Program
MONDAY May 22 | |
08:00 – 08:45 | Registration |
08:50 – 09:10 | NETYS Opening Session |
09:10 – 10:10 | Keynote Talk 1: Quantum Machine Learning – Prospects and Challenges.
Iordanis Kerenidis, University Paris Diderot, France (Chair: Ahmed Bouajjani) |
10:10 – 10:30 | Coffee Break |
10:30 – 12:00 | Session 1: Machine learning (Chair: Mohammed Amine Koulali) |
12:00 – 13:30 | Lunch |
13:30 – 14:30 | Keynote Talk 2: Verified Secure Routing
Peter Mueller, ETH Zurich, Switzerland (Chair: Thomas Wies) |
14:30 – 15:30 | Session 2: Formal Methods (Chair: Thomas Wies) |
15:30 – 16:00 | Coffee Break |
16:00 – 17:00 | Keynote Talk 3: Learning guaranteed representations of dynamical control systems from data Adnane Saoud, Mohammed VI Polytechnic Univesity, Morocco (Chair: Mohammed Erradi) |
TUESDAY May 23 | |
09:00 – 10:00 | Keynote Talk 4: Computer-Aided Cryptography with The Formosa Project
Gilles Barthe, Max Planck Institute for Security and Privacy, Germany (Chair: Thomas Wies) |
10:00 – 10:30 | Coffee Break |
10:30 – 12:00 | Session 3: Security & Privacy
(Chair: Yahya Benkaouz) |
12:00 – 13:30 | Lunch |
13:30 – 14:30 | Keynote Talk 5: Privacy-preserving Network Verification
Ruzica Piskac, Yale University, USA (Chair: Nikolaj Bjorner) |
14:30 – 15:00 | Session 4: Fault Tolerance (Chair: Youssef Iraqi) |
15:00 – 15:30 | Coffee Break |
15:30 – 16:30 | Keynote Talk 6: Similarity Search for Scalable Data Science: The Past, Present and Exciting Road Ahead
Karima Echihabi, Mohammed VI Polytechnic University, Morocco (Chair: Ahmed Bouajjani) |
20:00 | Gala Diner |
WEDNESDAY May 24 | |
09:00 – 10:00 | Keynote Talk 7: Deep Programmability: A New Lens on Networking
Nate Foster, Cornell University, USA (Chair: Lenore Zuck) |
10:00 – 10:30 | Coffee Break |
10:30 – 12:00 | Session 5: Distributed Systems (Chair: Adnane Saoud) |
12:00 – 13:30 | Lunch |
13:30 – 14:30 | Keynote Talk 8: Formal Methods at Microsoft
Nikolaj Bjorner, Microsoft Research, USA (Chair: Ruzica Piskac) |
14:30 – 15:00 | Closing Session |
Details:
- – Raed Alharbi, Tre R Jeter and My T Thai. Detection of Fake News Through Heterogeneous Graph Interactions.
- – Hicham Bellafkir, Markus Vogelbacher, Markus Mühling, Daniel Schneider, Nikolaus Korfhage and Bernd Freisleben. Distributed Active Learning for Bird Species Recognition
- – (Short Paper) Bilal Taghdouti, Mouad Bouharoun and Mohammed Erradi. A Peer-to-Peer Federated Graph Neural Network for Threat Intelligence.
- – Max von Hippel, Kenneth McMillan, Cristina Nita-Rotaru and Lenore Zuck. A Formal Analysis of Karn’s Algorithm.
- – Sidi Mohamed Beillahi, Constantin Enea and Ahmed Bouajjani. Comparing Causal Convergence Consistency Models.
- – Nia Achraf, Houssam Tarrouchi and Mohammed Erradi. Encrypted search is not enough to ensure privacy.
- – (Short Paper) Adnane Mzibri, Redouane Benaini and Mouad Ben Mamoun. Case Study on the Performance of Network Intrusion Detection Systems based on ML-based SDN.
- – (Short Paper) Narjisse Nejjari, Karim Zkik, Houda Benbrahim and Mounir Ghogho. Beyond Locks and Keys: Structural Equation Modeling based Framework to Explore Security Breaches through the Lens of Crime Theories
- – Joseph Oglio, Kendric Hood, Mikhail Nesterenko and Gokarna Sharma. Consensus on Unknown Torus with Dense Byzantine Faults.
Session 5: Distributed Systems
-
- – Saswata Jana and Partha Sarathi Mandal. Approximation Algorithms for Drone Delivery Scheduling Problem.
- – Adri Bhattachariya, Barun Gorain and Partha Sarathi Mandal. Pebble guided Treasure Hunt in Plane.
- – Tanvir Kaur and Kaushik Mondal. Distance-2-Dispersion: Dispersion with Further Constraints.
Dates
All deadlines are at 23:59 AoE
March 9, 2023 March 22, 2023
Abstract submission deadline
March 16, 2023 March 29, 2023
Paper submission deadline
April 27, 2023
Accept/Reject notification
May 11, 2023
Camera ready copy due
May 22-24, 2023
Conference