Virginia Tech® home

Symposium 2024 Paper Presentation Schedule

Researchers and students from Virginia institutions of higher education will discuss their research covering three topics: NextG Security; Secure Systems; and Social Cybersecurity. Each presenter will get 7 minutes to present their work. 

Paper Topic: NextG Security

(9 to 9:28 a.m.)

9 a.m.: Performance Evaluation of 5G New Radio (NR) Systems in Indoor Environments

9:07 a.m.: An Ontology Learning through Lambek Calculus

9:14 a.m.: Timely Communication under Adversarial Attacks

9:21 a.m.: Reinforcement Learning with Application to Automated Penetration Testing

Paper Topic: Secure Systems

(9:28 a.m. to 12:12 p.m.)

9:28 a.m.: Strategic Shared Mental Model as Cyber Deception to Protect a Human-Machine Teaming System

9:35 a.m.: Energy-Aware Federated Learning-based Monitoring for Sustainable Solar Sensor-based Smart Farms

9:42 a.m.: Cyber-Resilient Angle Droop-Based Power Sharing Under GPS Spoofing Attacks

9:49 a.m.: Lightweight NN Protection Against Soft Errors: Critical Weights and How to Find Them

9:56 a.m.: Adversarial Networks and their Capacities

10:03  to 10:15 a.m.: Break

10:15 a.m.: Recovering Iris Data From Fine-Tuned Diffusion Models

10:22 a.m.: On the composable security of weak coin flipping

10:29 a.m.: Encrypted Fine-tuning Of Transformers Using Fully Homomorphic Encryption

10:36 a.m.: A Mathematical Framework for Reciprocal Trust and Influence Dynamics

10:43 a.m.: Empowering Mobility: Integrating EEG Devices and Training Models to Enhance Wheelchair Control for Individuals with Physical Disabilities

10:50 a.m.: Cybersecurity for Health Care Teams

10:57 a.m.: Masking Transpilers to Protect Against Quantum Side-Channel Attacks

11:04 a.m.: Products of Optimal Codes and their Application in Cryptanalysis

11:11 a.m.: The road to ultra-reliability in future mobile networks

11:18  to 11:30 a.m.: Break

11:30 a.m.: Consumer-Centric Countermeasure to Counterfeiting: Authentication Mobile App Using Deep-Learning-Based Physically Unclonable Functions

11:37 a.m.: SusFL: Energy-Aware Federated Learning-based Monitoring for Sustainable Smart Farms

11:44 a.m.: A Smart Contract-based Decentralized Marketplace System to Promote Reviewer Anonymity

11:51 a.m.: BotShield: Detecting Unknown Variants of Malware on IoT Devices Using Power Side Channels

11:58 a.m.: A Trustworthy Learning Framework for Secure and Reliable Power Grid Operation Against Generative AI Attacks

12:05 p.m.: Uncertainty-Aware Deep Reinforcement Learning-based Intrusion Response Systems for In-Vehicle Networks

Paper Topic: Social Cybersecurity

(9 to 11:42 a.m.)

9 a.m.: Issues of Government Surveillance and Spyware use in India

9:07 a.m.: “This Is Not a Scam!” Cybersecurity Awareness-Raising Program Tackling Older Adults’ Scam Victimization Utilizing Interactive Theatre

9:14 a.m.: Lorenz Ransomware: The Effect of Ransomware on Businesses

9:21 a.m.: Hands-on Experience and Networking Before Graduating

9:28 a.m.: From Experiential Learning to Practice: A Pre-Apprenticeship Program

9:42 a.m.: Investigating the Experiences of Female CTF Players

9:49 a.m.: Spreading Cybersecurity Awareness Via Gamification: Zero-Day Game

9:56 a.m.: Cyber Security Awareness Training

10:03 to 10:15 a.m.: Break

10:15 a.m.: Considering End-User Situation Awareness

10:22 a.m.: OSINT Research Studios: A Flexible Crowdsourcing Framework to Scale Up Open Source Intelligence Investigations

10:29 a.m.: Use of Chatbots as Personal Cybersecurity Coaches Against Social Engineering Attacks

10: 36 a.m.: Modeling Election-Related Claims in Social Media in the Age of LLMs

10:43 a.m.: Security fatigue as a threat to use of an AI tool for password enhancement

10:50 a.m.: The Support of the Commonwealth Cyber Initiative to a Small Community College

10:57 a.m.: Experiential Learning through Immersive XR: Cybersecurity Education for Critical Infrastructures

11:04 a.m.: A Domain Agnostic Framework for Efficient and Effective Cybersecurity Risk Communication and Training

11:11 a.m.: Developing Cybersecurity Student Social Networking and Engagement Capacity Through an Experiential Learning Internship

11:18 a.m.: Data privacy in Group Testing

11:35 a.m.: Uncertainty-Aware Deep Reinforcement Learning-based Competitive Influence Maximization Combating False Information