Strategy: An Evaluation Framework
Authors:
Nardine Basta, Macquarie University, Australia
Muhammad Ikram, Macquarie University, Australia
Dali Kaafar, Macquarie University, Australia
Andy Walker, Ditno, Australia
09:46-10:08 - Policy-based and Behavioral Framework to Detect Ransomware Affecting Resource-constrained Sensors
Authors:
Alberto Huertas Celdran, University of Zurich, Switzerland
Pedro Miguel Sánchez Sánchez, University of Murcia, Spain
Eder John Scheid, University of Zurich (UZH), Switzerland
Timucin Besken, University of Zurich, Switzerland
Gérôme Bovet, armasuisse, Switzerland
Gregorio Martinez Perez, University of Murcia, Spain
Burkhard Stiller, University of Zurich UZH, Switzerland
10:08-10:30 - Poisoning Attacks against Federated Learning in Load Forecasting of Smart Energy
Authors:
Naik Bakht Sania Qureshi, Incheon National University, Republic of Korea
Dong-Hoon Kim, Incheon National University, Republic of Korea
Jiwoo Lee, Incheon National University, Republic of Korea
Eun-Kyu Lee, Incheon National University, Republic of Korea
11:00-12:52 | MC2: Performance monitirng and measurement
Room Boróka I, Chair: Burkhard Stiller |
11:00-11:22 - SPT: sketch-based polling in-band network telemetry
Authors:
Mingwei Cui, Beijing University of Posts and Telecommunications, Republic of China
Xiao Li, Beijing University of Posts and Telecommunications, Republic of China
Ying Wang, Beijing University of Posts and Telecommunications, Republic of China
Tianyuan Niu, Beijing University of Posts and Telecommunications, Republic of China
Fan Yang, Beijing University of Posts and Telecommunications, Republic of China
11:23-11:45 - ML-based Performance Prediction of SDN using Simulated Data from Real and Synthetic Networks
Authors:
Katharina Dietz, University of Würzburg, Germany
Nicholas Gray, University of Wuerzburg, Germany
Michael Seufert, University of Würzburg, Germany
Tobias Hossfeld, University of Würzburg, Germany
11:46-12:08 - Towards the Classification of TCP Throughput Changes
Authors:
Simon Bauer, Technical University of Munich, Germany
Benedikt Jaeger, Technical University of Munich, Germany
Max Reimann, Technical University of Munich, Germany
Jonas Fromm, Technical University of Munich, Germany
Georg Carle, Technical University of Munich, Germany
12:08-12:30 - Factored Reinforcement Learning for Auto-scaling in Tandem Queues
Authors:
Thomas Tournaire, Nokia Bell Labs & Télécom SudParis, France
Yue Jin, Nokia Bell Labs, France
Armen Aghasaryan, Nokia Bell Labs, France
Hind Castel-Taleb, Télécom SudParis - Institut Polytechnique de Paris, France
Emmanuel Hyon, Université Paris Nanterre, France
12:30-12:52 - Change Point Evaluation in Networking Logs with Periodicity Filtering and Bootstrapping
Authors:
Johan Garcia, Karlstad University, Sweden
13:30-15:00 | MC3: Data-driven management
Room Boróka I, Chair: TBD |
13:30-13:52 - On Learning Hierarchical Embeddings from Encrypted Network Traffic
Authors:
Nikolas Wehner, University of Würzburg, Germany
Markus Ring, Coburg University of Applied Sciences and Arts, Germany
Joshua Schüler, University of Würzburg, Germany
Andreas Hotho, University of Würzburg, Germany
Tobias Hossfeld, University of Würzburg, Germany
Michael Seufert, University of Würzburg, Germany
13:53-14:14 - Robust Deep Learning against Corrupted Data in Cognitive Autonomous Networks
Authors:
Marton Kajo, Technical University of Munich, Germany
Janik Schnellbach, Technical University Munich, Germany
Stephen Mwanje, Nokia Bell Labs, Germany
Georg Carle, Technical University of Munich, Germany
14:15-14:37 - Decision tree-based blending method using deep-learning for network management
Authors:
Ons Aouedi, University of Nantes, France
Kandaraj Piamrat, University of Nantes, France
Benoît Parrein, University of Nantes, France
14:38-15:00 - Multi-Agent Graph Convolutional Reinforcement Learning for Intelligent Load Balancing
Authors:
Omar Houidi, Telecom SudParis, France
Sihem Bakri, Telecom SudParis, France
Djamal Zeghlache, Telecom SudParis, France
15:30-17:00 | MC4: Wireless and cellular networks
Room Boróka I, Chair: TBD |
15:30-15:52 - HERRA: Energy-Aware Scalable D2D 5G Cellular Traffic Offloading Scheme
Authors:
Safwan Alwan, University Paris Est Créteil (UPEC), France
Ilhem Fajjari, Orange labs, France
Nadjib Aitsaadi, UVSQ Paris-Saclay University, France
Paul Rubin, Michigan State University, USA
15:53-16:14 - A Data Driven Coordination between Load Balancing and Interference Cancellation
Authors:
