{"id":26,"date":"2023-11-02T01:49:14","date_gmt":"2023-11-02T01:49:14","guid":{"rendered":"https:\/\/www.anl.is.ritsumei.ac.jp\/annet2024\/?page_id=26"},"modified":"2024-05-06T02:31:23","modified_gmt":"2024-05-06T02:31:23","slug":"program","status":"publish","type":"page","link":"https:\/\/www.anl.is.ritsumei.ac.jp\/annet2024\/?page_id=26","title":{"rendered":"Program"},"content":{"rendered":"\n<div class=\"wp-block-cover alignfull is-light has-parallax\" style=\"min-height:100vh;aspect-ratio:unset;\"><span aria-hidden=\"true\" class=\"wp-block-cover__background has-background-dim-40 has-background-dim\" style=\"background-color:#000000\"><\/span><div class=\"wp-block-cover__image-background wp-image-142 has-parallax\" style=\"background-position:50% 50%;background-image:url(https:\/\/www.anl.is.ritsumei.ac.jp\/annet2024\/wp-content\/uploads\/2023\/11\/1.jpg)\"><\/div><div class=\"wp-block-cover__inner-container is-layout-flow wp-block-cover-is-layout-flow\">\n<h1 class=\"wp-block-heading alignwide has-white-color has-text-color\" style=\"font-size:clamp(27.894px, 1.743rem + ((1vw - 3.2px) * 2.285), 48px);line-height:1.2\">Program<\/h1>\n\n\n\n<div class=\"wp-block-columns alignwide is-layout-flex wp-container-core-columns-is-layout-f56f613f wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:60%\">\n<p class=\"has-text-color wp-block-paragraph\" style=\"color:#ffffff\"><\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\"><\/div>\n<\/div>\n<\/div><\/div>\n\n\n\n<p class=\"wp-block-paragraph\">Date: May 6th &#8211; 2024<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">All times are KST time.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Conference Room: TBD<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><strong><span style=\"text-decoration: underline;\">Keynote<\/span><\/strong><\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Chair: Noriaki Kamiyama, Ritsumeikan University<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Time: 9:00 &#8211; 10:00<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>AI and Data Analytics for Network Service Design and Resource Control\n<ul class=\"wp-block-list\">\n<li>Ved Kafle (National Institute of Information and Communications Technology, Japan)<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-default\"\/>\n\n\n\n<p class=\"wp-block-paragraph\"><strong><span style=\"text-decoration: underline;\">Short Paper Session 1: Network Operation and Analysis<\/span><\/strong><\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Time: 10:30 &#8211; 11:00<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Improvement of Segment Length Selection Method for DASH Considering Shared Bottleneck Links\n<ul class=\"wp-block-list\">\n<li>Sumiko Miyata&nbsp;(Shibaura Institute of Technology)<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li>Optimal Quadratic Control of Queues by Dynamic Service Rates\n<ul class=\"wp-block-list\">\n<li>Rub\u00e9n Milocco&nbsp;(Universidad Nacional del Comahue)<\/li>\n\n\n\n<li>Paul M\u00fchlethaler (INRIA)<\/li>\n\n\n\n<li>Selma Boumerdassi (CNAM)<\/li>\n\n\n\n<li>Eric Renault\u00a0(ESIEE Paris)<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li>Practical Anomaly Detection in Internet Services: An ISP centric approach\n<ul class=\"wp-block-list\">\n<li>Alex Huang Feng&nbsp;(INSA Lyon &#8211; CITI)<\/li>\n\n\n\n<li>Pierre Francois&nbsp;(INSA Lyon &#8211; CITI)<\/li>\n\n\n\n<li>Kensuke Fukuda&nbsp;(National Insutitute of Informatics)<\/li>\n\n\n\n<li>Wanting du&nbsp;(Swisscom)<\/li>\n\n\n\n<li>Thomas Graf&nbsp;(Swisscom)<\/li>\n\n\n\n<li>Paolo Lucente (pmacct)<\/li>\n\n\n\n<li>St\u00e9phane Fr\u00e9not&nbsp;(INSA Lyon &#8211; CITI)<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li>Packet Continuity DDoS Attack Detection for Open Fronthaul in ORAN System\n<ul class=\"wp-block-list\">\n<li>Jung-Erh Chang (National Taiwan University of Science and Technology)<\/li>\n\n\n\n<li>YI-CHEN CHIU&nbsp;(National Taiwan University of Science and Technology)<\/li>\n\n\n\n<li>Yi-Wei Ma (National Taiwan University of Science and Technology)<\/li>\n\n\n\n<li>Zhi-Xiang Li (National Taiwan University of Science and Technology)<\/li>\n\n\n\n<li>Chenglong Shao (Kyushu Institute of Technology)<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li>A Preliminary Study on the Aggregation of FIBs ICN Routers using Routing Strategy\n<ul class=\"wp-block-list\">\n<li>Ryo Nakamura&nbsp;(Fukuoka University)<\/li>\n\n\n\n<li>Noriaki Kamiyama&nbsp;(Ritsumeikan University)<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li>Analysis on a Performance and Fairness Tradeoff in Entanglement Routing for Quantum Networks\n<ul class=\"wp-block-list\">\n<li>Shu Ichinoseki&nbsp;(Osaka University)<\/li>\n\n\n\n<li>Yuki Koizumi&nbsp;(Osaka University)<\/li>\n\n\n\n<li>Junji Takemasa&nbsp;(Osaka University)<\/li>\n\n\n\n<li>Toru Hasegawa&nbsp;(Osaka University)<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-default\"\/>\n\n\n\n<p class=\"wp-block-paragraph\"><strong><span style=\"text-decoration: underline;\">Session 1: Security<\/span><\/strong><\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Time: 11:00 &#8211; 12:30<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Chair: Raouf Abozariba, Birmingham City University<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>IP Geolocation with Adversarial Probe Mitigation\n<ul class=\"wp-block-list\">\n<li>Andikan Otung&nbsp;(Fujitsu Laboratories of Europe)<\/li>\n\n\n\n<li>Kenji Hikichi&nbsp;(Fujitsu Limited)<\/li>\n\n\n\n<li>Yasuki Fujii (Fujitsu Limited)<\/li>\n\n\n\n<li>Motoyoshi Sekiya (Fujitsu Limited)<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li>Investigating Impact of DDoS Attack and CPA Targeting CDN Caches\n<ul class=\"wp-block-list\">\n<li>Jiaqi Liu&nbsp;(Ritsumeikan University)<\/li>\n\n\n\n<li>Noriaki Kamiyama&nbsp;(Ritsumeikan University)<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li>Optimum Worker Sampling in Crowdsensing with Multiple Areas\n<ul class=\"wp-block-list\">\n<li>Chihiro Matsuura (Ritsumeikan University)<\/li>\n\n\n\n<li>Noriaki Kamiyama&nbsp;(Ritsumeikan University)<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li>Comparing Two-stage Clustering Methods for Traffic Pattern Analysis in IoT Device Identification\n<ul class=\"wp-block-list\">\n<li>Mizuki Asano&nbsp;(Shibaura Institute of Technology)<\/li>\n\n\n\n<li>Takumi Miyoshi&nbsp;(Shibaura Institute of Technology)<\/li>\n\n\n\n<li>Taku Yamazaki&nbsp;(Shibaura Institute of Technology)<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-default\"\/>\n\n\n\n<p class=\"wp-block-paragraph\"><strong><span style=\"text-decoration: underline;\">Session 2: Network Operation and Analysis<\/span><\/strong><\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Time: 14:00 &#8211; 15:30<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Chair: Yuki Koizumi, Osaka University<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Discovery of Cloud Incidents through Streaming Consolidation of Events across Timeline and Topology Hierarchy\n<ul class=\"wp-block-list\">\n<li>Ashot Harutyunyan&nbsp;(Yerevan State University)<\/li>\n\n\n\n<li>Naira Grigoryan&nbsp;(VMWare)<\/li>\n\n\n\n<li>Artur Grigoryan&nbsp;(VMWare)<\/li>\n\n\n\n<li>Vahan Tadevosyan&nbsp;(VMWare)<\/li>\n\n\n\n<li>Nelson Baloian&nbsp;(Universidad de Chile)<\/li>\n\n\n\n<li>Arnak