Accepted Papers
The following set of papers have been accepted for the LCN. See the Technical Program for detailed information about the papers and schedule.
- Regular Papers
- Invited Papers
- Short Papers
- Demo Papers
- Special Track Papers: Autonomous Intelligence for Low-Altitude Economy (AILE)
- Special Track Papers: Cloud-AI-Native Mobile Networks Powered by eBPF (CAMe)
- Special Track Papers: Large Language Models and Networking (LLMNet)
- Special Track Papers: Maritime Communication and Security (MarCaS)
Regular Papers
Energy-Aware Meta Sleep Scheduler, an Alternative to DRX in 5G Networks Loup Dorval (IRISA & Université de Rennes, France); Cedric Gueguen (University of Rennes 1, France); Guillaume Terrier (IRISA, France) |
FeUDA-BERT: Federated URL Domain-Aware BERT for Phishing URL Detection Fariza Rashid (The University of Sydney, Australia); Ben Doyle (Thales Australia, Australia); Suranga Seneviratne (The School of Computer Science & The University of Sydney, Australia) |
Performance Analysis of Communication Scheduling Schemes for Distributed Deep Learning Jinhao Luo and Hong Wang (Memorial University of Newfoundland, Canada); Jingrong Wang (University of Toronto, Canada); Adrian Fiech and Kaiyang Liu (Memorial University of Newfoundland, Canada) |
Ensuring Continuous Connected Movement for a Swarm of Relocating Drones Fatih Senel (Osnabrück University, Germany); Kemal Akkaya (Florida International University, USA); Mirko H. Wagner, Fritz Bökler and Nils Aschenbruck (Osnabrück University, Germany) |
Ce-Fi: Centralized Wi-Fi over Packet-Fronthaul Simon W. Schmitz-Heinen, Anatolij Zubow and Christos Laskos (Technische Universität Berlin, Germany); Falko Dressler (TU Berlin, Germany) |
Bidirectional TLS Handshake Caching for Constrained Industrial IoT Scenarios Jörn Bodenhausen, Simon Mangel and Thomas Vogt (RWTH Aachen University, Germany); Martin Henze (RWTH Aachen University, Germany & Fraunhofer FKIE, Germany) |
Probing Considered Harmful: Leveraging RSSI for Link Quality Prediction Navya Sneha Chatharajupalli, Randolf Rotta, Reinhardt Karnapke and Jörg Nolte (Brandenburgische Technische Universität Cottbus-Senftenberg, Germany) |
MITHRIL: Multi-Objective Topology Synthesis with Reinforcement Learning for Critical Networks Oliver Wandschneider (Universität Hamburg, Germany); Doğanalp Ergenç (Technische Universität Berlin, Germany); Mathias Fischer and Anum Talpur (Universität Hamburg, Germany) |
EFCC: Ethernet Frame Crafter & Capture for TSN Research Akram Ben Ahmed (National Institute of Advanced Industrial Science and Technology (AIST), Japan); Takahiro Hirofuchi and Takaaki Fukai (National Institute of Advanced Industrial Science and Technology, Japan) |
CoFacS - Simulating a Complete Factory to Study the Security of Interconnected Production Stefan Lenz, David Schachtschneider, Simon Jonas, Liam Tirpitz and Sandra Geisler (RWTH Aachen University, Germany); Martin Henze (RWTH Aachen University, Germany & Fraunhofer FKIE, Germany) |
CEC-LoRa: a Codeless Error Correction Method for Corrupted LoRa Packet Decoding Daniel Szafranski (Clausthal University of Technology, Germany); Andreas Reinhardt (TU Clausthal, Germany) |
Modeling of Geographic Greedy Routing in Sparse LDACS Air-to-Air Networks Using Absorbing Markov Chains Musab Ahmed and Konrad Fuger (Hamburg University of Technology, Germany); Koojana Kuladinithi (Hamburg University of Technology & Institute of Communication Networks, Germany); Andreas Timm-Giel (Hamburg University of Technology, Germany) |
Model Placement for Quality Inference of Video Streaming Traffic over a Cellular Network Francescomaria Faticanti (École Normale Supérieure de Lyon, France); Loïc Desgeorges and Rémi Watrigant (Université Claude Bernard Lyon 1, France); Thomas Begin (Université Claude Bernard Lyon 1, LIP, France); Francesco Bronzino (École Normale Supérieure de Lyon, France) |
