Eyes in the Sky: Extending the Connectivity and Sensing Performance of 6G Networks with Autonomous Robots

Room: 603, Bldg: McConnell Engineering, 3480 University, Montreal, Quebec, Canada, H3A 0E9

The Montreal Chapter of the IEEE Signal Processing Society, in collaboration with STARaCom, cordially invites you to attend the following talk to be given (in presence) at McGill University by Prof. David Gesbert, Director of EURECOM (Sophia Antipolis, France, (https://www.eurecom.fr).Speaker(s):" target="_blank" title="www.eurecom.fr)](https://www.eurecom.fr).Speaker(s):">www.eurecom.fr)](https://www.eurecom.fr).Speaker(s): Prof. David GesbertRoom: 603, Bldg: McConnell Engineering, 3480 University, Montreal, Quebec, Canada, H3A 0E9

Security and Privacy for Extended Reality Systems: Attacks and threat models

Virtual: https://events.vtools.ieee.org/m/485364

Free Registration (with a Zoom account; you can get one for free if you don't already have it. This requirement is to avoid Zoom bombing. Please sign in using the email address tied to your Zoom account — not necessarily the one you used to register for the <a href="http://event.):https://sjsu.zoom.us/meeting/register/vo5r9OqaSFuqKsuFcww7CgSynopsis:AR/VR" target="_blank" title="event.):https://sjsu.zoom.us/meeting/register/vo5r9OqaSFuqKsuFcww7CgSynopsis:AR/VR">event.):https://sjsu.zoom.us/meeting/register/vo5r9OqaSFuqKsuFcww7CgSynopsis:AR/VR devices promise a new era of immersive computing, where our everyday experience is augmented with helpful information (Augmented Reality), or where we are immersed in fully virtual worlds (Virtual Reality). These systems fuse the physical world and the virtual world through computing resources to provide these immersive experiences rendered on the user's headset. As a result, it allows new opportunities for attackers to compromise the security and privacy of users that are not well understood. Towards understanding the security and privacy challenges in these systems, this talk presents a number of recent attacks we developed on AR/VR systems. One threat model exploits the shared computing resources used by multiple applications on a headset to extract information through side channels; we show attacks that spy on user activity or compromise privacy. Another threat model exploits the shared state among multiple users in a multi-user application, allowing malicious users to inject compromised information or to recover information they are not allowed to access. Other threat models include those that interfere with applications and cause the virtual model to become out of sync with the physical world, causing user motion sickness or bypassing safety guardrails. I will conclude with a discussion of potential defenses and ways to build more secure AR/VR <a href="http://experiences.---------------------------------------------------------------By" target="_blank" title="experiences.---------------------------------------------------------------By">experiences.---------------------------------------------------------------By registering for this event, you agree that IEEE and the organizers are not liable to you for any loss, damage, injury, or any incidental, indirect, special, consequential, or economic loss or damage (including loss of opportunity, exemplary or punitive damages). The event will be recorded and will be made available for public <a href="http://viewing.Co-sponsored" target="_blank" title="viewing.Co-sponsored">viewing.Co-sponsored by: Vishnu S. Pendyala, SJSUSpeaker(s): Dr. Vishnu S. Pendyala, Prof. Nael Abu-Ghazaleh Virtual: https://events.vtools.ieee.org/m/485364

IEEE Toronto Virtual Golf Spring Social

The Sand Trap, 1306 King Street West, Toronto, Ontario, Canada

[]IEEE Toronto has reserved the venue for a private event. We'd love to connect with volunteers, members, and your family, friends, or coworkers for our 2025 spring social event. Your ticket will get you 2 drinks, snacks, and a chance to take some swings in the golf simulator. Tickets are limited and are heavily <a href="http://subsidized.The" target="_blank" title="subsidized.The">subsidized.The Sand Trap, 1306 King Street West, Toronto, Ontario, Canada

Workshop on Advances in Telecommunications Research (WATR)

