Poster Session
Poster Format
Please prepare your posters in A0 paper size in portrait/landscape mode. You will need to bring a printed copy of your poster to the poster session. We will arrange for the necessary support system (poster stands, clips, etc.). Please ensure that your poster is visually appealing and well-designed. For instance, merely replicating the text of your abstract onto the poster is a bad idea. Instead, strive to maintain a continuous flow of ideas by using numbers, figures, diagrams, and graphs. Please visit this link to get an idea of the setup.
Poster prizes
The three best posters will be awarded certificates based on feedback from a panel of judges during the poster session. The awards will be presented at the conference banquet on Thursday, January 8th.
The Poster Session will be held on January 7th and 8th, 2026, from 1 PM to 4 PM IST at the hotel poolside. The participants will be provided with all the necessary materials to display the posters. All presenters are requested to report to the venue 30 minutes before the session to set up their posters.
Poster Presentation (7th Jan 2026, 1 - 4 PM)
- AHEAD-N2: Accelerating N2 Handovers in 5G and Beyond using Early Adaptive Decisions for Improved Availability and Resilience
- Real-Time Topology-Aware Log-Metric Correlation for LLM-based Root Cause Analysis in Distributed Systems
- RIS-Aided NOMA with Imperfect Phase Alignment: A Deep Learning-Based Design
- Indoor Dual-Band Experimental Evaluation of RIS-Aided Wireless Links at 5.2 GHz and 28 GHz under NLoS Conditions
- Event Sourcing with Kafka Streams: A Comprehensive Benchmark Against CRUD for Financial Workloads
- ChainSEAL: A Blockchain-based Secure and Adaptive Evidence Ledger
- PRET: Passive RADAR Engagement Trickery
- Deadline-Aware Adaptive Fuzzification for Task Offloading in Vehicle-to-Vehicle Networks
- A Secure UAV Integrated ULA Trajectory Model for Spoofing Attack Localization using Power Sectoring Technique
- FedAsyncM: A Hybrid Asynchronous Federated Learning Aggregation Algorithm
- Lightweight Mutual Authentication between IoT Devices using One-way Accumulator
- Fusing Bistatic Measurements for Simultaneous Communication and Tracking
- User-Space PQ Key Exchange in WireGuard Using ML-KEM-768
- Tag-to-tag Range Estimation for Passive Backscattering Tags
- Smart Hybrid Intelligence for Day-Ahead Energy Forecasting and Demand Response in Smart Grid
- Unsupervised Neural Network for Joint Optimization of RIS Phase Shift and Resource Allocation in mmWave Network
- Adaptive Threshold Learning for Robust First-Path Detection in UWB Ranging
- BUFD-Q: Boltzmann-Guided Q-Learning for Optimized 3D UAV Deployment in Flood-Affected Wireless Networks
- NL2SQL for Cybersecurity: Automating Osquery Threat Hunting via Natural Language Queries
- Efficient Utilization of the Communal Strength at the Edge of IoT
- SecQR Scan: A Secure Scanning Framework to Protect Against Malicious QR Codes
- ADaRES: Adaptive Data Reallocation and Epoch Scheduling in Federated Learning Under Network and Resource Constraints
- PQC Planner: Post-Quantum Cryptographic Migration Planner
- FedTID: A Taxonomy Aware Federated Intrusion Detection Framework for non-IID IoT Environment
- Are We There Yet? Insights from Delhi-NCR and Beyond Reveal Gaps in Readiness for V2X Based IoT Rollout in Emerging Markets
- Robust Automatic Modulation Classification in OTFS Using Isolation Forest Based Outlier Removal and CNN-LSTM
- Efficient Sound Classification Model using Raw Audio Waveforms in Resource Constrained Devices: Design, Implementation, and Evaluation
- Multi-Horizon Engine Fault Prediction Using Lightweight Deep Learning and Transformer Models
- Performance Analysis of Hybrid Switching NOMA System with ML-based Clustering Technique
Poster Presentation (8th Jan 2026, 1 - 4 PM)
- Beyond Melody: A Complex Network Framework for Cross-Cultural Music Plagiarism Analysis
- Secrecy Outage Probability Analysis for Optimal RIS Selection Scheme with Phase Errors
