Symposium 2024 Paper Presentation Schedule
Researchers and students from Virginia institutions of higher education will discuss their research covering three topics: NextG Security; Secure Systems; and Social Cybersecurity. Each presenter will get 7 minutes to present their work.
Paper Topic: NextG Security
(9 to 9:28 a.m.)
9 a.m.: Performance Evaluation of 5G New Radio (NR) Systems in Indoor Environments
9:07 a.m.: An Ontology Learning through Lambek Calculus
9:14 a.m.: Timely Communication under Adversarial Attacks
9:21 a.m.: Reinforcement Learning with Application to Automated Penetration Testing
Paper Topic: Secure Systems
(9:28 a.m. to 12:12 p.m.)
9:28 a.m.: Strategic Shared Mental Model as Cyber Deception to Protect a Human-Machine Teaming System
9:35 a.m.: Energy-Aware Federated Learning-based Monitoring for Sustainable Solar Sensor-based Smart Farms
9:42 a.m.: Cyber-Resilient Angle Droop-Based Power Sharing Under GPS Spoofing Attacks
9:49 a.m.: Lightweight NN Protection Against Soft Errors: Critical Weights and How to Find Them
9:56 a.m.: Adversarial Networks and their Capacities
10:03 to 10:15 a.m.: Break
10:15 a.m.: Recovering Iris Data From Fine-Tuned Diffusion Models
10:22 a.m.: On the composable security of weak coin flipping
10:29 a.m.: Encrypted Fine-tuning Of Transformers Using Fully Homomorphic Encryption
10:36 a.m.: A Mathematical Framework for Reciprocal Trust and Influence Dynamics
10:43 a.m.: Empowering Mobility: Integrating EEG Devices and Training Models to Enhance Wheelchair Control for Individuals with Physical Disabilities
10:50 a.m.: Cybersecurity for Health Care Teams
10:57 a.m.: Masking Transpilers to Protect Against Quantum Side-Channel Attacks
11:04 a.m.: Products of Optimal Codes and their Application in Cryptanalysis
11:11 a.m.: The road to ultra-reliability in future mobile networks
11:18 to 11:30 a.m.: Break
11:30 a.m.: Consumer-Centric Countermeasure to Counterfeiting: Authentication Mobile App Using Deep-Learning-Based Physically Unclonable Functions
11:37 a.m.: SusFL: Energy-Aware Federated Learning-based Monitoring for Sustainable Smart Farms
11:44 a.m.: A Smart Contract-based Decentralized Marketplace System to Promote Reviewer Anonymity
11:51 a.m.: BotShield: Detecting Unknown Variants of Malware on IoT Devices Using Power Side Channels
11:58 a.m.: A Trustworthy Learning Framework for Secure and Reliable Power Grid Operation Against Generative AI Attacks
12:05 p.m.: Uncertainty-Aware Deep Reinforcement Learning-based Intrusion Response Systems for In-Vehicle Networks
Paper Topic: Social Cybersecurity
(9 to 11:42 a.m.)
9 a.m.: Issues of Government Surveillance and Spyware use in India
9:07 a.m.: “This Is Not a Scam!” Cybersecurity Awareness-Raising Program Tackling Older Adults’ Scam Victimization Utilizing Interactive Theatre
9:14 a.m.: Lorenz Ransomware: The Effect of Ransomware on Businesses
9:21 a.m.: Hands-on Experience and Networking Before Graduating
9:28 a.m.: From Experiential Learning to Practice: A Pre-Apprenticeship Program
9:42 a.m.: Investigating the Experiences of Female CTF Players
9:49 a.m.: Spreading Cybersecurity Awareness Via Gamification: Zero-Day Game
9:56 a.m.: Cyber Security Awareness Training
10:03 to 10:15 a.m.: Break
10:15 a.m.: Considering End-User Situation Awareness
10:22 a.m.: OSINT Research Studios: A Flexible Crowdsourcing Framework to Scale Up Open Source Intelligence Investigations
10:29 a.m.: Use of Chatbots as Personal Cybersecurity Coaches Against Social Engineering Attacks
10: 36 a.m.: Modeling Election-Related Claims in Social Media in the Age of LLMs
10:43 a.m.: Security fatigue as a threat to use of an AI tool for password enhancement
10:50 a.m.: The Support of the Commonwealth Cyber Initiative to a Small Community College
10:57 a.m.: Experiential Learning through Immersive XR: Cybersecurity Education for Critical Infrastructures
11:04 a.m.: A Domain Agnostic Framework for Efficient and Effective Cybersecurity Risk Communication and Training
11:11 a.m.: Developing Cybersecurity Student Social Networking and Engagement Capacity Through an Experiential Learning Internship
11:18 a.m.: Data privacy in Group Testing
11:35 a.m.: Uncertainty-Aware Deep Reinforcement Learning-based Competitive Influence Maximization Combating False Information
-
General Item
-
General Item
-
General Item
-
General Item
-
General Item
-
General Item
-
General Item
-
General Item