QUICUP: Secure User Plane Tunneling for Cellular Networks Lisa Wernet, Sebastian Rust and Tobias Meuser (Technical University of Darmstadt, Germany); Silas K Gerock (Technische Universität Darmstadt, Germany); Björn Scheuermann (TU Darmstadt, Germany) |
Hierarchical Placement Learning for Network Slice Provisioning Jesutofunmi Ajayi (Uni Bern, Switzerland); Antonio Di Maio and Torsten Ingo Braun (University of Bern, Switzerland) |
CapAware: Capacity-Aware Uplink Bandwidth Prediction for Cellular Networks Birkan Denizer (Kiel University, Germany); Olaf Landsiedel (Hamburg University of Technology, Germany & Kiel University, Germany) |
CodeBERT-Based Embeddings for Detecting Vulnerable Smart Contracts Awarjana Perera, Vallipuram Muthukkumarasamy and Babu Pillai (Griffith University, Australia); Jeyakumar Samantha Tharani (University of Jaffna, Sri Lanka & Griffith University, Australia); Aravinda S Rao (Griffith University, Australia) |
A New Perspective on CNN-Based Encrypted Traffic Classification: Data Preprocessing and Generalization Performance Analysis Xianfeng Ye, Tongge Xu and Liqun Yang (Beihang University, China) |
FedGraphX: Split Federated Graph Learning for Cross-City AIoT Traffic Forecasting with Heterogeneous Sensor Networks Hanyue Xu (Xi'an Jiaotong-Liverpool University, China); Li-minn Ang (University of Sunshine Coast, Australia); Kah Phooi Seng (University of the Sunshine Coast, Australia); Wei Wang (Xi'an Jiaotong Liverpool University, China); Jeremy Smith (University of Liverpool, United Kingdom (Great Britain)); Nan Xiang and Jieli Chen (Xi'an Jiaotong-Liverpool University, China) |
Double DQN-GAMO: a Cyber Threat Detection Framework for Zero-Day Attacks Zhenwei Cang and Aniket Mahanti (University of Auckland, New Zealand); Ranesh Naha (Queensland University of Technology, Australia); Sudheer Kumar Battula (Anurag University, India) |
Quantised Neural Network NIDS on SmartNIC: Balancing Accuracy and Efficiency in P4 Yaying Chen and Siamak Layeghy (The University of Queensland, Australia); Marius Portmann (University of Queensland, Australia) |
OptVV: an Adaptive Optimization Framework for Volumetric Video Streaming Reza Hedayati Majdabadi and Mea Wang (University of Calgary, Canada) |
P4Ward: Fine-Grained Behavioral Policy Enforcement for Industrial Networks Ina B. Fink and William Köhler (RWTH Aachen University, Germany); Martin Serror (Fraunhofer FKIE, Germany); Klaus Wehrle (RWTH Aachen University, Germany) |
Freshness-Aware Inference Services in Edge Computing via Offloading or Local Processing Xuan Ai and Weifa Liang (City University of Hong Kong, Hong Kong) |
Halpha: Asynchronous Leaderless Probabilistic Consensus with near-Half Adversaries Huanyu Wu, Shangyin Weng, Lei Zhang and Muhammad Ali Imran (University of Glasgow, United Kingdom (Great Britain)) |
SwarmSearch: Decentralized Search Engine with Self-Funding Economy Marcel Gregoriadis, Rowdy M Chotkan, Petru Neague and Johan Pouwelse (Delft University of Technology, The Netherlands) |
A Position- and Energy-Aware Routing Strategy for Subterranean LoRa Mesh Networks Nalith L Udugampola, Xiaoyu Ai and Binghao Li (University of New South Wales, Australia); Henry Gong (Roobuck Pty Ltd, Australia); Aruna Seneviratne (University of New South Wales, Australia) |
AdVAR-DNN: Adversarial Misclassification Attack on Collaborative DNN Inference Shima Yousefi (City University of New York, USA); Motahare Mounesan (The Graduate Center, CUNY, USA); Saptarshi Debroy (City University of New York, USA & Hunter College, USA) |
Optimizing Microservice Placement for Heterogeneous Workloads in Collaborative Edge-Cloud Computing Junjie Teng (Beijing University of Posts and Telecommunications, China); Shijun Ma (Beijing University of Posts and Telecommunication, China); Man Yi and Yinglei Teng (Beijing University of Posts and Telecommunications, China); Ruizhe Yang (Beijing University of Technology, China) |
