IFIP NETWORKING 2025 Detailed Program
Monday, 26 May 2025
8:30 | Registration |
9:00 – 18:00 | Workshops (Detailed Program to be announced soon) |
18:30– 20:00 | Welcome Reception |
19:00 – 21:00 | Welcome Reception |
Tuesday, 27 May 2025
8:00 | Registration |
8:30 | Conference Opening |
9:00 – 10:45 |
Technical Session 1 Security and Privacy I |
TPOTI: A Triplet-Network-based Obfuscated Tor Traffic Identification, Menglei Li; Chao Wu; Wentian Zhao; Tian Song |
|
A Sybil Attack Traceability Detection Scheme Adapted to Vehicle Pseudonym Change Strategy, Ye Chen; Yingxu Lai |
|
Securing Software-Defined Tactical Networks: A Cyber Defense System, Sean Kloth; Paulo Henrique Rettore; Philipp Zissner; Bruno Pereira dos Santos; Peter Sevenich |
|
Squatspotting: Towards the Systematic Measurement of Typosquatting Techniques, Wei-Shiang Wung; Calvin Kranig; Eric Pauley; Paul Barford; Mark Crovella; Joel Sommers |
|
Technical Session 2 Web Protocols |
|
Forward Error Correction and Weighted Hierarchical Fair Multiplexing for HTTP/3 over QUIC, Kilian Holzinger; Daniel Petri; Stefan Lachnit; Marcel Kempf; Henning Stubbe; Sebastian Gallenmüller; Stephan M. Günther; Georg Carle |
|
Examining the Heterogeneous Throughput Performance Landscape of QUIC Implementations, Michael König; Sebastian Rust; Martina Zitterbart; Björn Scheuermann, |
|
VGPrio: Visually Guided HTTP/3 Prioritization, Constantin Sander; Ike Kunze; Dario Veltri; Klaus Wehrle, |
|
A First Look on Discovery of Designated Resolvers, Steffen Sassalla; Vasilis Ververis; Vaibhav Bajpai |
|
10:45 – 11:15 | Coffee Break |
11:15 – 13:00 |
Technical Session 3 Security and Privacy II |
Secure and Efficient Data Spaces over Named Data Networking, Yannis Thomas; Nikos Fotiou; Iakovos Pittaras; George Xylomenos |
|
An Embedded Covert Channel Construction using HLS Protocol, Dingming Liu; Tian Song; Wentian Zhao |
|
A Lightweight Authentication Protocol for Wide-Range Drone Communications, Wanting Li; Maode Ma; Lijun Gao |
|
Technical Session 4 Measurements and Modelling |
|
Unsteady Underwater - On the Constancy of Submarine Path Properties, Mia J Weaver; Paul Barford; Fabian E. Bustamante; Esteban Carisimo; Lynne Stokes; Weili Wu |
|
Argus Lens: Innovating Internet Measurement Infrastructure via Relay Services, Zhiquan Wang; Changqing An; Jilong Wang |
|
Breaking Through the Clouds: Performance Insights into Starlink's Latency and Packet Loss, Robert Alexander Uwe Richter; Vasilis Ververis; Vaibhav Bajpai |
|
Preserving Coreness while Reducing Connectivity in Network Graphs, Ahmad Zareie; Rizos Sakellariou |
|
10:45 – 11:15 | Lunch |
14:00– 15:45 |
Technical Session 5 Intrusion and Anomaly Detection |
PASD-5GC: A Process-Based Approach for Anomalous Signaling Detection in 5G Core Network, Cong Li; Yuhan Cao; Xingxing Liao, Sr; Zilong Wang; Wei You; Xinsheng Ji |
|
Interpretable Outlier and Anomaly Detection for Mobile Networks from Small Tabular Data, Juan Marcos Ramirez; Pablo Rojo; Vincenzo Mancuso; Antonio Fernández Anta |
|
Self-Supervised Transformer-based Contrastive Learning for Intrusion Detection Systems, Ippokratis Koukoulis; Ilias Syrigos; Thanasis Korakis |
|
DDoS Attack Detection using a combination of GNNs and Meta-Active Ensemble Learning, EL kamel Ali |
|
Technical Session 6 AI and ML for Networking |
|
