Virginia Tech® home

Symposium 2024 Paper Presentation Schedule

Researchers and students from Virginia institutions of higher education will discuss their research covering three topics: NextG Security; Secure Systems; and Social Cybersecurity. Each presenter will get 7 minutes to present their work. 


Paper Topic: NextG Security

(9 to 9:28 a.m.)

9 a.m.: Performance Evaluation of 5G New Radio (NR) Systems in Indoor Environments


9:07 a.m.: An Ontology Learning through Lambek Calculus


9:14 a.m.: Timely Communication under Adversarial Attacks


9:21 a.m.: Reinforcement Learning with Application to Automated Penetration Testing


Paper Topic: Secure Systems

(9:28 a.m. to 12:12 p.m.)

9:28 a.m.: Strategic Shared Mental Model as Cyber Deception to Protect a Human-Machine Teaming System


9:35 a.m.: Energy-Aware Federated Learning-based Monitoring for Sustainable Solar Sensor-based Smart Farms


9:42 a.m.: Cyber-Resilient Angle Droop-Based Power Sharing Under GPS Spoofing Attacks


9:49 a.m.: Lightweight NN Protection Against Soft Errors: Critical Weights and How to Find Them


9:56 a.m.: Adversarial Networks and their Capacities


10:03  to 10:15 a.m.: Break

10:15 a.m.: Recovering Iris Data From Fine-Tuned Diffusion Models


10:22 a.m.: On the composable security of weak coin flipping


10:29 a.m.: Encrypted Fine-tuning Of Transformers Using Fully Homomorphic Encryption


10:36 a.m.: A Mathematical Framework for Reciprocal Trust and Influence Dynamics


10:43 a.m.: Empowering Mobility: Integrating EEG Devices and Training Models to Enhance Wheelchair Control for Individuals with Physical Disabilities


10:50 a.m.: Cybersecurity for Health Care Teams


10:57 a.m.: Masking Transpilers to Protect Against Quantum Side-Channel Attacks


11:04 a.m.: Products of Optimal Codes and their Application in Cryptanalysis


11:11 a.m.: The road to ultra-reliability in future mobile networks


11:18  to 11:30 a.m.: Break

11:30 a.m.: Consumer-Centric Countermeasure to Counterfeiting: Authentication Mobile App Using Deep-Learning-Based Physically Unclonable Functions


11:37 a.m.: SusFL: Energy-Aware Federated Learning-based Monitoring for Sustainable Smart Farms


11:44 a.m.: A Smart Contract-based Decentralized Marketplace System to Promote Reviewer Anonymity


11:51 a.m.: BotShield: Detecting Unknown Variants of Malware on IoT Devices Using Power Side Channels


11:58 a.m.: A Trustworthy Learning Framework for Secure and Reliable Power Grid Operation Against Generative AI Attacks


12:05 p.m.: Uncertainty-Aware Deep Reinforcement Learning-based Intrusion Response Systems for In-Vehicle Networks


Paper Topic: Social Cybersecurity

(9 to 11:42 a.m.)

9 a.m.: Issues of Government Surveillance and Spyware use in India


9:07 a.m.: “This Is Not a Scam!” Cybersecurity Awareness-Raising Program Tackling Older Adults’ Scam Victimization Utilizing Interactive Theatre


9:14 a.m.: Lorenz Ransomware: The Effect of Ransomware on Businesses


9:21 a.m.: Hands-on Experience and Networking Before Graduating


9:28 a.m.: From Experiential Learning to Practice: A Pre-Apprenticeship Program


9:42 a.m.: Investigating the Experiences of Female CTF Players


9:49 a.m.: Spreading Cybersecurity Awareness Via Gamification: Zero-Day Game


9:56 a.m.: Cyber Security Awareness Training


10:03 to 10:15 a.m.: Break

10:15 a.m.: Considering End-User Situation Awareness


10:22 a.m.: OSINT Research Studios: A Flexible Crowdsourcing Framework to Scale Up Open Source Intelligence Investigations


10:29 a.m.: Use of Chatbots as Personal Cybersecurity Coaches Against Social Engineering Attacks


10: 36 a.m.: Modeling Election-Related Claims in Social Media in the Age of LLMs


10:43 a.m.: Security fatigue as a threat to use of an AI tool for password enhancement


10:50 a.m.: The Support of the Commonwealth Cyber Initiative to a Small Community College


10:57 a.m.: Experiential Learning through Immersive XR: Cybersecurity Education for Critical Infrastructures


11:04 a.m.: A Domain Agnostic Framework for Efficient and Effective Cybersecurity Risk Communication and Training


11:11 a.m.: Developing Cybersecurity Student Social Networking and Engagement Capacity Through an Experiential Learning Internship


11:18 a.m.: Data privacy in Group Testing


11:35 a.m.: Uncertainty-Aware Deep Reinforcement Learning-based Competitive Influence Maximization Combating False Information