Analysis of Post-Quantum Cryptography in User Equipment in 5G and Beyond Sanzida Hoque and Abdullah Aydeger (Florida Institute of Technology, USA); Engin Zeydan (CTTC, Spain); Madhusanka Liyanage (University College Dublin, Ireland) |
A Collaborative Framework for Edge Caching in Dynamic NGNs: Enhancing Efficiency Through Multi-Agent Learning Zheng Wan and Yu Zhou (Jiangxi University of Finance and Economics, China); Xiaogang Dong (Jiangxi University of Finance and Economics & Jiujiang University, China); Yuxi Pi (Jiangxi University of Finance and Economics, China) |
Feedback-Driven Autonomous Data Set Labeling for Denial-of-Service Attack Traffic Samuel Kopmann (Karlsruhe Institute of Technology, Germany); Danny Alex Lachos Perez (BENOCS GmbH, Germany); Martina Zitterbart (KIT, Germany) |
IoDS: a Novel MPTCP Scheduler for Heterogeneous Networks Reza Poorzare (Karlsruhe University of Applied Sciences, Germany); Oliver P. Waldhorst (Karlsruhe University of Applied Sciences & Distributed Software Systems (DSS) Research Group at the Insitute of Applied Research (IAF), Germany) |
Characterization of an Acoustic Sensor Network to Improve Clock Synchronization Strategies Alexander Tessmer and Nils Aschenbruck (Osnabrück University, Germany) |
Reinforced Fairness-Aware Multi-Agent Self-Organization for 6G Radio Access Network Orchestration Elham Hashemi Nezhad (Uni Bern, Switzerland); Antonio Di Maio and Torsten Ingo Braun (University of Bern, Switzerland) |
Load Balancing for LLM Traffic via Flow Block Xingyi Li (Beijing University of Posts and Telecommunications, China); Yiran Zhang (Beijing University of Posts and Telecommunications, State Key Laboratory of Networking and Switching Technology, China); Shuai Lyu (Beijing Internet Association, China); Shangguang Wang (Beijing University of Posts and Telecommunications, State Key Laboratory of Networking and Switching Technology, China) |
Uni-MPTCP(⃗ω, n ): a Unified MPTCP Congestion Control Algorithm Xuan Wang, Hao Che, Zhijun Wang and Hong Jiang (University of Texas at Arlington, USA) |
Towards Trustworthy Agentic IoEV: AI Agents for Explainable Cyberthreat Mitigation and State Analytics Meryem Malak Dif, Mouhamed Amine Bouchiha and Abdelaziz Amara Korba (University of La Rochelle, France); Yacine Ghamri-Doudane (University of la Rochelle, France) |
Invited Papers
Prototype-Based Semi-Asynchronous Edge-End Collaborative Learning with Client Clustering Sujin Hou (Jilin University, China); Enze Yu (Nanjing University, China); Fang Mei (Jilin University, China); Yuben Qu (Nanjing University of Aeronautics and Astronautics, China); Haihan Zhang (Nanjing University, China); Haipeng Dai (Nanjing University, China & State Key Laboratory for Novel Software Technology, China) |
Secured Data Sharing and Storage System for Intelligent Transportation System via Lightweight Blockchain Jiarui Zhang (Stony Brook University, USA); Wei Lin (University of Texas at Arlington, USA); Yiming Zeng (Binghamton University, USA); Xiaojun Shang (University of Texas at Arlington, USA); Yuanyuan Yang (Stony Brook University, USA) |
Dynamic Adaptation of in-Band Network Monitoring via Meta Learning Mingyuan Zang (China Telecom Cloud Computing Research Institute, China); Eder Ollora Zaballa and Lars Dittmann (Technical University of Denmark, Denmark); Jie Wu (Temple University, USA) |
DHERC: Dynamic Hybrid ECN-RTT Congestion Control for RDMA Network Ran Huang, Jyoti Sahni and Winston K. G. Seah (Victoria University of Wellington, New Zealand) |
CARGO: a Co-Optimization Framework for EV Charging and Routing in Goods Delivery Logistics Arindam Khanda and Anurag Satpathy (Missouri University of Science and Technology, USA); Amit Jha (CGI, USA); Sajal K. Das (Missouri University of Science and Technology, USA) |
