Keynote and Tutorials
 
🔸 Title: End-to-End IoT Security: Authentication, Vulnerability Exploration and Data Analysis
By Dr. Priyadarsi Nanda ,University of Technology, Sydney, Australia.
 
Dr.Priyadarsi Nanda
 

Dr. Priyadarsi Nanda is a Senior Lecturer at the University of Technology Sydney (UTS) with more than 27 years of experience specialising in research and development of Cybersecurity, IoT security, Internet Traffic Engineering, wireless sensor network security and many more related areas. His most significant work has been in the area of Intrusion detection and prevention systems (IDS/IPS) using image processing techniques, Sybil attack detection in IoT based applications, intelligent firewall design. In Cybersecurity research, he has published over 80 high quality refereed research papers including Transactions in Computers, Transactions in Parallel Processing and Distributed Systems (TPDS), Future Generations of Computer Systems (FGCS) as well as many ERA Tier A/A* conference articles. In 2017, his work in cyber security research has earned him and his team the prestigeous Oman research council's national award for best research.

 
 
🔸 Title: Kubernetes in Application Development: Foundations and Future Directions
By Dr.Subrota Kumar Mondal ,Macau University of Science and Technology,Macau.
 
Dr.Subrota Kumar Mondal
 

Dr. Subrota Kumar Mondal is an Assistant Professor in Faculty of Information Technology at Macau University of Science and Technology, Macau. He received his Ph.D. in Computer Science and Engineering fromThe Hong Kong University of Science and Technology (HKUST), Hong Kong in 2015. He was a post-doctoral research fellow in computer science with The Hong Kong Polytechnic University, Hong Kong, 2017 to 2018. His research interests include Cloud Computing, Networks and Distributed Systems, Automated Program Repair, NLP, Blockchain, Deep Learning, Information Security, Performance and Dependability Evaluation. He is also certified with CKA: Certified Kubernetes Administrator and CKAD: Certified Kubernetes Application Developer Issued by CNCF [Cloud Native Computing Foundation] .

 

Abstract: Today’s industry has gradually realized the importance of lifting efficiency and saving costs during an application's life-cycle. In particular, we see that most cloud-based applications and services often consist of hundreds of micro-services. However, the traditional monolithic pattern is no longer suitable for today’s development life-cycle. It is due to the difficulties of maintenance, scale, load balance, and many other factors associated with it. Consequently, people switch their focus on containerization - a lightweight virtualization technology. The saving grace is that it can use machine resources more efficiently than the virtual machine (VM). In VM, a guest OS must simulate on the host machine, whereas containerization enables applications to share a host OS. Furthermore, containerization facilitates users to create, delete, or deploy containers effortlessly. To manipulate and manage the multiple containers, the leading Cloud providers introduced the container orchestration platforms, such as Kubernetes. Hence, a rigorous study on Kubernetes from a developer’s perspective is conducted. Theoretical knowledge and experimental evaluation show that the developers may accommodate this novel approach to design software architecture and development more efficiently and effectively.

 
🔸 Title: Renting, Scaling and Offloading in Federated Systems: When and Why?
By Dr. Binayak Kar,National Taiwan University of Science and Technology,Taiwan.
 
Dr. Binayak Kar
 

Dr. BINAYAK KAR is an Assistant Professor of computer science and information engineering at National Taiwan University of Science and Technology (NTUST),Taiwan. He received his Ph.D. degree in computer science and information engineering from the National Central University (NCU), Taiwan in 2018. He was a post-doctoral research fellow in computer science with National Chiao Tung University (NCTU), Taiwan from 2018 to 2019. His research interests include network softwarization, cloud/edge/fog computing, and network security.

 

Abstract: Since the cloud servers are far away from the end-users or subscribers, it introduces high communication latency. Edge computing and fog computing become an essential entity in the 5G networks for providing computation resources close to the user equipment. However, they have their shortcomings in the form of capacity, capability, and coverage. The federation technique plays a crucial role in healing the gaps between the clouds, edges, and fogs. There are three different ways we can provide the service between the federated entities, i.e., renting, offloading, and scaling. In this talk, I will discuss various federated systems considering clouds, edges, and fogs and how the renting offloading, and scaling are applicable in different federated systems. The talk's primary focus will be on a federated system, out of these three methods; when will we choose which technique and why? I will discuss some research problems on this topic with the solution and results.

