Click here to download the conference brief
Click here to download the conference proceedings
Honolulu time
Monday, February 16
Tuesday, February 17
Wednesday, February 18
Thursday, February 19
8:20 ‑ 8:30
Opening Remarks
8:30 ‑ 9:30
Keynote I: Prof. Wei Zhao: From Classical Computing to Quantum Computing
Keynote II: Prof. H. Vincent Poor: Resource Constrained Learning over Wireless Networks
Keynote III: Dr. Jessica Bian: Greening the Cloud: Sustainable Energy for Data-Driven Futures
Keynote IV: Prof. Homer Chen: Light Field Technology for AI/AR Glasses
9:30 ‑ 10:00
Coffee Break
Coffee Break
Coffee Break
Coffee Break
10:00 ‑ 12:00
Distinguished Lecture-1
Invited Talks-1
CNS-1
CNS-2
CNS-3
Invited Talks-4
Invited Papers-1
AI-1
AMCN-1
CIS-1
Invited Talks-6
Invited Talks-7
ECB-1
MCC
NAPE-1
Invited Talks-8
Invited Talks-9
NGNI
NGMN
OGN/SCDM
12:00 ‑ 13:30
Lunch
Lunch
Lunch
Lunch
13:30 ‑ 15:30
Distinguished Lecture-2
Invited Talks-2
CNS-4
CNS-5
CNS-6
Plenary Forum-1
Plenary Forum-2
Plenary Talks
15:30 ‑ 16:00
Coffee Break
Coffee Break
Coffee Break
Coffee Break
16:00 ‑ 18:00
Invited Forums-1
Invited Talks-3
CNS-7
CNS-8
CNS-9
Invited Talks-5
Invited Papers-2
AI-2
AMCN-2
CIS-2
Invited Forums-2
Invited Papers-3
ECB-2
MWN
NAPE-2
Invited Papers-4
Invited Papers-5
WASN
NGMN/NGNI
SCDM/SPC
18:00 ‑ 19:00
19:00 ‑ 21:00
Welcome Reception
Banquet & Award Ceremony
Monday, February 16
Monday, February 16 8:20 - 8:30
Opening Remarks
Room: Lahaina 1
Monday, February 16 8:30 - 9:30
Keynote I: Prof. Wei Zhao: From Classical Computing to Quantum Computing
Room: Lahaina 1
Chair: Michael Wu
Monday, February 16 9:30 - 10:00
Coffee Break
Monday, February 16 10:00 - 12:00
Distinguished Lecture-1
Speakers: Shiwen Mao and Liuqing Yang
Room: Lahaina 1
Chair: Michael Wu
CSECS: Covert Symbol Embedding via Chirp Signals for Integrated Sensing and Communication
Bernard Amoah, Jian Zhang,
Shiwen Mao
, Senthilkumar Periaswamy and Justin Patton
Cognitive Security for AI-Native IIoT: An LLM-Centric Adaptive Defense Framework
Jingxin Mao, Zhiwei Wei, Bing Li, Rongqing Zhang, Xiaoya Hu and
Liuqing Yang
Invited Talks-1
Speakers: Zhu Han, Kaoru Ota, Elisa Bertino, Guan Gui
Room: Lahaina 2
Chair: Kaoru Ota
Mission Explainable: From Feature Attribution to Mitigation in 5G Anomaly Detection
Federica Uccello, Imtiaz Karim, Kazi Samin Mubasshir, Elisa Bertino and Simin Nadjm-Tehrani
Robust HAR with CSI Tokens: Single-Direction Prompt Guidance on a Frozen LLM
Fucheng Miao, Osamu Takyu, Lin Shan, Ou Zhao, Tomoaki Ohtsuki, Guan Gui and Fumiyuki Adachi
CNS-1
Room: Lahaina 3
Chair: Errin Fulp
Personalized Remote Piano Education via an AI-Empowered Teacher-Student Framework
Melody Han and Geoffrey Ye Li
Development and Implementation of CCSDS TM/TC Packets Wrapped within CSP Format on the OBC
Nugroho Widi Widi Jatmiko
, Bina Pratomo, Hidayat Gunawan, Dedi Irawadi and Supriyono Yono
Optimizing Container Caching in Serverless Edge Computing with Scalable Reinforcement Learning
Manikanta Sanjay Veera,
Faiz Sameer Ahmed
and Genya Ishigaki
Deep Reinforcement Learning-based Cell DTX/DRX Configuration for Network Energy Saving
Wei Mao, Lili Wei, Omid Semiari, Shu-ping Yeh and Hosein Nikopour
Toward Fully Automated Smart Factory Using Ultrashort-Pulsed Laser Processing
Ren Goto, Hiromu Ishimura and Masaki Yamaguchi
Intrusion Detection System based on Quantum Generative Adversarial Network and Blockchain-based Federated Learning
Christian Esposito
and Franco Cirillo
CNS-2
Room: Lahaina 4
Chair: Kesheng Wu
A Proof of Concept AI Chatbot System for Structured Nursing Preceptorship Feedback
Ania Aibin
and Michal Aibin
A Distributed Policy Gradient Algorithm for Optimal SFC Deployment in NFV-Enabled STINs
Jing Wang, Khanh D. Pham, Xin Tian and Genshe Chen
Performance evaluation of ML and GNN algorithms in attack detection in various IoT environments
Hongwei Li and Danai Chasaki
Lightweight Boolean Heartbreak Signaling with SDT and Adaptive Gain Factors for 5G AI-Driven NWDAF Layers
Sreenivas Chandran and Revathi Venkataraman