Rethinking Reliability Using Network Coding: a Practical 5G Evaluation Laura Landon and Vipindev Adat Vasudevan (Massachusetts Institute of Technology, USA); Junmo Sung (JMA Wireless, USA); Muriel Médard (MIT, USA) |
Short Papers
Energy-Efficient Cluster Formation and Central User Selection in UAV-Assisted Cellular Networks Kanhu Charan Gouda (IIT ROORKEE, India); Akshay Singh and Rahul Thakur (IIT Roorkee, India) |
Improving WiFi Ranging Through Frequency Diversity and Mobility Sascha Rösler (Technische Universität Berlin, Germany); Nils Eising (TU Berlin, Germany); Anatolij Zubow (Technische Universität Berlin, Germany); Falko Dressler (TU Berlin, Germany) |
Moving Target Offense: RL-Based Adaptive Evasion Strategies for C2 Frameworks Karim Khamaisi (University of Zürich, Switzerland); Bruno Rodrigues (University of St. Gallen, Switzerland); Burkhard Stiller (University of Zürich, Switzerland); Jan von der Assen (University of Zurich UZH, Switzerland); Aleksandar Ristic, Anton Crazzolara and Samuel Bruegger (University of Zürich, Switzerland) |
Smart Shielding: Using ML and AirTag RSSI Data for Better Privacy Katharina O. E. Müller, Samuel A. Frank and Dario Monopoli (University of Zurich, Switzerland); Daria Schumm (University of Zürich, Switzerland); Bruno Rodrigues (University of St. Gallen, Switzerland); Burkhard Stiller (University of Zürich, Switzerland) |
Analysing and Upper Bounding Pessimism of Network Calculus Approach in SPQ-Based Real-Time Ethernet Aakash Soni (ECE Paris, France); Jean-Luc Scharbarg (University of Toulouse, France); Jérôme Ermont (Université d Toulouse, France) |
IoTCommFreq: Efficient IoT Device Fingerprinting Through Network Behaviour Analysis Using Frequency of Communication Mariam Munsif Mir (Griffith University, Nathan Campus, Australia); Wee Lum Tan (Griffith University, Australia); Mohammad Awrangjeb (School of Information and Communication Technology (ICT) Griffith University, Australia) |
XLA-LB: Latency Aware Load Balancing Using XDP Krishnaveni K S and Anish Hirwe (Indian Institute of Technology Palakkad, India) |
AI-Aided Non-Visual Object Sensing and Replicating for Digital Transformations Taewook Kim (Chungbuk Natinal University, Korea (South)); Liu Philip (Korea Advanced Institute of Science and Technology, Korea (South)); Soochang Park (Chungbuk National University, Korea (South)) |
P3PO: Parallel Processing for Priority Ordering in Programmable Schedulers Nikhil V Shinde and Krishna M Sivalingam (Indian Institute of Technology Madras, India); Gauravdeep Shami (Network Innovation Engineer & Ciena Corporation, Canada) |
GRU-QUIC: a Machine Learning-Enhanced QUIC Protocol with Packet Reordering Resilience for Satellite Networks Yang Liu (Huazhong University of Science and Technology, China); Ting Bi (6G Center, unknown); Nanxi Chen (SIMIT, Chinese Academy of Sciences, China); Lixia Xiao, Jiaxi Zhou and Tao Jiang (Huazhong University of Science and Technology, China) |
CSUM-G: Group Software Updates for CubeSat Clusters Ankit Gangwal and Aashish Paliwal (IIIT Hyderabad, India) |
Empirical Analysis of DNS Abuse Cases Within Australian Domain Minghao Cai and Sushmita Ruj (University of New South Wales, Sydney, Australia); Rahat Masood (University of New South Wales & School of Electrical Engineering and Computer Science, Australia); Salil S Kanhere (UNSW Sydney, Australia) |
Decentralised Identity and PUF-Based Zero-Knowledge Proofs for IoUT Applications Nicola Altamura ("La Sapienza" - University of Rome, Italy); Riccardo Lazzeretti and Edoardo Liberati (Sapienza University of Rome, Italy); Michele Nati (WSENSE SRL, Italy); Chiara Petrioli (Sapienza University of Rome & WSense, Italy) |