Bldg: New Medical Building, 15 Arch Street, Kingston, Ontario, Canada, K7L 3L4

Date : June 16-18, 2025 -- Time 9:00 am - 2:30 pmVenue : Queen's UniversityScope : This workshop provides a dynamic platform for exchanging ideas, fostering collaborations, and shaping the future of telecommunications networks. This year’s theme focuses on interdisciplinary innovations shaping the next generation of telecommunications. Key discussions will explore how AI, quantum computing, and other emerging technologies are transforming the <a href="http://field.Format" target="_blank" title="field.Format">field.Format : WATR 2025 will follow a structured daily module format, ensuring a balanced mix of talks and <a href="http://discussions.Registration" target="_blank" title="discussions.Registration">discussions.Registration : A registration fee is set at $200 for faculty and researchers, and $100 for <a href="http://students.Organizing" target="_blank" title="students.Organizing">students.Organizing Committee :* Honorary Chair : Hossam Hassanein, Queen's University* Workshop Chair : Abd-Elhamid M. Taha, Alfaisal University and Queen's University* Program Cochairs : Ahmed Refaey Hussein, Guelph University and Ayman Radwan, IST - University of Lisbon* Local Arrangements Chair : Salimur Choudhury, Queen's UniversityBldg: New Medical Building, 15 Arch Street, Kingston, Ontario, Canada, K7L 3L4

Electrical Insulating Fluid Testing and Dissolved Gas Analysis of Oil Immersed Transformers

Room: Meeting Room 1, Bldg: Queen Elizabeth Park Community and Cultural Centre, 2302 Bridge Road, Oakville, Ontario, Canada, L6L 2G6

Presentation will break down to different topics which Insulating Fluid Quality tests are recommended and what they mean. It will also delve into Dissolved Gas Analysis and how we get the information needed and offer recommendations using analytical tools like Duval's Triangle and <a href="http://Pentagon.Speaker(s):" target="_blank" title="Pentagon.Speaker(s):">Pentagon.Speaker(s): Steven, Agenda: 7:00PM - Introduction of IEEE Hamilton Section7:15PM - Presentation8:00PM - Q&A8:15PM - RefreshmentsRoom: Meeting Room 1, Bldg: Queen Elizabeth Park Community and Cultural Centre, 2302 Bridge Road, Oakville, Ontario, Canada, L6L 2G6

Finding and Fixing Design Debt

Montreal, Quebec, Canada, Virtual: https://events.vtools.ieee.org/m/485820

In this talk I will discuss a common and pernicious form of technical debt--called design debt, or architecture debt. I will briefly present the theoretical foundation behind this form of debt and present a broad set of evidence demonstrating its dramatic effects on project outcomes. That is the bad news. The good news is that we can automatically pinpoint the causes and scope of such debt. I will describe how we can automatically locate it, measure it, and create the business case for removing it. Finally, I will explain how we can remove--pay down--this debt via refactoring. I will also sketch some of my experiences doing all of this in real-world projects, along with the <a href="http://outcomes.Co-sponsored" target="_blank" title="outcomes.Co-sponsored">outcomes.Co-sponsored by: IEEE Montreal SectionSpeaker(s): Rick KazmanAgenda: 20:00 Hours - START of Distinguished Lecture21:00 Hours - END of Distinguished Lecture21:00 Hours - Start of Q&A, Discussions, Thoughts, etcALL times are in EDT/EST formatMontreal, Quebec, Canada, Virtual: https://events.vtools.ieee.org/m/485820

IEEE Nuclear Presentation Series – Micro-Nuclear Energy: A National Strategic Technology Imperative to Secure Canada’s Arctic Sovereignty