Coordinated Multi-Domain Deception: A Stackelberg Game Approach
Md Abu Sayed, Asif Rahman, Ahmed H. Anwar Hemida, Christopher Kiekintveld and Charles A Kamhoua
CNS-3
Room: Maui Suite 1
Chair: Stavros Kalafatis
Comprehensive Analysis of Large Language Models on CNN-based Deepfake Detection
Toey Lui, Quang Duy Tran and Younghee Park
User Account Compromise and Insider Threat Detection for Medical Image Information Systems
Joe Childress and
Manki Min
A Test-bed Evaluation of DAS, Wi-Fi, Neutral Host and Outdoor Macro
Vanlin Sathya, Lyutianyang Zhang and Mehmet Yavuz
Indoor DAS using CBRS N48 Signals for Private Network Coverage
Vanlin Sathya, Lyutianyang Zhang and Mehmet Yavuz
An Experimental Study of Vulnerabilities in the Zigbee Protocol for IoT Systems
Aidan Weingrad and Proyash Podder
Towards Moving Target Defense (MTD)-Enabled Communication Protocols for Smart Grids: A DNP3 Use Case
Raveendra Babu Ponnuru, Rajarshi Mukherjee, Mohamed Azab and Thidapat Chantem
Calibrated Transfer Learning for Multi-Class Medical Image Classification
Yu Hlaing Win and JingTao Yao
Monday, February 16 12:00 - 13:30
Lunch
Not provided by conference
Monday, February 16 13:30 - 15:30
Distinguished Lecture-2
Speakers: Hamid Sharif and Dirk Slock
Room: Lahaina 1
Chair: Michael Wu
Invited Talks-2
Speakers: Zhu Li, Min Chen, Hitoshi Asaeda, Jianquan Liu
Room: Lahaina 2
Chair: Zhu Li
SoftMax-NeRF Attribute Compression with Vector-Quantized Color Tables for Point Clouds
Zhu Li and Ning Xu
Fine Granular Scalable Gaussian Splatting Coding for Real-Time Immersive Education
Jiaqi Zou, Lingyu Shi, Xu Shuzheng, Jintao Wang, Geert Van der Auwera and Zhu Li
Empowering ICN as an Emerging Network Component for Frontier Applications
Hitoshi Asaeda
CNS-4
Room: Lahaina 3
Chair: Jing Wang
The Mobile Paradox: How Interface Friction Can Improve 2FA Security
Mohammed Jubur
Federated Learning for DDoS Attack Detection: Enhancing Security with Misclassification Penalties
Aymen Ben Said,
JingTao Yao
and Nashid Shahriar
A Cost-Effective Intelligent Edge-Based Driver Monitoring System for Real-Time Detection of Unsafe Driving Behaviors
Fyaz N Rahman, Joaquin O. Ntoo, Mostafa M. Selim and Ahmed A Ahmed
Challenges in RL based Attack Detection in SDN
Aparna Ganesan and Kamil Sarac
FedAdapt-CAD: A Federated Learning Framework for Anomaly Detection with Client-Aware Aggregation and Dynamic Model Adaptation
Muhammad Azaz Farooq, Paolo Bellavista, Armir Bujari, Alessio Mora, Jamal Nasir and Hafiza Rohma Ahmed
Integrated Communication and Computing in Time-Varying mmWave Channels
Joan Çollaku, Kuranage Roche Rayan N Ranasinghe, Niclas Führling, Giuseppe Thadeu Freitas de Abreu and Takumi Takahashi
Survey on Security and Safety in Humanoid Robotics
Mingxiao Wei, Yubin Ma, Mingyang Qin, Haohong Wang and Jian Ren
CNS-5
Room: Lahaina 4
Chair: Younghee Park
Performance Metrics for Scheduling Algorithms in Deadline-Constrained Data Transfer
Takashi Kurimoto and Kohei Shiomoto
Beyond Computation: A Fragmentation-Aware Performance Analysis of Cryptographic Schemes for Real-Time C-V2X Cooperative Perception
Mason Minear, Mike Haggart and
Junaid Ahmed Khan
Adaptive Reciprocal Differential Encoding Quantization for the Physical Layer Key Generation
Abdullah Dakhlallah Alshamdayn and
Manki Min
Reinforcement Learning-Based Multi-Domain Network Slice Composition with Topology Aggregation
Congzhou Li, Genya Ishigaki, Zhouxiang Wu, Divya Khanure, Riti Gour and Jason P. Jue
Assessing the Cyber Risk of Autonomous System Networks using Dynamic Bayesian Models
Elliot Chmil, Jacob Fulp and Errin Fulp
Performance Improvement of Hyperledger Iroha under Network Latency Conditions
Akiho Sakamoto and Masato Oguchi
CNS-6
Room: Maui Suite 1
Chair: Hyuck M Kwon
Uncertainty-Guided Bandwidth-Adaptive Model Compression for Industrial Pore Detection
Prosenjit Roy, Kijoon Lee, Mohsen Taheri Andani and Noushin Ghaffari
Efficient Computation of Whittle Index for Partially Observable Restless Bandits
Qizhen Jia and Keqin Liu
Memory-Based Malware Detection under Limited Data Conditions: A Comparative Evaluation of TabPFN and Ensemble Models