- Mirror-Based Optical RIS Aided NOMA Enabled VLC System
- PTP time synchronization method in networks with large packet delay jitter
- Deserialization Attacks in Federated Learning
- QoS-Driven User Offloading via IRS in UEC-6G Networks
- Sparse Channel Estimation for Next Generation Wireless Communication Systems Using GANs
- Evaluating Combinatorial Anti-Spoofing Strategies For IoT GNSS Receivers Under Dynamic Meaconing Attacks
- Robust Doppler-Resilient SOQPSK CFO Estimation for Aeronautical Telemetry
- Jammer-based Secure IRS-Aided Underwater Lightwave Communication System
- Joint User Association and Orientation Optimization based Reliability Aware OIRS VLC System
- Impact of Human Blockages on Link-Aggregated Hybrid THz/VLC Communication Systems
- Fast and Accurate Flow Priority Detection in Encrypted Networks using Reinforcement Learning
- Multi-Objective Edge Resource Optimization with D3QN-PER in Quantum-Classical IoT Edge Networks
- Clickbait Detection Using Contextual Embeddings and Deep Learning Techniques
- NIRVANA: Nature-Inspired Resilience for UAV Agents via Distributed CoordiNAtion
- AI-Driven Intent-based Layer 2 Time Scheduler
- Secure and Efficient Lightweight Authentication Mechanism for Constrained IoT Networks
- Hybrid Frequency-Selective Round Robin Scheduler for Next-Generation Wireless Systems
- Joint Recognition of RS Code with Interleaver Parameters using GFFT Technique
- An NS-3/mmWave-Based Simulation Framework for Real-Time Anomaly Detection in UAV-Assisted 6G Networks
- A Graphical User Interface Driven Method for Static and Dynamic Parameter Extraction of Solar Panels for Optical Communication
- CrypticRoute: Covert Data Transmission Ensuring Confidentiality and Integrity in Local Area Network
- AI-Driven Handover Optimization for High Speed Railways: A Data-Driven Approach
- A Survey of Security, Privacy, and Ethics of Large Language Models in Telecom
- Decentralized Multi-Drone Delivery System: Efficient Resource Utilization
- Learning Based Multi-UE Scheduling for NB-IoT
- Graph Neural Network-based framework for predicting top Betweenness Centrality Nodes across Unseen Graphs
- Static Multicast Route and Just-in-Time Any Source Multicast: A Hybrid Framework for Enterprise Networks
Camera-ready guidelines: https://www.comsnets.org/camera_ready.html
Accepted Posters
-
Static Multicast Route and Just-in-Time Any Source Multicast: A Hybrid Framework for Enterprise Networks
-
Are We There Yet? Insights from Delhi-NCR and Beyond Reveal Gaps in Readiness for V2X Based IoT Rollout in Emerging Markets
-
Tag-to-tag Range Estimation for Passive Backscattering Tags
-
A Graphical User Interface Driven Method for Static and Dynamic Parameter Extraction of Solar Panels for Optical Communication
-
Graph Neural Network-based framework for predicting top Betweenness Centrality Nodes across Unseen Graphs
-
Joint Recognition of RS Code with Interleaver Parameters using GFFT Technique
-
Hybrid Frequency-Selective Round Robin Scheduler for Next-Generation Wireless Systems
-
An NS-3/mmWave-Based Simulation Framework for Real-Time Anomaly Detection in UAV-Assisted 6G Networks
-
FedTID: A Taxonomy Aware Federated Intrusion Detection Framework for non-IID IoT Environment
-
PQC Planner: Post-Quantum Cryptographic Migration Planner
-
User-Space PQ Key Exchange in WireGuard Using ML-KEM-768
-
Secure and Efficient Lightweight Authentication Mechanism for Constrained IoT Networks
-
AI-Driven Intent-based Layer 2 Time Scheduler
-
NIRVANA: Nature-Inspired Resilience for UAV Agents via Distributed CoordiNAtion
-
ADaRES: Adaptive Data Reallocation and Epoch Scheduling in Federated Learning Under Network and Resource Constraints
-
Clickbait Detection Using Contextual Embeddings and Deep Learning Techniques
-
Multi-Objective Edge Resource Optimization with D3QN-PER in Quantum-Classical IoT Edge Networks
-
Fusing Bistatic Measurements for Simultaneous Communication and Tracking