Virtual: https://events.vtools.ieee.org/m/483802

The (https://vancouver.ieee.ca) and the IEEE Future Directions Committee are organizing a series of presentations to address the widespread interest in clean energy sources, new nuclear reactor technologies, and the various related issues. This series of talks will cover aspects of nuclear energy and the disruptive new technology of Small Modular Reactors. These presentations will be of interest both to engineers who are not nuclear specialists, and to the general public who are interested in learning about the <a href="http://technology.TOPIC:Micro-Nuclear" target="_blank" title="technology.TOPIC:Micro-Nuclear">technology.TOPIC:Micro-Nuclear Energy: A National Strategic Technology Imperative to Secure Canada’s Arctic SovereigntyDATE: June 18, 2025LOCATION: OnlinePRESENTER: Mr. Peter LangMr. Peter Lang will address the increasing threat to the sovereignty of Canada’s arctic borders, and examine the critical role that energy plays in implementing sovereignty enhancing measures. Micro-nuclear energy plants offer an enduring, zero-emissions energy solution to meet the unique energy requirements of our Arctic military and civilian communities for decades to <a href="http://come.This" target="_blank" title="come.This">come.This presentation is free. IEEE members and the general public are welcome to attend. Registration is <a href="http://required.This" target="_blank" title="required.This">required.This presentation series is organized by:- (<a href="https://ieee-sustech.org/2023/ieees-sustech-initiative/)-" target="_blank" title="https://ieee-sustech.org/2023/ieees-sustech-initiative/)-">https://ieee-sustech.org/2023/ieees-sustech-initiative/)- (<a href="https://vancouver.ieee.ca/physics)This" target="_blank" title="https://vancouver.ieee.ca/physics)This">https://vancouver.ieee.ca/physics)This presentation series is supported by:- (<a href="https://ieee-npss.org/)-" target="_blank" title="https://ieee-npss.org/)-">https://ieee-npss.org/)- (<a href="https://ieee-npss.org/)Co-sponsored" target="_blank" title="https://ieee-npss.org/)Co-sponsored">https://ieee-npss.org/)Co-sponsored by: IEEE Future Directions Committee, IEEE SusTech InitiativeSpeaker(s): Mr. Peter LangAgenda: The presentation will start at 9:00 AM Pacific Time (12:00 EDT, 16:00 UTC).09:00 Welcome and Speaker Introduction09:10 Presentation09:45 Questions and Answers10:00 Presentation endsNOTE If you have registered, you should receive the Zoom URL in a separate email, shortly before the presentation time. Please check your email spam <a href="http://folder.NOTE" target="_blank" title="folder.NOTE">folder.NOTE Please be sure to leave sufficient time to set up your web browser and / or remote meeting client prior to the start <a href="http://time.Virtual:" target="_blank" title="time.Virtual:">time.Virtual: https://events.vtools.ieee.org/m/483802

Robust and Resilient Cooperative Perception under V2X Communication Limitations

Room: 660, Bldg: ECS , University of Victoria, Victoria, British Columbia, Canada, V8P5C2

Abstract: Environmental perception is fundamental to safe and efficient autonomous driving. With Cooperative Perception (CP) enabled by V2X networks, connected vehicles can exchange perceptual information to see through blind zones and deal with long-tail scenarios. In this talk, we propose a robust, reliable, and resilient CP framework for connected autonomous driving under V2X Communication Limitations. First, for robustness to localization error and communication delay, a calibration-free two-stage CP paradigm is proposed using deep metric learning. This fusion method only requires image data and is adaptive to the transmission rate. Then, to guarantee high reliability, hard AoI constraints are considered in sensor scheduling of CP to guarantee the timeliness of perceptual information. The required channel resources are minimized in asynchronous status update settings. Next, to resiliently adapt to the dynamic traffic environment, we propose a learning-while-scheduling approach to trade off exploration and exploitation. An online sensor scheduling algorithm is designed based on restless MAB (Multi-Armed Bandit) theory to maximize the average CP gain with low scheduling overhead. Finally, a large-scale multi-view multi-modality dataset, called Dolphins, is presented to assist further researches and verification of CP <a href="http://systems.Room:" target="_blank" title="systems.Room:">systems.Room: 660, Bldg: ECS , University of Victoria, Victoria, British Columbia, Canada, V8P5C2

An electrocution in San Antonio out on the sidewalk.

