INVITED TALKS
Invited Speaker 1:
Ana Rosa Cavalli (Montimage/Institut Polytechnique de Paris/Telecom Sudparis)
Edgardo Montes de Oca (Montimage CEO)
Cybersecurity, Monitoring, Explainability and Resilience
Abstract:
We introduce a comprehensive study focused on prominent cyber resilience methods. Resilience is defined as a system's capacity to function despite attacks or breaches. Our aim is to highlight techniques that guarantee system security and performance, even in compromised conditions. While detecting intrusions and attacks is vital, there's a notable absence of methods addressing accountability and system robustness. By merging monitoring with explainability and resilience methods, we foster intrusion detection and create protective strategies. Our resilience model emphasizes self-repair and introspection, drawing inspiration from techniques like moving target defence. We provide real-world examples to demonstrate anomaly detection, explainability and system robustness, including the detection of autonomous vehicle communication anomalies, explainable AI techniques, and an electric vehicle charging scenario.
Biography:


Invited Speaker 2:
Xuyun Zhang (Macquarie University, Australia)
Recent Advances and Challenges in Membership Inference Attacks on Machine Learning
Abstract:
Recently, data privacy and machine learning model security have received increasing attention from both academia and industry given the wide deployment of machine learning models in many real-world applications and the strict data privacy and cyber security regulations and laws issued by many governments. Machine learning (ML) models have been widely applied to various applications, but recent studies have shown that ML models are vulnerable to membership inference attacks (MIAs). MIAs aim to infer whether a data record was used to train a target model or not, and can directly lead to a severe privacy breach. MIAs have been shown to be effective on various ML models and many defence methods have been proposed accordingly to mitigate MIAs. In this talk, we would briefly discuss the recent advances of MIAs and provide the taxonomies for both attacks and defences to inspire the researchers who wish to follow this area. Then, we present our recent relevant work about source inference attack and membership inference via backdooring.
Biography:

Invited Speaker 3:
Janick Edinger (Universität Hamburg, Germany)
A Middlware for Multimodal Mobile Device Interaction
Abstract:
Accessibility plays a central role in the use of mobile devices. Mobile applications and operating systems are designed for high-resolution, touch sensitive screens that are controlled with fine motor finger movements. For a large number of people, this type of interaction with mobile systems is not possible due to physical impairments. This presents a significant challenge for individuals, as their diverse constraints make it infeasible to devise a single universal alternative interface. For this reason, we take the approach of a middleware for multimodal interaction with mobile applications. Our developed middleware is engineered to seamlessly accommodate various input modalities while and to translate actions into commands for the respective application, thereby fostering a more inclusive and accessible mobile computing environment. In user studies, we evaluated its potential to enhance mobile device accessibility and improve the digital experience for users with diverse physical impairments.
Biography:

Invited Speaker 4:
Jaehoon Paul Jeong (Sungkyunkwan University, Korea)
CBSS: Cloud-Based Security System with Interface to Network Security Functions
Abstract:
This paper proposes a Cloud-Based Security System (CBSS) with Interface to Network Security Functions (I2NSF) as the framework and interfaces. It shows the feasibility of CBSS for flexible and efficient security services in cloud-based network environments such as 5G networks and Internet of Things (IoT) networks. The design and implementation of CBSS are explained along with information and data models of the I2NSF standard interfaces. The architecture of the I2NSF framework is augmented for Intent-Based Networking (IBN) for intelligent security services. Through experiment, it is shown that CBSS can handle various security attacks autonomously.
Biography:

Website: http://iotlab.skku.edu/people-jaehoon-jeong.php
Invited Speaker 5:
Aku Visuri (University of Oulu, Finland)
Wellbeing Insights in a Data-Driven Future
Abstract:
Our research explores the intersection of wearable technology and user-generated data, and obtaining meaningful insights. While wearables have become ubiquitous in monitoring health and well-being, the actual utility of the data they collect for end-users remains limited. Our TypeAware case study delves into users’ challenges in interpreting and deriving actionable insights from their wearable data. The TypeAware application aims to enhance user understanding of digital well-being and sleep quality data. Results indicate that, despite user engage- ment, participants encountered difficulties generating actionable insights from their data. Leveraging the capabilities of large language models, the research demonstrates the potential for automating insight generation, thereby transforming raw data into meaningful, user-friendly insights. Ultimately, this work calls for a shift in wearable technology design, advocating for more user-centric approaches that empower individuals to unlock the full potential of their wearable data for improved well-being.
Biography:
