Monday, December 1
08:30 - 09:00
Room 109
Registration 09:00 - 12:30
Room 109
Tutorial
Federated Learning in Orbital Edge Computing
08:45 - 10:30
Workshops
Room 108
| 08:45–08:50 |
Opening
|
| 08:50–09:15 |
LLM4FaaS: No-Code Application Development using LLMs and FaaS
|
| 09:15–09:40 |
Task Scheduling in Edge Computing Environments: a Hierarchical Cluster-based Federated Deep Reinforcement Learning Approach
|
| 09:40–10:05 |
DRAF: A Drift-Resilient Averaging in Federated Learning across the Cloud Edge Continuum
|
| 10:05–10:30 |
Federated Learning with Iterative Synthetic Data Augmentation
|
10:30 - 11:00
Morning Break
11:00 - 12:30
Room 109
Tutorial
From Research to EdgePractical Federated AI Orchestration for Data Sovereignty and Real-Time Intelligence
11:00 - 12:30
Workshops
Main Hall
| 11:00–11:30 |
Power Aware Cluster Orchestration: Taxonomy, Initial Results, and Challenges
|
| 11:30–12:00 |
Towards a Novel Vertical Scaling Approach for Bursty Workloads in Kubernetes
|
| 12:00–12:30 |
KOTO: A Kubernetes-Based Platform for Secure and Scalable OT Orchestration in Industry 5.0
|
12:30 - 14:00
Lunch Break
14:00 - 18:00
Room 109
Tutorial
Serverless Orchestration on the Edge–Cloud ContinuumFrom Small Functions to Large Language Models
14:00 - 16:00
Workshops
Main Hall
| 14:00–14:25 |
Reactive and Proactive Migration for Edge AI Training on Energy-Harvesting, Intermittently Powered Devices
|
| 14:25–14:50 |
FedGuard: Leader-Aware Fault-Tolerant Federated Learning in the Cloud–Edge Continuum
|
| 14:50–15:15 |
Simplifying Federated Learning Deployment: Design and Implementation of the FLeeT Framework
|
| 15:15–15:40 |
A Deep Learning Approach to Detecting Multiple Types of Sybil Nodes in VANETs
|
| 15:40–16:00 |
A Hybrid Graph Convolutional Networks Framework for Context-Aware Multimodal Human Activity Recognition
|
Room 206
| 14:00–14:25 |
Single-Round Zero-Knowledge Proof for the Square-Root Problem in Cloud Systems
|
| 14:25–14:50 |
Privacy-Preserving Machine Learning for Encrypted Traffic Classification in Secure Cloud Services
|
| 14:50–15:15 |
Cloud-Based Phishing Awareness Analyzer for Automated User Training and Assessment
|
| 15:15–15:40 |
Evaluation of RPL Preinstalled Secure Mode Under Attacks
|
| 15:40–16:05 |
Repudiation For Good: Privacy-Preserving Prompt Deniability Through Embedding-Based Approximation
|
Room 108
| 14:00–14:05 |
Opening
|
| 14:05–14:25 |
Agentic Edge Intelligence: A Research Agenda
|
| 14:25–14:55 |
Predictive Resource Management in the Computing Continuum: Transfer Learning from Virtual Machines to Containers using Transformers
|
| 14:55–15:25 |
Agentic Federated LLMs at the Edge for Promptable Guardrail Inspection with YOLO-E
|
| 15:25–15:55 |
Application level observability for adaptive Edge to Cloud continuum systems
|
| 15:55–16:00 |
Closing
|
Room 207
| 14:00–14:40 |
Keynote Talk
|
| 14:40–15:05 |
Formal Design‑Time Privacy & Consent Assurance for LLM‑Based Applications for Children
|
| 15:05–15:30 |
A Hybrid Monitoring Framework for Anomaly Detection in Smart Home IoT Devices
|
| 15:30–16:00 |
Skewness-Guided Pruning of Multimodal Swin Transformers for Federated Skin Lesion Classification on Edge Devices
|
16:00 - 16:30
Break
16:30 - 18:00
Workshops
Main Hall
| 16:30–17:00 |
Participation is Power: Effective Approach to Dynamic Federated Learning
|
| 17:00–17:30 |
Investigating the Impact of Isolation on Synchronized Benchmarks
|
Room 206
| 16:30–16:55 |
Zero Trust Architecture for Ransomware Defense in Virtualized Environment
|
| 16:55–17:20 |
A Multi-Layer Phishing Defense Framework for Trusted Cloud Environments
|
| 17:20–17:45 |
Towards Efficient and Privacy-Preserving Cloud Computing
|
Room 207
| 16:30–17:00 |
Does Energy-efficiency Mean Carbon-awareness? A Critical Evaluation of Sustainable Serverless Edge Scheduling
|
| 17:00–17:30 |
Honeypot Embedded in Low-Cost IoT Hardware for Collecting and Analyzing Real-World Cyber Threats
|
| 17:30–18:00 |
HybridVFL: Disentangled Feature Learning for Edge-Enabled Vertical Federated Multimodal Classification
|
18:30 - 20:30
Cocktail Reception
(Open to all participants)
Tuesday, December 2
08:30 - 09:00
Registration
09:00 - 09:30
Opening Ceremony ( Main Hall)
09:30 - 10:30
Main Hall
Keynote — Data Confidentiality in the World of Agentic AI Systems
Hubertus Franke (IBM T.J. Watson Research Center, USA)
10:30 - 11:00
Morning Break
11:00 - 12:30
Workshops
Room 206
| 11:00–11:30 |
FL-as-API: A Service-Oriented Architecture for Heterogeneous Federated Learning
|
| 11:30–12:00 |
Countering Device Fingerprinting with Cloud Autoscaling
|
| 12:00–12:30 |
Serverless Computing: An Empirical Evaluation of Application Performance and Power Consumption in Knative
|
11:00 - 13:00
Room 109
Contributed Papers Session
Session Chair: Reza Farahani
-
Vectorization Of Narrow Matrix Multiplication for Ascend AI Inference Acceleration
Anton Shurygin and Alexander Frolov -
An Empirical Study on Estimating Energy Consumption From Software Traces
Thi Mai Phuong Nguyen, Adel Noureddine and Congduc Pham -
Gaia: Hybrid Hardware Acceleration for Serverless AI in the 3D Compute Continuum
Maximilian Reisecker, Cynthia Marcelino, Thomas Werner Pusztai and Stefan Nastic -
Balancing Compression and Prediction: A Hybrid Autoencoder–LSTM Framework for Cloud Workloads
Lidia Kidane, Paul Townend, Thijs Metsch and Erik Elmroth
13:00 - 14:00
Lunch Break
14:00 - 16:00
Room 109
Contributed Papers Session
Session Chair: Luiz Bittencourt
-
BullyHCL: Unsupervised Heterogeneous Graph Contrastive Learning Framework for Session-based Cyberbullying Detection
Munkhbuyan Buyankhishig, Thanda Shwe, Israel Mendonça and Masayoshi Aritsugi -
How to Evaluate NoSQL Database Paradigms for Knowledge Graph Processing
Rosario Napoli, Antonio Celesti, Massimo Villari and Maria Fazio -
Dual-Space Augmentation and Sampling for Training Language Models on Limited and Imbalanced Surgical Reports
Ashok Choudhary, Frank Lee, Cornelius Thiels and Hojjat Salehinejad -
Reflect, Reason, Rephrase (R³-Detox): An In-Context Learning Approach to Text Detoxification
Guillermo Villate Castillo, Javier Del Ser and Borja Sanz
16:00 - 16:30
Break
16:30 - 18:00
Room 109
Contributed Papers Session
Session Chair: Kandaraj Piamrat'
-
From High to Low: A Numerical Experiment to Analyse Contour Detection at Resolution Loss in Images of Damaged Glass Plates
Sabrina Pietzsch, Sebastian Wollny and Paul Grimm -
Optimizing Video Analytics Inference Pipelines: A Case Study
Saeid Ghafouri, Yuming Ding, Katerine Diaz Chito, Jesús Martínez del Rincón, Niamh O'Connell and Hans Vandierendonck -
Scaling AI for Embryo Transition Detection: Benchmarking Spatio-Temporal Deep Models
Aissa Benfettoume Souda, Mohammed El Amine Bechar, Souaad Hamza-Cherif, Jean-Marie Guyader, Marwa Elbouz, Frédéric Morel, Aurore Perrin and Nesma Settouti