Bandwidth-Aware Adaptive Gradient Quantization for Cross-Organization Federated Learning, Shu Liu; Hong Shen; Chan-Tong Lam; K. L. Eddie Law |
|
FORESIGHT: Joint Time and Space Scheduling for Efficient Distributed ML Training, Farid Zandi Shafagh; Manya Ghobadi; Yashar Ganjali |
|
Constraint-Aware Probabilistic Packet Forwarding Based on Deep Reinforcement Learning, Guocheng Lin; Yang Xiao; Jun Liu |
|
STAGS: A Graph-Sampling Approach for GNN-based Network Anomaly Detection, Saikat Dey; Mark K. Gardner; Jeff Lang; Wu-chun Feng |
|
15:45 – 16:15 | Coffee Break |
11:15 – 13:00 |
Panel Discussion “The use of LLMs and GenAI in networking operations, datacenters and cybersecurity” |
Wednesday, 28 May 2025
8:30 | Registration |
9:00 – 10:45 | Keynote - “Data-driven network resilience”, Fernando A. Kuipers, Professor at Delft University of Technology (TU Delft) |
10:45 – 11:15 | Coffee Break |
11:15 – 13:00 |
Technical Session 7 5G and Beyond Network management |
Deep Learning-Driven Two-Stage Distributed Resource Allocation in 6G Cell-Free Communication Systems, Iacovos Ioannou; Gussan Mufti; Christophoros Christophorou; Charalambos Klitis; Vasos Vassiliou; Christos Verikoukis |
|
BlocBin: SLA-Compliant and Efficient RAN Slicing in Next-Generation Networks, Juliana Olubukola Ojo; Guilherme Iecker Ricardo; Gentian Jakllari |
|
E-MATRO: An Adaptive and Energy-Efficient Framework for Slicing within the O-RAN Architecture, André Cédric Bessala; Guilherme Iecker Ricardo; Gentian Jakllari |
|
Geo-distributed and Dynamic Control Plane Management toward Green Mobile Networks, Masayuki Kurata; Akio Ikami; Masaki Suzuki |
|
Technical Session 8 Routing and Traffic Engineering |
|
TROPIC: Traffic-Engineering-Oriented Planning of IP Core Networks, Leon Richardt; Alexander Brundiers; Timmy Schüller; Nils Aschenbruck |
|
On the Resilience of Fast Failover Routing Against Dynamic Link Failures, Wenkai Dai; Klaus-Tycho Foerster; Stefan Schmid |
|
Non-Shortest Path Routing in Lossy Data Center Networks, Tal Mizrahi; Shahar Belkar; Oren Spector; Reuven Cohen |
|
Efficient Datacenter Load Balancing with Microslices, Hafiza Ramzah Rehman; Sana Mahmood; Syed Mohammad Irteza; Fahad Dogar; Ihsan Ayyub Qazi |
|
Tutorial Title: Wireless Powered Communications in the Era of 6G |
|
Poster Session Poster: Distributed Fog Computing for Real-Time Surveillance, Poster: Modular ML-Based IDS: Layered Attack Detection via Header & Payload Analysis, Poster: Group-aware Resource and Path Discovery for Collaborative Ultra-Low Latency Applications, Poster: Effectively Mimicking Datacenter Traffic Patterns Using Transformers, Poster: Privacy Preserving Integrated Sensing and Communication Architecture for 6G Networks, Poster: D-Band Line-of-Sight MIMO Link Demonstration, |
|
13:00 – 14:00 | Lunch |
Technical Session 9 Programmable Networks |
|
Detecting Stragglers in Programmable Data Plane, Riz Maulana; Habib Mostafaei; Nirvana Meratnia |
|
Detecting Manipulation to Table Rules in the Programmable Data Planes, Ranjitha K; Karuturi Havya Sree; Devansh Garg; Stavan Nilesh Christian; Dheekshitha Bheemanath; Rinku Shah; Praveen Tammana |
|
Hocarest: Host Cardinality Estimation On-Switch using Randomized Algorithm and TCAM, Timon Krack; Martina Zitterbart |
|
ReBARC: Recovery-Budget-Aware In-Network Retransmission Control in ICN, Kazuhisa Matsuzono; Hitoshi Asaeda |
|