Virtual: https://events.vtools.ieee.org/m/482904

Anatomy of an Accident:How Sloppy work and a Lack of Documentation Caused Massive Payouts!On Thursday morning, January 7, 1999, a woman walking to work died on the sidewalk in front of UTSA downtown. The cause was ruled as electrocution from an energized metal lid in the sidewalk. The resultant investigation revealed a lack of final inspection on the original work and many problems with subsequent work. Enough that San Antonio’s Central Power Supply (CPS) and others paid out a combined $6.4M. James Mercier, who was at that time an engineer for the Texas Department of Transportation, will present and discuss the various errors discovered from his investigation for TxDOT and in the court records. Long after the court case was settled, James may have figured out what really happened that day!Speaker(s): James, Agenda: - Introduction- Presentation by Mr. James MercierVirtual: https://events.vtools.ieee.org/m/482904

Security and Privacy for Extended Reality Systems: Attacks and threat models

Virtual: https://events.vtools.ieee.org/m/485331

AR/VR devices promise a new era of immersive computing, where our everyday experience is augmented with helpful information (Augmented Reality), or where we are immersed in fully virtual worlds (Virtual Reality). These systems fuse the physical world, and the virtual world, through computing resources to provide these immersive experiences rendered on the user's headset. As a result, it allows new opportunities for attackers to compromise the security and privacy of users that are not well understood. Towards understanding the security and privacy challenges in these systems, this talk presents a number of recent attacks we developed on AR/VR systems. One threat model exploits the shared computing resources used by multiple applications on a headset to extract information through side channels; we show attacks that spy on user activity or compromise privacy. Another threat model exploits the shared state among multiple users in a multi-user application, allowing malicious users to inject compromised information or to recover information they are not allowed to access. Other threat models include those that interfere with applications and cause the virtual model to become out of sync with the physical world, causing user motion sickness or bypassing safety guardrails. I will conclude with discussion of potential defenses and ways to build more security AR/VR <a href="http://experiences.Co-sponsored" target="_blank" title="experiences.Co-sponsored">experiences.Co-sponsored by: IEEE Montreal SectionSpeaker(s): Dr. Nael Abu-GhazalehAgenda: 20:00 Hours - START of Distinguished Lecture21:00 Hours - END of Distinguished Lecture21:00 Hours - Start of Q&A, Discussions, Thoughts, etcALL times are in EDT/EST formatVirtual: https://events.vtools.ieee.org/m/485331

Wireless Network Coverage Made Easy with WinProp

Virtual: https://events.vtools.ieee.org/m/483035

With the advent of smart products, we are surrounded by wireless devices communicating via different technologies, like Bluetooth, Wi-Fi, LTE, 5G, etc. When designing such products, it is important to test their performance inside different indoor and outdoor environments, for both coverage and interference. WinProp offers highly accurate and fast propagation models for almost every standard technology. This presentation will give an overview of WinProp capabilities for wireless network coverage analysis, with live <a href="http://demonstrations.Speaker(s):" target="_blank" title="demonstrations.Speaker(s):">demonstrations.Speaker(s): Gopinath Gampala , Dr. C.J. ReddyVirtual: https://events.vtools.ieee.org/m/483035

Generic LLMs in Cybersecurity

Virtual: https://events.vtools.ieee.org/m/486071

Generic Large Language Models (GLLMs) are continuously being released with increased size and capabilities, promoting the abilities of these tools as universal problem solvers. While the reliability of GLLMs' responses is questionable in many situations, these are augmented/ retrofitted with external resources for different applications including <a href="http://cybersecurity.The" target="_blank" title="cybersecurity.The">cybersecurity.The talk will discuss major security concerns of these pre-trained models: first GLLMs are prone to adversarial manipulation such as model poisoning, reverse engineering and side-channel cyberattacks. Second, the security issues related to LLM-generated codes using open-source libraries/codelets for software development can involve software supply chain attacks. These may result in information disclosure, access to restricted resources, privilege escalation, and complete system <a href="http://takeover.This" target="_blank" title="takeover.This">takeover.This talk will also cover the benefits and risks of using GLLMs in cybersecurity, particularly, in malware detection, log analysis, intrusion detection, etc. I will highlight the need for diverse AI approaches (non-LLM-based smaller models) trained with application-specific curated data, fine-tuned for well-tested security functionalities in identifying and mitigating emerging cyber threats including zero-day <a href="http://attacks.Speaker(s):" target="_blank" title="attacks.Speaker(s):">attacks.Speaker(s): Prof. Dipankar DasguptaAgenda: 20:00 Hours - START of Distinguished Lecture21:00 Hours - END of Distinguished Lecture21:00 Hours - Start of Q&A, Discussions, Thoughts, etcALL times are in EDT/EST formatVirtual: https://events.vtools.ieee.org/m/486071