-
Lightweight Mutual Authentication between IoT Devices using One-way Accumulator
-
FedAsyncM: A Hybrid Asynchronous Federated Learning Aggregation Algorithm
-
Fast and Accurate Flow Priority Detection in Encrypted Networks using Reinforcement Learning
-
SecQR Scan: A Secure Scanning Framework to Protect Against Malicious QR Codes
-
Impact of Human Blockages on Link-Aggregated Hybrid THz/VLC Communication Systems
-
Learning Based Multi-UE Scheduling for NB-IoT
-
CrypticRoute: Covert Data Transmission Ensuring Confidentiality and Integrity in Local Area Network
-
Efficient Utilization of the Communal Strength at the Edge of IoT
-
Decentralized Multi-Drone Delivery System: Efficient Resource Utilization
-
A Survey of Security, Privacy, and Ethics of Large Language Models in Telecom
-
AHEAD-N2: Accelerating N2 Handovers in 5G and Beyond using Early Adaptive Decisions for Improved Availability and Resilience
-
A Secure UAV Integrated ULA Trajectory Model for Spoofing Attack Localization using Power Sectoring Technique
-
Joint User Association and Orientation Optimization based Reliability Aware OIRS VLC System
-
Jammer-based Secure IRS-Aided Underwater Lightwave Communication System
-
Robust Doppler-Resilient SOQPSK CFO Estimation for Aeronautical Telemetry
-
NL2SQL for Cybersecurity: Automating Osquery Threat Hunting via Natural Language Queries
-
Evaluating Combinatorial Anti-Spoofing Strategies For IoT GNSS Receivers Under Dynamic Meaconing Attacks
-
AI-Driven Handover Optimization for High Speed Railways: A Data-Driven Approach
-
Sparse Channel Estimation for Next Generation Wireless Communication Systems Using GANs
-
Deadline-Aware Adaptive Fuzzification for Task Offloading in Vehicle-to-Vehicle Networks
-
PRET: Passive RADAR Engagement Trickery
-
QoS-Driven User Offloading via IRS in UEC-6G Networks
-
BUFD-Q: Boltzmann-Guided Q-Learning for Optimized 3D UAV Deployment in Flood-Affected Wireless Networks
-
Deserialization Attacks in Federated Learning
-
PTP time synchronization method in networks with large packet delay jitter
-
Mirror-Based Optical RIS Aided NOMA Enabled VLC System
-
ChainSEAL: A Blockchain-based Secure and Adaptive Evidence Ledger
-
Event Sourcing with Kafka Streams: A Comprehensive Benchmark Against CRUD for Financial Workloads
-
Secrecy Outage Probability Analysis for Optimal RIS Selection Scheme with Phase Errors
-
Beyond Melody: A Complex Network Framework for Cross-Cultural Music Plagiarism Analysis
-
Adaptive Threshold Learning for Robust First-Path Detection in UWB Ranging
-
Performance Analysis of Hybrid Switching NOMA System with ML-based Clustering Technique
-
Multi-Horizon Engine Fault Prediction Using Lightweight Deep Learning and Transformer Models
-
Indoor Dual-Band Experimental Evaluation of RIS-Aided Wireless Links at 5.2 GHz and 28 GHz under NLoS Conditions
-
Unsupervised Neural Network for Joint Optimization of RIS Phase Shift and Resource Allocation in mmWave Network
-
RIS-Aided NOMA with Imperfect Phase Alignment: A Deep Learning-Based Design
-
Real-Time Topology-Aware Log-Metric Correlation for LLM-based Root Cause Analysis in Distributed Systems
-
Efficient Sound Classification Model using Raw Audio Waveforms in Resource Constrained Devices: Design, Implementation, and Evaluation
-
Smart Hybrid Intelligence for Day-Ahead Energy Forecasting and Demand Response in Smart Grid
-
Robust Automatic Modulation Classification in OTFS Using Isolation Forest Based Outlier Removal and CNN-LSTM
The COMSNETS 2026 Poster Session is a forum to showcase preliminary/ongoing work in the area of computer networking and communications. COMSNETS, being the premier venue for networking research in India and abroad, attracts many researchers from academia and industry. Therefore, poster presenters will benefit from lively discussions and critical feedback on their work in progress. In addition, all submissions will get detailed reviews from renowned researchers in the poster reviewing committee.