Wednesday, December 3
08:30 - 09:30
Registration
09:30 - 10:30
Main Hall
Keynote — Rubies in the Dust
Julie McCaan (Imperical College London, UK)
10:30 - 11:00
Morning Break
11:00 - 12:30
Room 109
Contributed Papers Session
Session Chair: Sidi Mohammed Kaddour
-
System Requirements for Decentralised Collaborative Machine Learning in Industry 4.0
Sylwia Olbrych, Hans Aoyang Zhou, Anas Abdelrazeq and Robert H. Schmitt -
Comparative Analysis of Motif-Based Anomaly Detection for Humidity Monitoring in Digital Twin Systems
Ionica-Larisa Puiu, Daniela Zaharie and Teodor-Florin Fortiș -
Dual-Modality UAV Detection and Classification under Low-Visibility: A Synth-Real RGB–IR Dataset and Benchmark for Aerial Surveillance
Hatoun Alshoail, Sarah Alruwais, Juri Alqorashi and Najah Alsubaie
12:30 - 14:00
Lunch Break
14:00 - 15:00
Main Hall
Keynote — Societal Computing and Innovation in the AI Era
Ilkay Altintas (University of California San Diego, USA)
15:00 - 16:30
Room 109
Best Paper Session
Session Chair: Lorenzo Carnevale
-
Development and Comparative Evaluation of Three Artificial Intelligence Models (NLP, LLM, JEPA) for Predicting Triage in Emergency Departments: A 7-Month Retrospective Proof-of-Concept
Edouard Lansiaux, Ramy Azzouz, Emmanuel Chazard, Amélie Vromant, Eric Wiel -
Evolutionary Train-Test Split for Hierarchical Monte Carlo Ensemble
Ziauddin Ursani, Dmytro Antypov, Katie Atkinson, Matthew Dyer, Matthew J. Rosseinsky, Sven Schewe, Ahsan Ahmad Ursani, Andrij Vasylenko -
Edge-Driven Water Quality Monitoring and Prediction: A Spatio-Temporal GNN-based IoT Approach for Environmental Sensing
Lia Anggraini, Elisha Elikem Kofi Senoo, Israel Rodrigues Soares, Thanda Shwe, Israel Mendonça dos Santos, Masayoshi Aritsugi
16:30 - 17:00
Break
17:00 - 18:00
Poster Session
19:30 - 21:30
Conference Dinner
(Open to all participants)
Restaurant "Le 1" , 1 rue Olympe de Gouges – 44200 Nantes
— See the location (5 minutes from Conference location)
Thursday, December 4
08:30 - 09:30
Registration
09:30 - 10:30
Main Hall
Keynote — Carbon Footprint Allocation Models in Distributed Systems
Anne-Cécile Orgerie (IRISA Rennes, CNRS, France)
10:30 - 11:00
Morning Break
11:00 - 12:30
Room 109
Paper Session
-
Building a Dataset for Character Product Detection from SNS
Maho Funada, Reiya Sato and Yoshitaka Sakurai -
Unsupervised Representation Learning from Robotic Channel State Information for Human Activity and Gait Recognition
Ashok Choudhary, Cornelius Thiels and Hojjat Salehinejad -
Optimal Warehouse Distribution Center Placement using Evolutionary Algorithms
Corrado Mio, Abdulla Alfalasi and Siddhartha Shakya
11:00 - 12:40
Workshops
Room 206
| 11:00–11:25 |
Verifiability and Privacy in Federated Learning through Context-Hiding Multi-Key Homomorphic Authenticators
|
| 11:25–11:50 |
Towards a Framework for Personal and Domestic Cybersecurity
|
| 11:50–12:15 |
Optimizing Code Embeddings and ML Classifiers for Python Source code Vulnerability Detection
|
| 12:15–12:40 |
Design and Development of a Predictive Security Threat Management System Leveraging CWEs, CVEs, and CAPEcs
|
12:30 - 12:45
Closing Remarks
12:45 - 14:00
Lunch Break
14:00 - 14:50
Workshops
Room 206
| 14:00–14:25 |
Toward Agentic IAM: A Probabilistic Authorization Framework for Least Privilege AI Workflows
|
| 14:25–14:50 |
Early detection of backdoor attacks in federated learning via ecosystemic symmetry breaking
|