Diego Fernando Preciado Rojas, Technical University of Ilmenau, Germany
Andreas Mitschele-Thiel, Technical University of Ilmenau
16:15-16:37 - Analytical Calculation of the User Threshold for the Switching between Unicast and Broadcast in Cellular Networks
Authors:
Juan Vargas, IMT Atlantique, France
Cédric Thienot, Enensys Technologies, France
Xavier Lagrange, IMT Atlantique/IRISA, France
16:38-17:00 - Graph Neural Network based Root Cause Analysis Using Multivariate Time-series KPIs for Wireless Networks
Authors:
Chia-Cheng Yen, University of California Davis, USA
Wenting Sun, Ericsson, USA
Hakimeh Purmehdi, Ericsson, USA
Won Park, Ericsson, USA
Kunal Rajan Deshmukh, Ericsson, USA
Nishank Thakrar, Ericsson, USA
Omar Nassef, King's College London, UK
Adam Jacobs, KTH Royal Institute of Technology, Sweden
FRIDAY, 29 APRIL 2022
09:00-10:30 | MC5: 5G and beyond mobile networks
Room Boróka I, Chair: TBD |
09:00-09:22 - Roadrunner: O-RAN-based Cell Selection in Beyond 5G Networks
Authors:
Estefania Coronado, i2CAT Fundation, Spain
Muhammad- Shuaib Siddiqui, i2CATFundation, Spain
Roberto Riggio, Polytechnic University of Marche, Italy
09:23-09:45 - Joint Resources and Phase-Shift Optimization of MEC-Enabled UAV in IRS-Assisted 6G THz Networks
Authors:
Yu Min Park, Kyung Hee University, Republic of Korea
Sheikh Hassan, Kyung Hee University, Republic of Korea
Yan Kyaw Tun, Kyung Hee University, Republic of Korea
Zhu Han, University of Houston, USA
Choong Seon Hong, Kyung Hee University, Republic of Korea
09:46-10:08 - Slice admission control using overbooking for enhancing provider revenue in 5G Networks
Authors:
Shivani Saxena, Indian Institute of Technology Madras, India
Krishna Sivalingam, Indian Institute of Technology Madras, India
10:08-10:30 - Analysis of CPU Placement of Cell-Free Massive MIMO for User-centric RAN
Authors:
Takahide Murakami, KDDI Research, Inc., Japan
Naoki Aihara, KDDI Research, Inc., Japan
Akio Ikami, KDDI Research, Inc., Japan
Yu Tsukamoto, KDDI Research, Inc., Japan
Hiroyuki Shinbo, KDDI Research, Inc., Japan
11:00-12:30 | MC6: Use cases and prototypes
Room Boróka I, Chair: TBD |
11:00-11:22 - Intent-based System Design with Efficient Search Using Partial-Order Reduction
Authors:
Takuya Kuwahara, NEC Corporation, Japan
Takayuki Kuroda, NEC Corporation, Japan
Kozo Satoda, NEC Corporation, Japan
11:23-11:45 - HyperSFP: Fault-Tolerant Service Function Chain Provision on Programmable Switches in Data Centers
Authors:
Hongyi Huang, Tsinghua University, P.R. China
Wenfei Wu, Tsinghua University, P.R. China
11:46-12:08 - Sibyl: a Framework for Evaluating the Implementation of Routing Protocols in Fat-Trees
Authors:
Tommaso Caiazzi, Roma Tre University, Italy
Mariano Scazzariello, Roma Tre University, Italy
Leonardo Alberro, Universidad de la Republica - Montevideo, Uruguay
Lorenzo Ariemma, Roma Tre University, Italy
Alberto Castro, Universidad de la Republica - Montevideo, Uruguay
Eduardo Grampin, Universidad de la Republica - Montevideo, Uruguay
Giuseppe Di Battista, Roma Tre University, Italy
12:08-12:30 - A Proposal for Time-Aware Scheduling in WirelessIndustrial IoT Environments
Authors:
Ben Schneider, fortiss GmbH, Germany
Rute C. Sofia, fortiss GmbH, Germany
Matthias Kovatsch, ETH Zürich, Switzerland
13:30-15:00 | MC7: Security Management (II)
Room Boróka I, Chair: Pál Varga |
13:30-13:52 - HTTPS Event-Flow Correlation: Improving Situational Awareness in Encrypted Web Traffic
Authors:
Stanislav Spacek, Masaryk University, Czech Republic
Petr Velan, Masaryk University, Czech Republic
Pavel Celeda, Masaryk University, Czech Republic
Daniel Tovarnak, Masaryk University, Czech Republic
13:53-14:14 - DMEF: Dynamic Malware Evaluation Framework
Authors:
Christian Dietz, University of Federal Armed Forces Munich, Germany
Marcel Antzek, University of Federal Armed Forces Munich, Germany
Gabi Dreo Rodosek, University of Federal Armed Forces Munich, Germany
Anna Sperotto, University of Twente, The Netherlands
Aiko Pras, University of Twente, The Netherlands
14:15-14:37 - Self-sovereign Identity Management Framework using Smart Contracts
Authors:
Komal Gilani, Institut Mines-Telecom - Telecom SudParis, France
Fariba Ghaffari, Orange Labs, France
Emmanuel Bertin, Orange Labs, France
Noel Crespi, Institut Mines-Telecom - Telecom SudParis, France
14:38-15:00 - Pikachu: Temporal Walk Based Dynamic Graph Embedding for Network Anomaly Detection
Authors:
Ramesh Paudel, George Washington University, USA
H. Howie Huang, George Washington University, USA