 
🔸 Title: Towards Resilient Programmable Networks
By Dr. Apoorv Shukla,Senior Networks Researcher in Cloud at Huawei Technologies, German Research Center, Munich.
 
Dr. Apoorv Shukla
 

Dr. Apoorv Shukla, currently a Senior networks researcher in Cloud at Huawei German Research Center defended his Ph.D. in Dec, 2019 from Technische Universität Berlin working on the verification and monitoring of programmable networks such as Software-defined networks (SDNs) and Programming Protocol-independent Packet Processors (P4) networks. He started as a research assistant at Technische Universität in September, 2014. In 2017, he obtained a Software Campus grant, funded by the German Federal Ministry of Education and Research (BMBF), to work on design and implementation of novel methodology in network verification and monitoring from January, 2018. He received his Master of Science in Information Technology from Hong Kong University of Science and Technology (HKUST) in 2014. Prior, he worked almost four years for Cisco systems via Tata Consultancy Services (TCS) from 2009 till 2013 as a developer for WAN protocols e.g., PPP, VPDN, MLP. He won several awards for excellence during his tenure in the industry and also received his CCNA certification.

Abstract: With the emergence of programmable networks, the networks are becoming increasingly flexible. The programmability of either the network control plane via Software-defined Networking (SDN) or the data plane via Programming Protocol-independent Packet Processors (P4) language provides useful abstractions for network management and orchestration. At the same time, it promotes the development of custom, in-house features. Unfortunately, complex bugs and vulnerabilities surface during runtime to pose unprecedented threats to network resilience. As a result, network outages or even security compromises may occur leading to losses in revenue. In this talk, I will sketch the vision of resilient networks that detect, localize, and repair the bugs related to consistency and security in an autonomous manner, disburdening network operators of their most cumbersome tasks. I will present my ongoing research by discussing two case studies ranging from a single switch to a network of switches: (1) For a single P4 switch, a self-repair system which efficiently identifies and patches bugs in a P4 program at runtime in an automated manner; (2) For SDNs and P4 networks, systems to swiftly detect and localize control-data plane inconsistency under diverse workloads respectively. To conclude, I will present some promising future research directions.

🔸 Title: Human skin detection : An unsupervised Machine learning way
By Dr. ABM Rezbaul Islam ,Sam Houston State University, USA.
 
 Dr. ABM Rezbaul Islam
 

Dr. ABM Rezbaul Islam is an Assistant Professor in Faculty of Computer Science at Sam Houston State University, USA. He received his Ph.D. in Computer Science from University of North Texas ,USA in 2019. He received his Master of Science (M.Sc.) in Computer Engineering from Ajou University, South Korea. Dr. Islam has a specific research interest in machine learning technique to combat real world problems.

Abstract: Researchers have been involved for decades in search of an efficient skin detection method. Yet current methods have not overcome the major limitations. To overcome these limitations, a clustering and region growing based skin detection method are proposed. These methods together with a significant insight result in a more effective algorithm. The insight concerns a capability to define dynamically the number of clusters in a collection of pixels organized as an image. In clustering for most problem domains, the number of clusters is fixed a priori and does not perform effectively over a wide variety of data contents. Therefore, in this research paper, a skin detection method has been proposed using the above findings and validated. This method assigns the number of clusters based on image properties and ultimately allows freedom from manual thresholding or other manual operations. The dynamic determination of clustering outcomes allows for greater automation of skin detection when dealing with uncertain real-world conditions.

🔸 Tutorial: Cloud Computing: 2020 and Beyond
By Dr. Sanjaya Kumar Panda, National Institute of Technology, Warangal, India.
 