Autonomous Data Scientist (ADaS): a Practical Example of the Future Role of AI in Cybersecurity Aimee Liang, Simone F Green, Abigail Nelson and Zimo Zhang (Johns Hopkins University, USA); Lanier Watkins (Johns Hopkins University Information Security Institute, USA); Jeffrey S Chavis and Paul Velez (Johns Hopkins University Applied Physics Laboratory, USA); Yinzhi Cao (Johns Hopkins University, USA) |
FresSim: a Coverage Simulator for LoRaWAN Based on Fresnel Zone Vicente Torres-Sanz, Pablo Donate, Julio A Sanguesa, Piedad Garrido and Francisco J. Martinez (University of Zaragoza, Spain) |
Network Delivery Time Control: A Novel Approach to Rate Adaptation for Low-Latency Video Flows Paul-Louis Ageneau (Netflix, The Netherlands); Grenville Armitage (Netflix, Australia) |
Adapting Large Language Models for Cognitive Spectrum Allocation in Coexisting GEO-LEO Satellites Rakshitha De Silva (Deakin University, Australia & University of Moratuwa, Sri Lanka); Shiva Raj Pokhrel (Deakin University, Australia & Nepal Telecom, Nepal) |
Static Object Classification Using WiFi Signals Manal Zneit (City University of New York, USA); Md Nurul Absur (Graduate Center, CUNY, USA); Sourya Saha (City University of New York, USA); Saptarshi Debroy (City University of New York, USA & Hunter College, USA) |
P4-NEON: Multihoming in Software Defined Network VANETs with P4 David Caetano and Bruno Miguel Sousa (University of Coimbra, Portugal) |
A Cheating Detection and Recovery Framework for Robust Multiparty Computation in Cloud Environment Richard Hernandez (Florida International University, USA) |
Now You See Me / Now You Don't: Constrained Adversarial Attacks in Network Intrusion Detection Across Datasets and Machine Learning Models Dominik Brockmann, Eric Lanfer, Nikolas Wintering and Nils Aschenbruck (Osnabrück University, Germany) |
CEDTS-RL: Towards Efficient and Green Cross-Geographical Data Centers Based on Reinforcement Learning Shu Yang, Le Chen and Laizhong Cui (Shenzhen University, China); Fanpu Cao (South China University of Technology, China); Xiaolei Chang (Tsinghua Shenzhen International Graduate School, China); Guowen Lun (Yunfu Luoding Power Supply Bureau of Guangdong Power Grid Co. Ltd., China) |
An Intelligent Q-Learning Approach for Energy-Efficient Channel Occupancy in NR-U Cellular Networks for Fair Unlicensed Spectrum Access Vijeth J Kotagi (Indian Institute of Technology Dharwad, India); Yash Deshpande (Indian Institute of Technology Jammu, India); Shreyas Joshi (Extreme Networks, India); Ramita S Commi (University of Birmingham, United Kingdom (Great Britain)) |
Measuring the Potential for Bundled Starlink Performance Within a Single Service Cell Till Zimmermann, Dominic Laniewski, Eric Lanfer, Stefanie Thieme, Nikolas Wintering and Nils Aschenbruck (Osnabrück University, Germany) |
Real-Time Medical Training in Virtual Reality over 5G Open RAN: a Performance Study Vidura Ravihansa and Chamara Sandeepa (University College Dublin, Ireland); Ouranis Vasilapostolos (Magos & Haptikos, Greece); Fionnuala McAuliffe, Eleni Mangina and Madhusanka Liyanage (University College Dublin, Ireland) |
WiLong-Air: a Field-Tested Long-Range Wi-Fi Mesh System for M2M DaaS Scenarios Anshul Pandey (Technology Innovation Institute, United Arab Emirates); Kavin Kumar Thangadorai (Indian Institute of Technology Madras, India & Technology Innovation Institute, United Arab Emirates); Tirth Master (Unikie MEA Limited, Abu Dhabi, India); Vadim Eremeev (Technology Innovation Institute, United Arab Emirates); Kumar Murugesan (Technology Innovation Institute (TII), United Arab Emirates & International Institute of Information Technology Bangalore, India); Uma Maheswara (TII, United Arab Emirates) |