COMSNETS takes a broad view of research in communication systems and networking. The topics of interest for the poster submissions aligned with the main conference theme include (but are not limited to) the following:
Accepted posters will be published in the conference proceedings.
National/International travel grants will be available for a selected number of poster authors to cover partial support for their travel. These grants will be awarded by a panel of judges. Please see the travel grant application page separately.
Best Poster Awards will be awarded based on the poster session presentations by a panel of judges.
Topics of Interest
- Emerging 6G technology advancements
- 5G and wireless broadband networks
- Technologies for 6-100 GHz spectrum
- Edge and fog computing/networking
- Studies on testbeds and large scale experimental platforms
- Long-range/Low-power wide-area wireless networking
- Connected unmanned aerial/terrestrial/underwater systems
- CubeSats / Satellite Networking
- Non-Terrestrial Networks
- WLAN, RFID and NFC
- Visible light communications
- Heterogeneous networks (HetNets)
- Cognitive radio & white-space networking
- Economics of networks
- Energy-efficient communications
- Cloud computing
- Enterprise, data center, & storage-area networks
- Internet architecture and protocols, Internet science & emergent behavior
- Mobility and location management
- Mobile sensing
- Traffic analysis and engineering
- Internet of Things (IoT)
- Caching & content delivery systems
- Information/Content centric networks (ICN)
- Large Language Models and Applications
- Network management and operations
- Network security and privacy
- Trusted computing
- Network science
- SDN/NFV and Network Programmability
- Internet Measurement and Modeling
- Networks for smarter energy & sustainability
- Vehicular Networks & Intelligent Transportation
- Smart Grid communications & networking
- Machine Learning and AI in Networking
- Big Data/IoT Analytics in Networking
- Blockchain and Distributed Ledger
What to Submit:
Poster submissions must be at least 3 pages and a maximum of 4 pages of technical contributions (including Tables and Figures) + 1 page for references. It should contain the motivation for the research problem, the solution approach, and analytical or empirical results, if any.The submission should be double blind and must use the same template as that of the main conference.
Submissions that do not adhere to the conference template will be rejected without review. All submissions must be in PDF format.
Where to Submit:
Posters and additional documents can be submitted through EDAS at https://edas.info/N34106.
Important Dates:
| Paper Submission deadline | |
| Notification of Acceptance | 5th December 2025, AoE |
| Camera-ready Submission | 15th December 2025, AoE |
Poster Co-Chairs
Dheryta Jaisinghani
University of Northern Iowa
USA
Shantanu Pal
Deakin University
Australia
Rohit Verma
Intel Labs
India
Technical Program Committee
- Akira Uchiyama, Osaka University
- Albert Levi, Sabancı University, Turkey
- Anh Nguyen, University of Montana
- Anurag Satpathy, Missouri University of Science and Technology (S&T), USA
- Argha Sen, IIT Kharagpur
- Arindam Khanda, Missouri University of Science and Technology (S&T), USA
- Arunkumar Sivapuram, SRM University-AP
- Basabdatta Palit, IIEST
- Debasree Das, University of Bamberg
- Dilip Kumar Dalei, DRDO
- Dulanga Weerakoo, Singapore-MIT Alliance for Research and Technology, Singapore
- Eirini Eleni Tsiropoulou, Arizona State University
- Inseok Hwang, Pohang University of Science and technology
- Meera Lakshmi, University of Technology Sydney
- Mridula Singh, CISPA, Germany
- Naveen Gupta, BITS Pilani Goa
- Pramit Biswas, Intel
- Punyashlok Dash, SRM University-AP
- Rohit Kumar, Delhi Technological University
- Roopa Vishwanathan, New Mexico State University, USA
- Shreya Ghosh, The Pennsylvania State University
- Sitaram Chamarty, TCS Research, India
- Snigdha Das, Ericsson Research
- Sougata Sen, BITS PIlani - Goa Campus
- Soumyajit Chatterjee, Brave
- Sourav Addya, NITK
- Sourav Kanti Addya, NIT Surathkal
- Sugandh Pargal, Fujitsu
- TRUONG Quang Hai, Singapore Management University
- Vaibhav Singh, Intel
- Vini Chaudhary, Mississippi State University