Dr. Binayak Kar
 

Dr. Sanjaya Kumar Panda is working as an Assistant Professor in the Department of CSE at NIT Warangal, Telangana, India. He worked as an Assistant Professor and Head of the Department, CSE at IIITDM Kurnool, Andhra Pradesh, India and also worked as an Assistant Professor in the Department of IT at VSSUT, Burla, Odisha, India. He received Ph. D. degree from IIT (ISM) Dhanbad, Jharkhand, India, M. Tech. degree from NIT, Rourkela, Odisha, India and B. Tech. degree from VSSUT, Burla, Odisha, India in CSE. He received 19+ awards from IEEE, IE (I), ISTE, CSI and others, which includes two silver medal awards for the best graduate and best post-graduate in CSE, IEEE senior member and ACM distinguished speaker. He has published 100+ papers in reputed journals and conferences. He is a member of IEEE, IE(I), Life member of ISTE and Life member of CSI. His current research interests include cloud and fog computing, artificial intelligence and machine learning and Internet of things. He delivered 80+ invited talks, and chaired sessions in many national and international conferences. He acted as reviewers in many reputed journals of IEEE, ACM, Elsevier, Springer and Hindawi, and many reputed conferences. He also served as guest editor in many international journals.

Abstract
Public cloud computing has grown exponentially in the business and research community. It provides scalable services to external customers over the Internet. Many organizations are moving to the cloud for obtaining reasonable solutions to their problems in the cloud. It makes the shifting of technology from cloud-first to cloud-only. The main trends impacting cloud adoption are cost optimization, multi-cloud, cloud infrastructure as a service (IaaS) skills and distributed cloud, as stated by Gartner Inc. In this tutorial, the recent research problems in cloud computing will be discussed with their possible solutions. These problems include resource allocation, task scheduling, energy-efficient cloud computing, renewable energy-based cloud computing, vehicular cloud computing, security and privacy, and many more. Moreover, some advanced technologies in cloud computing, namely DevOps, docker and container, will be discussed and integration of cloud computing with artificial intelligence, machine learning, Internet of things, virtual reality, augmented reality and blockchain will also be highlighted.

 
🔸 Tutorial: Secured IoT Communication: Trends, Challenges, and Implementation
By Dr. Asis Kumar Tripathy, Vellore Institute of Technology, Vellore, India.
 
Dr. Asis Kumar Tripathy
 

Asis Kumar Tripathy (Senior Member, IEEE) received the Ph.D. degree from the National Institute of Technology, Rourkela, India, in 2016. He is currently an Associate Professor with the School of Information Technology and Engineering, Vellore Institute of Technology, Vellore, India. He has more than ten years of teaching experience. He has several publications in refereed journals, reputed conferences, and book chapters to his credit. His current research interests include wireless sensor networks, cloud computing, the Internet of Things, machine learning, deep learning, and advanced network technologies. He has served as a program committee member for several conferences of repute. He has also been involved in many professional and editorial activities.

Abstract
The significance of securing correspondences on the Internet of Things (IoT) cannot be overstated. This is particularly the situation in light of the expanding proliferation of IoT devices and instances, as well as the growing reliance on their usage. Meanwhile, there have recently been mounting worries over a wide array of vulnerabilities in IoT communications. The advent of the Internet of Things (IoT) crowded the internet like never before. The objective of this talk is to address security limitations in IoT devices that are “resource-constrained. Ever-increasing connectivity brought many network vulnerabilities and caused many Cyber-attacks. In this tutorial, the recent security research problems in IoT communication will be discussed with their possible solutions. The listeners of this talk could start research in “IoT simulation in IBM Cloud”.

 
🔸 Tutorial:Role of AI and Medical Imaging in Early Disease Detection
By Dr. Deepak Ranjan Nayak,Malaviya National Institute of Technology Jaipur, India.
 