Valentin Leroy,
Shuvalaxmi Dass
and Sharif Ullah
Autonomous Pallet Counting for Mixed Storage Configurations in Low-Light Warehouses
Yonglan Qi, Chenyang Wang, Chenru Wu, Xinchang Tong and
Michal Aibin
Evaluating Energy Efficiency of Clustering Algorithms for VM Task Allocation in Cloud
Dishan Patel, Karishma Karamali Vadsaria, Himanshu Sharma and
Michal Aibin
NextG Polar Code Design
Walter L Roensch, Jr and Hyuck M Kwon
Binary Programming for Constellation-Aware Resource Allocation in Multiuser Networks
Yanwu Ding and Yirong Tu
Monday, February 16 15:30 - 16:00
Coffee Break
Monday, February 16 16:00 - 18:00
Invited Forums-1
Panelists: Kazunori Mukasa, Masahiro Nakagawa, Hiroyuki Tsuda, Naoaki Yamanaka
Room: Lahaina 1
Chair: Naoaki Yamanaka
Invited Talks-3
Speakers: Jianping Pan, Tomoaki Ohtsuki, Akihiko K. Sugiyama, Michele Zorzi
Room: Lahaina 2
Chair: Tomoaki Ohtsuki
Task-Aligned Evaluation of Compressed Semantics for Diffusion-Based Image Reconstruction
Mondher Bouazizi, Yue Yin and Tomoaki Ohtsuki
Experimental Evaluation of a UAV-Mounted LEO Satellite Backhaul for Emergency Connectivity
Mattia Figaro, Francesco Rossato, Alexander Bonora, Marco Giordani, Giovanni Schembra and Michele Zorzi
CNS-7
Room: Lahaina 3
Chair: Efat Fathalla
Layer Communication Framework (LCF) For Real-Time, AI-Driven System Communications
Razvan Cristian Voicu, Muhammad Hassan Tanveer and Yusun Chang
5G MIMO Reinforcement Learning: Comparative analysis of multi-agent Uplink and Downlink Transmission with Adaptive Modulation Control
Kanwalinderjit Kaur and Priyanshu Ashish Luhar
Container Data Item: An Abstract Datatype for Efficient Container-based Edge Computing
Md Rezwanur Rahman, Shirin Ebadi, Adarsh Srinivasan, Varsha Natarajan, Tarun Annapareddy, Eric Keller and Shivakant Mishra
Evaluating LEO Satellite Internet in Aeronautical Mobility: a Study of Starlink from Hawaii to Japan
Luca Borgianni, Davide Adami and Stefano Giordano
Formal Privacy Guarantee in Predictive Autoscaling by Differentially Private Federated Training
Alan Chuang
, Melody Moh and Teng-Sheng Moh
Field Validation of a Low-Cost IoT-Based System for Real-Time Monitoring of Hydrologic and Physical Behavior of Slope
Robi S Mozumder, Rahul Debnath, Fyaz N Rahman, Ahmed A Ahmed and Md Jobair Bin Alam
CNS-8
Room: Lahaina 4
Chair: Peng Jiang
A Brief Survey of Data Streaming Technologies
Ezra Kissel and Jason Zurawski
Automatic Modulation Classification for OFDM Signals based on Deep Learning in Spectrum Sensing
Nahal Maleki, Todd Williams, Ulugbek Jainakov, Jason Jugar and Gilberth Caamano
A Co-Designed KubeEdge-SDN Multi-Agent Framework for Secure and Predictable IIoT Manufacturing
Petro Mushidi Tshakwanda,
Henok Berhanu Tsegaye
, Ashok Karukutla, Raddad Almaayn, Harsh Kumar and Michael Devetsikiotis
Integrated Strategies for Bottleneck Mitigation in SDN: A Comprehensive Analysis of Caching, Queuing, and Network Coding
Souryendu Das, Jacob Adamson, Aaron Lee, Vedant Vaideswar and Stavros Kalafatis
Early Review of the BitChat Protocol
Edoardo S. Biagioni
Exploring Deep Learning For Semiconductor Device BSIM4 Modeling
Leo Chenwei Shao
CNS-9
Room: Maui Suite 1
Chair: Antonio A. de A. Rocha
Interpretable Models for Workflow Differentiation in High-Performance Scientific Networks
Anna Giannakou, Syed Asif Raza Shah, Wenji Wu, Bruce Mah, Phil DeMar, Oliver Gutsche and Chin Guok
Adaptive Drone-Assisted IoT Communications: An RL Framework for Optimal Base-Station Placement and Traffic Load Balancing
Abee Alazzwi, Michael Devetsikiotis, Petro Mushidi Tshakwanda,
Henok Berhanu Tsegaye
and Harsh Kumar
Intelligent Detection and Analysis of Sophisticated Cyber Threats Using Real-World Network Traffic
Juli Dutta, Jeffrey D Berg and Qingzhong Liu
A Comprehensive Study on the Effectiveness of Machine Learning Models to Mitigate the Impact of Cyberbullying
Shweta Singh, Freidoon Barez and
Riti Gour
Network Environment-Aware Drone Path Planning in Last-Mile Medical Supply Delivery
Aneesh Calyam