Towards End-to-End Network Intent Management with Large Language Models, Lam Dinh; Sihem Cherrared; Xiaofeng Huang; Fabrice M. Guillemin |
|
Technical Session 10 Multicasting and Caching |
|
Min-Cost Multicast Streaming with Network Coding in Edge Computing Networks, Yeqiao Hou; Han Yang; Xianglong Li; Ling Deng; Liang Du; Zongpeng Li; Yining Li |
|
Multicast-partitioning in Time-triggered Stream Planning for Time-Sensitive Networks, Heiko Geppert; Frank Dürr; Simon Naß; Kurt Rothermel |
|
Selective Aggressive Caching in DNS Resolvers, Hadar Cochavi Gorelik; Gil Einziger |
|
Memory-efficient Online Caching Policies with Regret Guarantees, Xufeng Zhang; Sara Alouf; Giovanni Neglia |
|
Tutorial (Continuation) Title: Wireless Powered Communications in the Era of 6G |
|
IFIP TC6 Meeting | |
15:45 – 16:15 | Coffee Break |
16:15 – 18:00 | Social Program |
19:00 – 23:00 | Dinner and Awards Ceremony |
Thursday, 29 May 2025
8:30 | Registration |
9:00 – 10:45 | Keynote “Approximate Intermittent Computing”, Luca Mottola, Full Professor at Politecnico di Milano (Italy) and Senior Researcher at RI.SE Sweden |
10:45 – 11:15 | Coffee Break |
11:15 – 13:00 |
Technical Session 11 IoT Protocols and applications |
A Holistic 3D Deployment and Connectivity Framework for IoT-Enabled Environments, Andreas Andreou; Constandinos X. Mavromoustakis; George Mastorakis; Athina Bourdena; Evangelos K. Markakis |
|
LoRa++: Mixed Up-Down CSS Modulation for Enhanced Scalability and Data Rate in LPWANs, Shrutkirthi S. Godkhindi; Deeksha P Rao; R Venkatesha Prasad; T Venkata Prabhakar |
|
SAGE: Transmission Power Management for Deadline-aware, Multihop IoT Edge Networks, Shanti Chilukuri; Vinayaka Shashank Varanasi; Kalyana Chakravarthy C |
|
Measurement-Efficient Dynamics Change Detection in On-Off Models for Dynamic Spectrum Access, Simon Lindståhl; Alexandre Proutiere; Andreas Johnsson |
|
Technical Session 12 Congestion Control |
|
Insights into BBRv3's Performance and Behavior by Experimental Evaluation Roland Bless; Lukas Lihotzki; Martina Zitterbart |
|
BBR's Sharing Behavior with CUBIC and Reno Fatih Berkay Sarpkaya; Ashutosh Srivastava; Fraida Fund; Shivendra Panwar |
|
PVD-TD3: A Latency-Oriented Multi-Agent Reinforcement Learning Algorithm for Multipath Routing in DetNet Ying Yang; Yang Xiao; Jun Liu |
|
Demand-Aware Multi-Source IP-Multicast: Minimal Congestion via Link Weight Optimization Matthias Bentert; Max Franke; Darya Melnyk; Arash Pourdamghani; Stefan Schmid |
|
Reminis: A Simple and Efficient Congestion Control Scheme for 5G Networks and Beyond Parsa Pazhooheshy; Soheil Abbasloo; Yashar Ganjali |
|
IFIP TC6 Meeting | |
13:00 – 14:00 | Lunch |
14:00– 15:45 |
Technical Session 13 Fingerprinting and Localization |
Transferability of TCP/IP-based OS fingerprinting models, Matej Hulák; Václav Bartoš; Tomas Cejka |
|
Predicting Video QoE from Encrypted Traffic: Leveraging Video Fingerprinting and Providing System-Level Insights, Matej Hulák; Václav Bartoš; Tomas Cejka |
|
Zone-Fingerprinting: Unlocking the Power of Fingerprinting for Indoor Localization in 5G, Antonin Le Floch; Rahim Kacimi; Pierre Druart; Yoann Lefebvre; André-Luc Beylot |
|
Precise Positioning for Healthcare Robotics with Retroreflective Tags in 5G Small Cell Networks, Alireza Famili; Tolga O Atalay; Angelos Stavrou |
|
IFIP TC6 Meeting | |
15:45 – 16:15 | Conference Closing |