Dr. D R Nayak

Dr. Deepak Ranjan Nayak is an Assistant Professor at Department of Computer Science and Engineering, Malaviya National Institute of Technology, Jaipur, India. Prior to this position, he was an Assistant Professor at the Department of Computer Engineering, S. V. National Institute of Technology, Surat, India. He worked as a Post-Doctoral Fellow at Indian Institute of Information Technology, Design and Manufacturing, Kancheepuram, Chennai. He received his Ph.D. degree in Computer Science and Engineering from National Institute of Technology Rourkela, India. He has published over forty articles in peer-reviewed journals and conferences of international repute. His current research interests include medical image analysis and classification, machine learning, deep learning, pattern recognition, and computer vision. His publications have around 700 citations, h index of 13, and i10 index of 17 (Google Scholar). One of his papers was included in “ESI Highly Cited Papers”. He has received International Travel Support from Department of Science & Technology (DST), Govt. of India in 2017. He has also received the Outstanding Reviewer Award by Computers and Electrical Engineering Journal, Elsevier for the year 2017. He serves as a reviewer of more than 40 peer-reviewed journals such as IEEE Transactions on Circuits and Systems for Video Technology, IEEE Journal of Biomedical and Health Informatics, IEEE/ACM Transactions on Computational Biology and Bioinformatics, Scientific Reports, IET Image Processing, IET Computer Vision, Computer Vision and Image Understanding, Pattern Recognition Letters, Computer Methods and Programs in Biomedicine, Biomedical Signal Processing and Control, etc. He has also served as Technical Program Co-chair and Committee Member of several conferences of international repute. He is a member of IEEE. He serves as an Editorial Board member of International Journal of Imaging Systems and Technology, Wiley and a Guest Editor of Mathematical Biosciences and Engineering journal.

Abstract
Artificial intelligence (AI) is a disruptive technology that involves the use of computerized algorithms to dissect complicated data. With the advancement in medical imaging, the amount of data generated are increasing rapidly. For example, data can be generated by multimodality image techniques, e.g., ranging from Computed Tomography (CT), Magnetic Resonance Imaging (MRI), Ultrasound, Single Photon Emission Computed Tomography (SPECT), and Positron Emission Tomography (PET), to Magnetic Particle Imaging, EE/MEG, Optical Microscopy and Tomography, etc. These imaging techniques have turned into an imperative tool for early detection and treatment of disease. The use of artificial intelligence (AI) in diagnostic medical imaging is undergoing extensive evaluation. The powerful AI technologies specifically deep learning algorithms have shown impressive accuracy and sensitivity in the identification of several diseases including brain tumor detection, skin cancer detection, COVID-19 infection detection, etc. The focus of this talk will be on medical image analysis using cutting-edge AI technologies for early detection of diseases, mainly brain and infectious disease. It will include segmentation and classification with an intention to provide improved diagnosis, prognosis, and treatment.

 
🔸 Tutorial: Thinking Reverse: Secrets of Software Reverse Engineering
By Dr. Santosh Kumar Sahu, Sr. Prog. Officer, Oil and Natural Gas Corporation Limited, India.
 
Dr. Santosh Kumar Sahu
 

Dr. Santosh Kumar Sahu is working as a programming officer in Oil and Natural Gas Corporation (ONGC) Limited, India. He is currently working in Geodata Processing and interpretation center (GEOPIC), a premium R&D institute of ONGC at Dehradun, Uttarakhand. He has five-year experience in research on Oil and Gas Industry and three experience in teaching. He has published many papers in reputed international and national journals and conferences. His research interests include Cyber Security, Data Mining, Reverse Engineering, and Digital Forensic.

Abstract
In this session, we will discuss reverse engineering techniques used to extract the knowledge or the design methodology of an executable code. It is often used in information gathering purposes viz missing knowledge, bugs, ideas, and design philosophy of a particular application. Reverse engineering is used to understand the mind of the developer, analysis, and change as per the requirements virtually using CPU and Human Mind. It is used by a variety of different people for diverse purposes. We will discuss several tools used in this process, practical demonstration of several reverse engineering examples related to information security. The objective of this session is to understand the reverse engineering principles applied to compromise the software and study the cracker's mind to protect our application during development.

 
Keynote
Tutorials and Workshops

Sanjaya Kumar Panda

National Institute of Technology, Warangal, India.


‪Asis Kumar Tripathy

Vellore Institute of Technology, Vellore, India.


Deepak Ranjan Nayak

Malaviya National Institute of Technology Jaipur, India.


Santosh Kumar Sahu

Oil and Natural Gas Corporation Ltd, India.

Conference Management
Venue
Bansuri Guru Auditorium
Institute of Technical Education and Research
(Faculty of Engineering and Technology)
Siksha ‘O’ Anusandhan (Deemed to be University)
Bhubaneswar, Odisha, India.


Publication Partners