, Chandra Bhamidipati and Sharan Srinivas
Augmented Reality and Digital Twins in Engineering Education: Technological Enhancements and Applications
Behnam Ghalamchi and Dylan Featherson
Tuesday, February 17
Tuesday, February 17 8:30 - 9:30
Keynote II: Prof. H. Vincent Poor: Resource Constrained Learning over Wireless Networks
Room: Lahaina 1
Chair: Jian Ren
Tuesday, February 17 9:30 - 10:00
Coffee Break
Tuesday, February 17 10:00 - 12:00
Invited Talks-4
Speakers: Falko Dressler, Matthew Valenti, Jian Ren, Qiang Ye
Room: Lahaina 1
Chair: Qiang Ye
Ns3Sionna: Realistic Wireless Network Simulation with Ray Tracing in ns-3
Anatolij Zubow, Sascha Rösler and Falko Dressler
Channel Effects Limit Adversarial Success under Perfect Channel Knowledge
Jaxon R Hancock, Alice Yu, Tongtong Li and Jian Ren
Machine Learning Classification Boundaries and Robustness for Adversarial Attacks
Jian Ren, Jaxon R Hancock and Tongtong Li
Utilizing Machine Learning to Detect Tor Traffic: A Realistic Dataset and A Comprehensive Analysis
Md Rafiqul Islam Sadik, Qiang Ye and Suchith Sridhar Khajjayam
Invited Papers-1
Room: Lahaina 2
Chair: Riti Gour
Visual Question Answering Using Gated Bidirectional Cross-Attention
Poulami Das Ghosh and Min Chen
Energy-Efficient Drowsiness Detection with Spiking Neural Networks
Satya Sairam Varma Manthena
and Peng Kang
User-Preference-Aligned Automatic Question Generation
Nicholas X. Wang and Aggelos K Katsaggelos
AI-enabled Cybersecurity in the Internet of Things
David Wu, Vijay Anand, Amelia Estwick and Honghui Xu
Resilient Distributed Antenna System via Dynamic Cell-Restructuring
Sijie Xia, Suguru Kameda, Qiang Chen and Fumiyuki Adachi
AI-1
Room: Lahaina 3
Chair: Liuwan Zhu
Time-series Forecasting for Network Utilization in Large-Scale Scientific Workflows
Veronica Yakubovich, Ivy Sim, Phillip Kim, Nick Monozon, Jinny Chung, Alex Sim and Kesheng Wu
Proximal Policy Optimization for Coordination of Distributed Agents in a Cooperative Jamming Scenario
Robert T Lattus and John M Shea
E3-Guarded Generation: Provably Mitigating Hallucinations in Large Language Models
Gang Wang and Mark Nixon
Hybrid Quantum-Classical Convolutional Neural Network for Robust RF Sensing
Yujie Sun, Xuyu Wang and
Shiwen Mao
AMCN-1
Room: Lahaina 4
Chair: Efat Fathalla
Joint Partitioning and Placement of Foundation Models for Real-Time Edge AI
Aladin Djuhera, Fernando Koch and Alecio Binotto
FPGA-based High-speed Reservoir Computing for MIMO Channel Prediction
Chunxiao Lin, Ummay Sumaya Khan, Lingjia Liu and Yang Yi
Structured Lightweight Speech Summarization with On-Device LLMs and Retrieval-Augmented Refinement
Xu Gu, Qun Wang, William Pan, Xuhui Chen, Hao Yue and Rose Qingyang Hu
Beyond the Teacher-Student Paradigm: The Role of Network Structure in Knowledge Distillation
Nasif Fahmid Prangon and Jie Wu
GAMPALv2.5: Enhancing Large-scale Scanning Attack Inference in General-purpose Internet Traffic Anomaly Detection Mechanism
Keisuke Tachibana, Takao Kondo and Hiroyuki Minami
CIS-1
Room: Maui Suite 1
Chair: Mushu Li
Wormholes in Space: Unveiling Wormhole Attack in Low Earth Orbit Satellite Networks
Xiaojian Wang, Ruozhou Yu and Dejun Yang
Machine Learning Method for C&C Server Detection Based on Bot Behavior in an ISP Network
Masataka Nakahara
, Kosuke Murakami and Ayumu Kubota
PrivLoRA: Enhancing Privacy in LoRA-Based Fine-Tuning of Large Language Models for Federated Learning
Bayan Taha Alzahrani
and Dejun Yang
Cybersecurity Game for Online Games: Strategic Cheat Pricing with Network Effects
Thanh Nguyen and Jing Hou
Tuesday, February 17 12:00 - 13:30
Lunch
Not provided by conference
Tuesday, February 17 13:30 - 15:30
Plenary Forum-1
Room: Lahaina 1
Chair: Jian Ren
Tuesday, February 17 15:30 - 16:00
Coffee Break
Tuesday, February 17 16:00 - 18:00
Invited Talks-5
Speakers: Li-Chun Wang, Danijela Cabric, Song Ci, Masayuki Ariyoshi
Room: Lahaina 1
Chair: Danijela Cabric
Unmanned Aerial Vehicles Assisted Resilient Communications: Challenges and Opportunities
Haoran Peng and Li-Chun Wang
Invited Papers-2
Room: Lahaina 2
Chairs: Mushu Li, Suyang Wang
cCCM-Based Quantification of Directed Brain Information Transfer for Early Detection of Mild Cognitive Impairment
Boxin Sun, Jinxian Deng, Ming Gu, Voyko Kavcic, Jian Ren, Bruno Giordani and Tongtong Li
A Collusion Attack on Stable Signature and a Defense using Domain-based Signature Assignment
Spandana Korabandi, Alimu Alibotaiken, Suyang Wang and Yu Cheng
Mobility-Aware Sensing Data Orchestration for Communication-Efficient Cooperative Perception
Pengjun Hou, Yida Ding,
Mushu Li
and Yu Cheng
Current Practices in BAS Security Management
Xinwen Fu, Ziyue Vivian Tang, Annabelle Cheng and Qun Zhou Sun
AI-2
Room: Lahaina 3
Chair: Shuvalaxmi Dass
Multi-Feature-Fusion Framework for Robust Learner Engagement Recognition in Virtual Environments
Eman Almotairi
and Danda B. Rawat
Privacy-Preserving Post Deployment Model Calibration with Fully Homomorphic Encryption
Shadman Mahmood Khan Pathan, Qianlong Wang, Jonathan Takeshita, Sakan Binte Imran and Sachin Shetty
Quantum-Enhanced Federated Learning via QAOA Feature and Gate Selection with Skew-Symmetric Lipschitz Dynamics
Mahmudul Hasan, Sharif Ullah and Sachin Shetty
Hybrid GNN-Transformer Framework for Kidney Transplant Survival Prediction
Nazanin Rahmati and Jingjing Yao
CNN-Based game agent for Chrome Dino Game Revisited
Ashok Gaire, Yangyang Tao and Junxiu Zhou
AMCN-2
Room: Lahaina 4
Chair: Jun Huang
ReGAIN: Retrieval-Grounded AI Framework for Network Traffic Analysis
Shaghayegh Shajarian
, Kennedy Marsh, James O Benson, Sajad Khorsandroo and Mahmoud Abdelsalam
MAGE-ID: A Multimodal Generative Framework for Intrusion Detection Systems
Mahdi Arab Loodaricheh, Mohammad Hossein Manshaei and Anita Raja
QoS-Aware State-Augmented Learnable Framework for 5G NR-U/Wi-Fi Coexistence: Impact of Parameter Selection and Enhanced Collision Resolution
Mohammad Reza Fasihi and Brian L Mark
ImpactNet: A Robust Two-Stage Disaster Damage Mapping Model For Cross-Domain Satellite Imagery
Nishat Ara Nipa, Sachin Shetty and Mohammed-Hamza Chao
CIS-2
Room: Maui Suite 1
Chair: Kamrul Hasan
GECKO: Securing Digital Assets Through(out) the Physical World
Cyrill Krähenbühl
, Nico Hauser, Christelle Gloor, Juan Angel García-Pardo and Adrian Perrig
Secure Lightweight Authentication Scheme for IoT-Enabled Smart Farming
Raveendra Babu Ponnuru, Mohamed Azab and Denis Gracanin
SD-CGAN: Conditional Sinkhorn Divergence GAN for DDoS Anomaly Detection in IoT Networks
Henry Onyeka, Emmanuel J Samson, Liang Hong, Tariqul Islam, Imtiaz Ahmed and Kamrul Hasan
Privacy-Preserving Federated Vision Transformer Learning Leveraging Lightweight Homomorphic Encryption in Medical AI
Al Amin, Kamrul Hasan, Liang Hong and Sharif Ullah
Backdoor injection and detection in LGMB models
Antonio A. de A. Rocha and Rômulo C. A. da Silva
Tuesday, February 17 19:00 - 21:00
Welcome Reception
Room: Monarchy 5-7
Wednesday, February 18
Wednesday, February 18 8:30 - 9:30
Keynote III: Dr. Jessica Bian: Greening the Cloud: Sustainable Energy for Data-Driven Futures
Room: Lahaina 1
Chair: Haohong Wang
Wednesday, February 18 9:30 - 10:00
Coffee Break
Wednesday, February 18 10:00 - 12:00
Invited Talks-6
Speakers: Tara Javidi, Lingjia Liu, Jie Wang, and Fumiyuki Adachi
Room: Lahaina 1
Chair: Fumiyuki Adachi
Invited Talks-7
Speakers: Eiji Oki, Kazuhiko Sumi, Manos M. Tentzeris, Miki Yamamoto
Room: Lahaina 2
Chair: Eiji Oki
Towards Secure and Flexible Optical Networks: A Tutorial on Quantum-Classical Coexistence
Bijoy Chand Chatterjee and
Eiji Oki
Deepfake Technologies: Generation, Detection and Emerging Challenges
Kazuhiko Sumi
ECB-1
Room: Lahaina 3
Chair: Henok Berhanu Tsegaye
BSAF-Based Binary Offloading for Edge AI: Energy-Efficient Deep Learning and Spatial Computing in Mixed Reality
Mahin Khan Mahadi, Daniel Mawunyo Doe, Xiangfang Li, Zhu Han and Lijun Qian
A Space-Efficient Shredding-Based Method for Secure Data Deletion in Multi-Cloud Environments
Ali Khowilid Alqarni and Zongming Fei
LLM-Enhanced Contract Design for Edge AIGC Service Provisioning in Teleoperation