A Game-Theoretic Load-Aware Pricing and User Association Scheme for Proximal Spectrum Sharing in Multi-Operator Cellular Networks Vijeth J Kotagi and Deekshith Kumar Pampati (Indian Institute of Technology Dharwad, India); Rahul Thakur (IIT Roorkee, India) |
Implementing Practical Problem-Space Adversarial Attacks on Modern Network Intrusion Detection Systems Md Mehedi Hasan, Rafiqul Islam, Quazi Ehsanul Kabir Mamun and Md Zahidul Islam (Charles Sturt University, Australia); Junbin Gao (The University of Sydney, Australia) |
Enhancing Network Intrusion Detection: a Real-Time Adaptive Framework for Temporal Evasion Attack Generation and Mitigation Md Mehedi Hasan, Rafiqul Islam, Quazi Ehsanul Kabir Mamun and Md Zahidul Islam (Charles Sturt University, Australia); Junbin Gao (The University of Sydney, Australia) |
A Dynamic GAN-Based Obfuscation Approach Against Profiling Attacks Lalith Medury, Luke E Robinson and Farah Kandah (Auburn University, USA) |
XAI-Guided Adversarial Attacks on DRL in UAV-Enabled MEC Divya D Kulkarni and Mohan Gurusamy (National University of Singapore, Singapore) |
A Knowledged-Enhanced Dual-Generator GAN Framework for IoT Intrusion Traffic Generation Bipraneel Roy, Hon Cheung and Chun Ruan (Western Sydney University, Australia) |
Bitcoin Flows from Sanctioned Sources Axel Flodmark, Rasmus Samuelson and David Hasselquist (Linköping University, Sweden); Martin Arlitt (Corelight, Canada); Niklas Carlsson (Linköping University, Sweden) |
A Lightweight Asynchronous Scheduling Solution for Large-Scale Deterministic Networks Mohamed Elattar (Technical University of Munich, Germany & Huawei Munich Research Center, Germany); Siyu Tang (Huawei Technologies Duesseldorf GmbH, Germany); Georg Carle (Technische Universität München, Germany) |
A Bayesian Network Approach for Enhancing Security-Focused Decision Support Systems Carolina Fernández-Martínez (i2CAT Foundation, Spain); Muhammad Shuaib Siddiqui (Fundació i2CAT, Internet i Innovació Digital a Catalunya, Spain); Vanesa Daza Fernández (Universitat Pompeu Fabra, Spain) |
Demo Papers
Demo: Visualizing TCP BBRv3 Performance in AQM-Enabled Wireless Networks Shyam Shrestha and Jonathan Kua (Deakin University, Australia); Shiva Raj Pokhrel (Deakin University, Australia & Nepal Telecom, Nepal) |
Demo: Seamless IoT Interaction in Mixed Reality Environments Ryan Padamadan and Thilini Dinushika Ranagalage (University of Sydney, Australia); Niruth Bogahawatta and Kanchana Thilakarathna (The University of Sydney, Australia) |
Towards 6G-Enabled Multi-Robot Process Orchestration in Complex Logistics Environments Julia Freytag (Fraunhofer IML, Germany); Jan Emmerich (Fraunhofer Institute for Material Flow and Logistics, Germany); Irfan Fachrudin Priyanta (TU Dortmund University & Chair of Material Handlings and Warehousing, Germany); Sönke Kauffmann and Rico Ahlbäumer (Fraunhofer Institute for Material Flow and Logistics, Germany) |
Demo: SweetsPot: a Distributed Honeypot Federation Platform Tillmann Angeli (German Research Center for Artificial Intelligence, Germany); Frederic Beck (Inria, France); Daishi Kondo (The University of Tokyo, Japan); Isabelle Chrisment (LORIA-TELECOM Nancy, Université de Lorraine, France); Hideki Tode (Osaka Metropolitan University, Japan); Hans Schotten (DFKI, Germany) |
Demo: TOSense - What Did You Just Agree to? Xinzhang Chen (The University of New South Wales, Australia); Hassan Ali (University of New South Wales, Australia); Arash Shaghaghi and Salil S Kanhere (UNSW Sydney, Australia); Sanjay Jha (University of NSW, Australia) |
Special Track Papers: Autonomous Intelligence for Low-Altitude Economy (AILE)
Autonomous UAV Formation Adaptation Based on Link Quality Monitoring and Drift Detection Livio Bisogni (Pontificia Universidad Católica de Chile, Chile); Pedro d'Orey (CISTER Research Centre, Portugal); Luis Ramos Pinto (University of Lisbon & LASIGE, Portugal); Miguel Gutierrez Gaitan (PUC (Chile), Chile & CISTER (Portugal), Portugal); Giorgio Buttazzo (Scuola Superiore Sant Anna, Italy); Luis Almeida (Universidade do Porto & Instituto de Telecomunicações, Portugal) |