Poghosyan&nbsp;(IMRA)<\/li>\n\n\n\n<li>Tigran Bunarjyan&nbsp;(Technische Universit\u00e4t M\u00fcnchen)<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li>Radio Environment Maps through Spatial Interpolation: A Web-based Approach\n<ul class=\"wp-block-list\">\n<li>Md Abrar Jahin Almazi Bipon&nbsp;(Birmingham City University)<\/li>\n\n\n\n<li>Md Shantanu Islam&nbsp;(Birmingham City University)<\/li>\n\n\n\n<li>A. Taufiq Asyhari(Monash University)<\/li>\n\n\n\n<li>Adel Aneiba<\/li>\n\n\n\n<li>Raouf Abozariba&nbsp;(Birmingham City University, United Kingdom)<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li>Reconfiguration with Virtual Gate Control List for Deterministic Transmission in Time-Sensitive Networks\n<ul class=\"wp-block-list\">\n<li>Mengjie Guo&nbsp;(Beijing University of Posts and Telecommunications)<\/li>\n\n\n\n<li>Guochu Shou&nbsp;(Beijing University of Posts and Telecommunications)<\/li>\n\n\n\n<li>Yaqiong Liu&nbsp;(Beijing University of Posts and Telecommunications)<\/li>\n\n\n\n<li>Yihong Hu&nbsp;(University of Posts and Telecommunications)<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li>Microservices in Edge and Cloud Computing for Safety in Intelligent Transportation Systems\n<ul class=\"wp-block-list\">\n<li>Jo\u00e3o Oliveira (Universidade de Aveiro)<\/li>\n\n\n\n<li>Pedro Teixeira (Universidade de Aveiro)<\/li>\n\n\n\n<li>Pedro Rito&nbsp;(Instituto de Telecomunica\u00e7\u00f5es)<\/li>\n\n\n\n<li>Miguel Luis&nbsp;(Instituto de Telecomunica\u00e7\u00f5es)<\/li>\n\n\n\n<li>Susana Sargento&nbsp;(Universidade de Aveiro)<\/li>\n\n\n\n<li>Bruno Parreira&nbsp;(NOSTech)<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-default\"\/>\n\n\n\n<p class=\"wp-block-paragraph\"><strong><span style=\"text-decoration: underline;\">Short Paper Session 2: AI<\/span><\/strong><\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Time: 15:30 &#8211; 16:00<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Machine Learning-Based Estimation of the Number of Competing Flows at a Bottleneck Link\n<ul class=\"wp-block-list\">\n<li>Zeyou Xia&nbsp;(Tohoku University)<\/li>\n\n\n\n<li>Go Hasegawa&nbsp;(Tohoku University)<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li>A ML-Based Model for Evaluating the Power Consumption of Network Devices\n<ul class=\"wp-block-list\">\n<li>Chi-Sheng Hsu&nbsp;(Network Management Laboratory, Chunghwa Telecom Laboratories Co., Ltd.,)<\/li>\n\n\n\n<li>Yi-Cheng Chu<\/li>\n\n\n\n<li>Ya-Ping Huang(CHT)<\/li>\n\n\n\n<li>Huang Lung-Chin&nbsp;(Chunghwa Telecom Telecommuication Laboratories)<\/li>\n\n\n\n<li>Teng Che-Chun&nbsp;(Chunghwa Telecom Labs)<\/li>\n\n\n\n<li>Chin-Ping Chuang&nbsp;(CHT)<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li>One-Class Learning on Temporal Graphs for Attack Detection in Cyber-Physical Systems\n<ul class=\"wp-block-list\">\n<li>Robin Buchta&nbsp;(HSH)<\/li>\n\n\n\n<li>Tobias Fritz&nbsp;(Universit\u00e4t der Bundeswehr M\u00fcnchen)<\/li>\n\n\n\n<li>Carsten Kleiner&nbsp;(HSHANNOVER)<\/li>\n\n\n\n<li>Felix Heine&nbsp;(HSH)<\/li>\n\n\n\n<li>Gabi Dreo Rodosek&nbsp;(University of Federal Armed Forces, Munich)<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li>AI-Driven Traffic-Aware Dynamic TDD Configuration in B5G Networks\n<ul class=\"wp-block-list\">\n<li>Sanguk Jeong,&nbsp;dahyun mok&nbsp;(Sungkyunkwan University)<\/li>\n\n\n\n<li>Gyurin Byun&nbsp;(Sungkyunkwan University)<\/li>\n\n\n\n<li>Hyunseung Choo<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li>Federated Learning-Driven Edge AI for Enhanced Mobile Traffic Prediction\n<ul class=\"wp-block-list\">\n<li>Hyunsung Kim (Sungkyunkwan University)<\/li>\n\n\n\n<li>Yeji Choi (Sungkyunkwan University)<\/li>\n\n\n\n<li>Jeongjun