Zijun Zhan, Yaxian Dong, Daniel Mawunyo Doe, Yuqing Hu, Shuai Li, Shaohua Cao and Zhu Han
Predicting Dataset Popularity for Improved Distributed Content Caching in Scientific Workflows
Malavikha Sudarshan, Alex Sim and Kesheng Wu
Temporal Learning for Edge AI: Hyperdimensional Computing with Legendre Delay Networks
Md Rubel Sarkar, Ramashish Gaurav, Govind Sunil Kumar, Shirazush Salekin Chowdhury and Yang (Cindy) Yi
MCC
Room: Lahaina 4
Chair: Kesheng Wu
Can we remove the ground? Obstacle-aware point cloud compression for remote object detection
Penxi Zeng, Alberto Presta, Atishna Samantaray, Jonah Reinis, Dinesh Bharadia, Hang Qiu and Pamela Cosman
A ViT-LSTM-Based Compensation Framework for Robust Speaker Verification under Emotional and Mask-Muffled Conditions
Ziqing Yang and Houwei Cao
Machine Learning-Based No-Reference QoE Estimation for Scalable Real-time Video Streaming
Yuki Kendo, Ryunosuke Sato, Satoshi Ohzahata and Ryo Yamamoto
Dynamic Spiking YOLO for Object Detection in Autonomous Vehicles
Dong-Gyun Kim, Jeong-Yun Heo and
Jae-Han Lim
NAPE-1
Room: Maui Suite 1
Chair: Mina Samizadeh
PSketch: A Priority-Aware Sketch Architecture for Real-Time Flow Monitoring via eBPF
Yuanjun Dai, Xiangren Wang and Qingzhe Guo
Fast and Effective Bandwidth Estimation Using TCP Slow Start
Maryam Ataei Kachooei, Jae Chung, Feng Li, Benjamin Peters and Mark Claypool
BBRv3 Startup Behavior: Analysis and Fairness Enhancements
Imtiaz Mahmud, Kesheng Wu, Alex Sim, Anirban Mandal and Ewa Deelman
Using SEARCH to Improve TCP Slow Start on Wireless Local Area Networks
Maryam Ataei Kachooei, Amber K Cronin, Jose Manuel Perez Jimenez, Katy Stuparu, Connor Tam, Jae Chung, Feng Li, Benjamin Peters and Mark Claypool
SmartAlaska: Can Smart Cities Deliver During Earthquakes?
Mihir Patel, Byungkwan Jung, Suman Kumar and Chase Q. Wu
Wednesday, February 18 12:00 - 13:30
Lunch
Not provided by conference
Wednesday, February 18 13:30 - 15:30
Plenary Forum-2
Room: Lahaina 1
Chair: Haohong Wang
Wednesday, February 18 15:30 - 16:00
Coffee Break
Wednesday, February 18 16:00 - 18:00
Invited Forums-2
Panelists: Hakima Chaouchi, Falko Dressler, JongWon Kim, Thomas Magedanz, Joyce Mwangama, Takehiro Nakamura, Ari Pouttu, Ivan Seskar, Sameh Yamany
Room: Lahaina 1
Chair: Thomas Magedanz
Invited Papers-3
Room: Lahaina 2
Chair: Peng Kang
Deep Restoration of Archival Videos: Developments, Challenges, and Opportunities
Shiv Gehlot, Sri Harsha Musunuri, Sutanu Bera, Aupendu Kar and Guan-Ming Su
Progressive Image Restoration via Text-Conditioned Video Generation
Peng Kang, Xijun Wang and Yu Yuan
RAN-IDS: Adaptive Continual Learning for Intrusion Detection in Open RAN
Nadia Niknami and Jie Wu
Rethinking Time-Series Forecasting as Binary Event Prediction with Spiking Neural Networks
Peng Kang, Hivanshu Tyagi and Md Tariqul Islam
ECB-2
Room: Lahaina 3
Chair: Edoardo S. Biagioni
Meeting SLO with Privacy: Partial Homomorphic Encryption Inference and Anomaly Gating for Predictive Autoscaling in Cloud Environments
Alan Chuang
, Melody Moh and Teng-Sheng Moh
Low-Latency Streaming for Immersive Remote Interaction with a Spherical Display
Den Tabata
, Kobori Taiga, Keisuke Sugiura, Yoshiki Yamaguchi, Ryouhei Tsugami, Toshihito Fujiwara, Tatsuya Fukui and Satoshi Narikawa
Learning to Defend: A Multi-Agent Reinforcement Learning Framework for Stackelberg Security Game in Mobile Edge Computing
Zihao Ding, Jun Huang and Junjian Qi
DeepSet-Enhanced Edge Reinforcement Learning for UAV Autonomous Landing and Takeoff at Portable Vertiports
Zhirun Li, Tiying Gao and Chengyi Qu
Toward Post-Quantum Safe Blockchains: Comparison of Consensus Families
Mehrab Hosain, Matthew Ogbe and
Manki Min
MWN
Room: Lahaina 4
Chair: Mohamed Azab
ML-Based Downlink Throughput Prediction and Feature Importance Analysis in a Realistic LTE Testbed Using COTS Smartphone
Mahfuzur Rahman, Nishith Tripathi, Yang (Cindy) Yi, Jeffrey Reed and Lingjia Liu
Evaluation of Location-aided Coordinated Beamforming by Active Inference in Realistic City Scenario
