Workshops

Responsible Artificial Intelligence and Applications in Healthcare

by Prof. Ludovic Koehl, University of Lille, Graduate School MADIS-631 , ENSAIT  & GEMTEX, France

We now witness the rapid development and powerful application of Artificial Intelligence (AI) and Computational Technologies, leading to the fifth industrial revolution. Industry 5.0 will be characterized by the cooperation between machines and human beings, aiming to give added value to production, by creating personalized products that meet customers’ requirements. In the context of Industry 5.0, Responsible AI, the framework organizations follow to ensure AI technology is used in a transparent, accountable, and ethical way, has attracted Healthcare to accelerate efforts toward health systems being more resilient, sustainable, equitable, and person-centered.  This workshop is designed to enable a transparent and public conversation to articulate the policy framework of AI in healthcare, including the pros and cons of distinct regulatory regimes that reflect the distinct values of the societies they serve. 

Human-Centered AI for Trustworthy Robots and Autonomous Systems

by Prof. Hongmei (Mary) He, University of Salford, UK

Recent studies on information security solutions in the IoT

by Mehdi Gheisari, Islamic Azad University, Iran

Scope
IoT, Network, Smart City, Cyber security, system attacks, privacy-preservation, Information security, confidentiality

Topics

  1. Blockchain and distributed ledger technologies for identity management and access control in IoT systems.
  2. Machine learning and artificial intelligence approaches for anomaly detection, malware detection, and intrusion prevention.
  3. Privacy-enhancing technologies like homomorphic encryption, differential privacy, and anonymous credentials for securing IoT data.
  4. Hardware security solutions like trusted execution environments, secure element chips, and hardware-based root of trust.
  5. Secure software updates and code distribution for IoT devices.
  6. Network authentication and authorization techniques like three-factor authentication and attribute-based access control.
  7. Vulnerability analysis and risk assessment of common IoT protocols like Zigbee, Bluetooth, Z-Wave etc.
  8. Communication security solutions for different layers – application, transport, network and link layers.
  9. Standardization efforts around security frameworks, architectures and protocols by organizations like IETF, IEEE and ETSI.
  10. Case studies of recent IoT attacks and breaches, and lessons learned.
  11. Regulatory and compliance challenges for IoT security and privacy.
  12. Usability and deployment challenges of implementing security in resource constrained IoT environments.

Stay tuned, more info coming soon!