Park (Sungkyunkwan University)<\/li>\n\n\n\n<li>Lusungu J. Mwasinga(Sungkyunkwan University)<\/li>\n\n\n\n<li>Hyunseung Choo (Sungkyunkwan University)<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li>Completion of Traffic Matrix by Tensor Nuclear Norm Minus Frobenius Norm Minimization and Time Slicing\n<ul class=\"wp-block-list\">\n<li>Takamichi Miyata&nbsp;(Chiba Institute of Technology)<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-default\"\/>\n\n\n\n<p class=\"wp-block-paragraph\"><strong><span style=\"text-decoration: underline;\">Session 3: AI<\/span><\/strong><\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Time: 16:00 &#8211; 17:30<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Chair: Taufiq Asyhari, Monash University<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Comparing Transfer Learning and Rollout for Policy Adaptation in a Changing Network Environment\n<ul class=\"wp-block-list\">\n<li>Forough Shahab Samani&nbsp;(KTH Royal Institute of Technology)<\/li>\n\n\n\n<li>Hannes Larsson&nbsp;(Ericsson Research)<\/li>\n\n\n\n<li>Simon Damberg&nbsp;(Ericsson Research)<\/li>\n\n\n\n<li>Andreas Johnsson&nbsp;(Ericsson Research)<\/li>\n\n\n\n<li>Rolf Stadler&nbsp;(KTH The Royal Institute of Technology)<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li>Real-Time Application Identification Method for Mobile Networks Using Machine Learning\n<ul class=\"wp-block-list\">\n<li>Tatsuhiro Ou&nbsp;(The University of Tokyo)<\/li>\n\n\n\n<li>Akihiro Nakao&nbsp;(The University of Tokyo)<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li>Towards a Transformer-Based Pre-trained Model for IoT Traffic Classification\n<ul class=\"wp-block-list\">\n<li>Bruna Bazaluk&nbsp;(USP)<\/li>\n\n\n\n<li>Mosab Hamdan&nbsp;(KFUPM)<\/li>\n\n\n\n<li>Mustafa Ghaleb&nbsp;(King Fahd University of Petroleum and Minerals)<\/li>\n\n\n\n<li>Mohammed Gismalla&nbsp;(KFUPM)<\/li>\n\n\n\n<li>Fl\u00e1vio Soares Corr\u00eaa da Silva&nbsp;(USP)<\/li>\n\n\n\n<li>Daniel Mac\u00eado Batista&nbsp;(University of S\u00e3o Paulo)<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li>Identifying IoT Devices: A Machine Learning Analysis Using Traffic Flow Metadata\n<ul class=\"wp-block-list\">\n<li>Jeffrey Adjei&nbsp;(Dalhousie University)<\/li>\n\n\n\n<li>Nur Zincir-Heywood&nbsp;(Dalhousie University)<\/li>\n\n\n\n<li>Biswajit Nandy&nbsp;(Carleton University)<\/li>\n\n\n\n<li>Nabil Seddigh&nbsp;(Solana Networks)<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Date: May 6th &#8211; 2024 All times are KST time. Conference Room: TBD Keynote Chair: Noriaki Kamiyama, Ritsu [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-26","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/www.anl.is.ritsumei.ac.jp\/annet2024\/index.php?rest_route=\/wp\/v2\/pages\/26","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.anl.is.ritsumei.ac.jp\/annet2024\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.anl.is.ritsumei.ac.jp\/annet2024\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.anl.is.ritsumei.ac.jp\/annet2024\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.anl.is.ritsumei.ac.jp\/annet2024\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=26"}],"version-history":[{"count":28,"href":"https:\/\/www.anl.is.ritsumei.ac.jp\/annet2024\/index.php?rest_route=\/wp\/v2\/pages\/26\/revisions"}],"predecessor-version":[{"id":196,"href":"https:\/\/www.anl.is.ritsumei.ac.jp\/annet2024\/index.php?rest_route=\/wp\/v2\/pages\/26\/revisions\/196"}],"wp:attachment":[{"href":"https:\/\/www.anl.is.ritsumei.ac.jp\/annet2024\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=26"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}