Shota Yamada, Tatsuya Otoshi and Masayuki Murata
Joint Client Selection and UAV Placement in UAV-Aided Federated Learning
Seyed Soroush Tabadkani Avval and Jingjing Yao
QG Synthetic Time Series Generation: An Adapted Quantile Graph Method
Antonio A. de A. Rocha, Iasmyn Silva and Rodrigo Chimelli Silva
NAPE-2
Room: Maui Suite 1
Chair: Xiaochan Xue
Information-Centric Networks: A Convex Joint Cache Allocation and Router Assignment
Parisa Eslami, Pejman Ghasemzadeh and Shahriar Shahabuddin
Priority-based RDMA Transmission Control Method for Low-CPU CPS Data Collection under Mixed-Deadline Requirements
Ryouhei Tsugami
, Tatsuya Fukui and Satoshi Narikawa
Sponge-based Lightweight Hash Function
Abdullah Dakhlallah Alshamdayn and
Manki Min
Survivable Entanglement Path Routing Design Model under Node Failures in Quantum Networks
Eiji Oki
, Masaki Maeda and Ryuta Shiraki
Validating TCP Behavior in DISTRI: A Comparison of Simulated and Real-World Network Performance for Distributed Computing
Imtiaz Mahmud, Kesheng Wu, Alex Sim, Anirban Mandal and Ewa Deelman
Wednesday, February 18 19:00 - 21:00
Banquet & Award Ceremony
Room: Lahaina Ballroom
Thursday, February 19
Thursday, February 19 8:30 - 9:30
Keynote IV: Prof. Homer Chen: Light Field Technology for AI/AR Glasses
Room: Lahaina 1
Chair: Haohong Wang
Thursday, February 19 9:30 - 10:00
Coffee Break
Thursday, February 19 10:00 - 12:00
Invited Talks-8
Speakers: Lee Swindlehurst, Hua Fang, Xianbin Wang, Shucheng Yu
Room: Lahaina 1
Chair: Xianbin Wang
Long-Term Behavioral Evaluation for Trusted Collaborator Selection via Bidirectional Mamba
Botao Zhu and
Xianbin Wang
Waveform Design for ISAC: Trends and Future Directions
Xiaochan Xue, Shucheng Yu, Saurabh Parkar and Jiarui Li
Invited Talks-9
Speakers: Marwan Krunz, Guan-Ming Su
Room: Lahaina 2
Chair: Guan-Ming Su
Transformer-based DNN for Identification of RFI Sources in Astronomical Observations
Arush S. Sharma and Marwan Krunz
TV-GS: Triplane Video-based Dynamic 3D Gaussian Splatting Representation for 2D Video Coding
Birendra Kathariya, Dae Yeol Lee, Tsung-Wei Huang, Fangjun Pu, Guan-Ming Su, Peng Yin and Sean T McCarthy
Semantic Aware Physics-Based Object Interaction In 3D Gaussian Splatting
Pooja Guhan, Dae Yeol Lee and Guan-Ming Su
Language-Guided Video Rendering in 3D Gaussian Splatting using Sparse Spatial-Semantic Attributes
Kiran Kumar Lekkala, Tsung-Wei Huang and Guan-Ming Su
Learning Audio Attributes in 3D Gaussian Splatting
Tsung-Wei Huang and Guan-Ming Su
NGNI
Room: Lahaina 3
Chair: Peng Jiang
AI-Driven Personalized Remote Education using Adaptive Semantic Communication
Zijun Zhan, Shaohua Cao, Lu Gao and Zhu Han
Self-Diagnosing and Healing System for Reliable Hybrid P2P-based Blockchain Against Abnormal Node Failure
Ho-se Moon, Seunggyu Ji, Hyunmin Noh and Hwangjun Song
Policy-Driven SD-WAN for Hybrid Terrestrial and Non-Terrestrial 6G Connectivity
Luca Borgianni, Eleonora Bellini, Alessio Giorgetti, Davide Adami and Stefano Giordano
A Data-Driven Framework for Shared Bottleneck Detection across SD-WAN Overlays
Alessio Botta, Roberto Canonico, Annalisa Navarro, Lorenzo Pitacoro, Giovanni Stanco, Giorgio Ventre and Stefania Zinno
DI3: Decentralized Intelligent Internet Infrastructure Integrating AI and Blockchain Technologies
Gang Wang and Mark Nixon
NGMN
Room: Lahaina 4
Chair: Michael Wu
Joint Channel Estimation and Beamforming for Reconfigurable Intelligent Surface Aided MIMO Systems: Sparsity-Based Approach
Sung Hyuck Hong and
Junil Choi
NextG Base Station Placement and Failure Mitigation
Shikhar Bhattarai, Asim Mahat, Dn Pokhrel and Hyuck M Kwon
Distributed Cooperative Downlink for NextG Mobile Networks
Yibin Liang, Usama Saeed, Yang (Cindy) Yi and Lingjia Liu
Power-Aware IMI Cancellation for OAM Multiplexing under Beam Axis Misalignment
Jihan Arsya Hidayat, Ryosuke Hoshi, Yasunori Yagi, Doohwan Lee and Fumiaki Maehara
SA-OOSC: A Multimodal LLM-Distilled Semantic Communication Framework for Enhanced Coding Efficiency with Scenario Understanding