Into the Unknown: UAV Navigation with F-Star (F*) Tobias Fischer, Zubair Shaik and Andreas Mitschele-Thiel (Dept. of Computer Science, TU Ilmenau, Germany); Florian Klingler (Dept. of Computer Science, University of Bamberg, Germany) |
Meaningful Human Control over Swarms in ISTAR Marcel Caspar Attila Baltzer, Jonas Rockbach and Claudia Bender (Fraunhofer FKIE, Germany); Daniel Weber (Fraunhofer FKIE, Germany & Osnabrück University, Germany); Matthias Nieuwenhuisen and Bernd Brüggemann (Fraunhofer FKIE, Germany) |
Performance Analysis of Network-Aware Micro-UAVs in Low-Altitude Applications Disen Jia, Jonathan Kua and Xiao Liu (Deakin University, Australia) |
Special Track Papers: Cloud-AI-Native Mobile Networks Powered by eBPF (CAMe)
AI-Driven Authentication Anomaly Detection for Modern Telco and Enterprise Networks Saber Jafarizadeh (Rakuten Mobile, Inc., Australia); Hamideh Bour (Rakuten Mobile Inc., Australia); David Soldani (Rakuten, Australia) |
The Kubernetes Network Driver Model: a Composable Architecture for High-Performance Networking Antonio Ojea (Google, Portugal) |
Intent-Based Kubernetes Configuration via LLMs: Current Trends and Open Challenges Alessio Sacco, Cristian Zilli and Guido Marchetto (Politecnico di Torino, Italy) |
AI-Based Resource Management for Network Slicing in Cloud-Native Mobile Networks Álvaro Vázquez-Rodríguez, Pablo García-Santaclara, Juan Pontón-Rodríguez, Bruno Fernández-Castro and Carlos Giraldo-Rodríguez (Gradiant, Spain) |
Special Track Papers: Large Language Models and Networking (LLMNet)
Agentic Generative AI for Automation of Cyber Security Attack Chains in Tactical MANETs Johannes Franz Loevenich (Thales Germany, Germany & University of Osnabrück, Germany); Roberto Rigolin F. Lopes (Thales, Germany) |
Can LLM-Embeddings Detect Phishing URLs? Sineefa Rauf, Munzir Muneer, Kajavahini Suseenthiran and Thilina Weerasinghe (University of Ruhuna, Sri Lanka); Fariza Rashid (The University of Sydney, Australia) |
LLM-Driven Causal Discovery for Monitoring Metrics in Computing Continuum Systems: a Comparative Study Ahmad Atwi (Université de Lorraine, CNRS, Inria, LORIA, France); Abdelkader Lahmadi (University of Lorraine, France) |
Multimodal LLMs for Zero-Shot Intrusion Detection Using NetFlow Visualisations Majed Luay (University of Queensland, Australia); Siamak Layeghy (The University of Queensland, Australia); Gayan Kincy Kulatilleke, Yash Pandey and Marius Portmann (University of Queensland, Australia) |
Pythia: Facilitating Access to Internet Data Using LLMs and IYP Dimitrios Giakatos and Malte Tashiro (IIJ Research Laboratory, Japan); Romain Fontugne (Internet Initiative Japan Inc., Japan) |
SIMCODE: a Benchmark for Natural Language to ns-3 Network Simulation Code Generation Tasnim Ahmed, Mizra Mohammad Azwad and Salimur Choudhury (Queen's University, Canada) |
Two-Sided Matching for Batch-Aware LLM Request Scheduling in Edge Networks Tan Li and Yanming Gong (The Hang Seng University of Hong Kong, Hong Kong) |
Special Track Papers: Maritime Communication and Security (MarCaS)
Continual Learning for Handling Maritime Data Shifts in Vessel Trajectory Prediction Isabella Marasco; Alessandro Cantelli-Forti; Michele Colajanni |
Designing a Maritime Cybersecurity Risk Intelligence Model with Generative AI and Real-Time Interviews Bilge Karabacak; Jake Michael Townsend; Ulku Clark; Kasey Miller |
Seeing is Believing – A Practical Study of Cyber Attacks on a Ship Navigation Bridge Frederik Basels; Philipp Sedlmeier; Elmar Padilla; Jan Bauer |
Threat Hunting and Security Analysis for Maritime Vessels Simon Yusuf Enoch; Hyunjae Kang; Huy Kang Kim; Dan Dongseong Kim |