Feifan Zhang, Yuyang Du, Yifan Xiang, Xiaoyan Liu and Soung Chang Liew
OGN/SCDM
Room: Maui Suite 1
Chairs: Kesheng Wu, Feng Yu
Partition Algorithm for Liquid Crystal Display-based Angle-of-Arrival Estimation of Single LED
Ryunosuke Fukuda, Koji Kamakura, Masayuki Kinoshita and Takaya Yamazato
Maximising Network Capacity with Service Provisioning in QKD-Integrated Optical Networks
Yuhang Liu,
Xiaosong Yu
and Yongli Zhao
Modeling and Analysis of Proactive and Reactive Defragmentation Approaches in Spectrally-Spatially Elastic Optical Networks
Imran Ahmed, Bijoy Chand Chatterjee and
Eiji Oki
DeRA: Defragmentation-Aware Resource Allocation with Counter-Propagation in Spectrally-Spatially Elastic Optical Networks
Roshan Kumar Rai, Imran Ahmed,
Eiji Oki
and Bijoy Chand Chatterjee
Group Emotion Recognition using Multimodal Transformers with Hierarchical Aggregation
Laetitia Mouafo and Houwei Cao
Thursday, February 19 12:00 - 13:30
Lunch
Not provided by conference
Thursday, February 19 13:30 - 15:30
Plenary Talks
Room: Lahaina 1
Chair: Michael Wu
Thursday, February 19 15:30 - 16:00
Coffee Break
Thursday, February 19 16:00 - 18:00
Invited Papers-4
Room: Lahaina 1
Chair: Honggang Wang
Hierarchical Graph Representation for Multi-Chain Blockchain Routing
Tirth Joshi and
Honggang Wang
Evaluating Vulnerabilities of Connected Vehicles Under Cyber Attacks by Attack-Defense Tree
Muhammad Baqer Mollah, Honggang Wang and Hua Fang
Discrete Beamforming Optimization for RISs with a Limited Phase Range and Amplitude Attenuation
Dogan Kutay Pekcan, Liao Hongyi and Ender Ayanoglu
A Brief on 6G networks Resilience and service availability metric. Revisiting Standard ITU network availability and number of 9s in the context of emerging software cloud networks-3CN
Hakima Chaouchi and Bilal Ghani
Invited Papers-5
Room: Lahaina 2
WASN
Room: Lahaina 3
Chair: Bang Q Tran
SMDS-based Rigid Body Localization
Niclas Führling
, Giuseppe Thadeu Freitas de Abreu, David González G and Osvaldo Gonsa
Implementation of UAV Swarm Flight Exploration based on Mobile Sensing Clusters Using Swarm Intelligence
Shoma Nishigami
, Eiji Nii, Naoki Hashimoto, Hiroyuki Yomo and Yasuhisa Takizawa
Collision-Responsive Micro-Scheduling for 802.11: Broadcast NAKs and Contender-Count Scaled Backoff
Haoyu Wang, Daniel Kaseya, Bang Q Tran, Peng Jiang, Bo Sheng and Xiaoqian Zhang
Feasibility Study of Zero Excess Node MAC (ZEN-MAC) for Ultra-Low-Power Communications
Tatsuhiro Kawaguchi and Koji Ishibashi
An Object-Track-Driven Distributed System for Real-Time Airspace Monitoring
Oluwafemi Ajeigbe, Chenyan Zhu and Sandip Roy
NGMN/NGNI
Room: Lahaina 4
Chair: Xiaoqian Zhang
Spatially Consistent Air-to-Ground Channel Modeling and Simulation via 3D Shadow Projections
Evgenii Vinogradov,
Aymen Fakhreddine
, Abdul Saboor, Sergi Abadal and Sofie Pollin
Joint Optimal Beamforming and Discrete Phase Shift Design in STAR-RIS with Quantum Optimization
Vu P Pham, Dang Van Huynh, Berk Canberk, Simon Cotton and Trung Q. Duong
Online Learning-based Adaptive Beam Switching for 6G Networks: Enhancing Efficiency and Resilience
Seyed bagher Hashemi Natanzi
, Zhicong Zhu and Bo Tang
Federated Learning for Vehicular Networks Based on DDMC Modulation
Ganggui Wang, Celimuge Wu, Satoshi Ohzahata and Ryo Yamamoto
Q-MiNT: Quantum Multicast via hybrid Multipartite eNTanglement
Suman Kumar, Ved Dharkar, Awinash Kumar and Reshmi Mitra
SCDM/SPC
Room: Maui Suite 1
Chair: Michael Wu
Digital Twin-Driven Trust-Aware Strategy Modeling in Asymmetric Multi-Agent Social Games
David Li
Dynamic Norm Evolution in Social Media: A Cognitive-Evolutionary Framework for Modeling Emergent Behavioral Patterns
David Li
Interference Alleviation for Asynchronous Multigateway Multibeam Precoding
Huda Ali, Qing Su, Wenguan Zhang, Zihao Wang, Mohammed A M Ali and Rui Chen
Adaptive Precoding with DBSCAN Grouping for Efficient Massive MIMO Beamforming
Kanwalinderjit Kaur, Elias Farmer and Priyanshu Ashish Luhar
Rich Detail Range (RDR): Redefining Perceptual Picture Quality in the Era of AI Displays
Haohong Wang