BEGIN:VCALENDAR
VERSION:2.0
PRODID:IEEE vTools.Events//EN
CALSCALE:GREGORIAN
BEGIN:VTIMEZONE
TZID:Asia/Bangkok
BEGIN:DAYLIGHT
DTSTART:20380119T101407
TZOFFSETFROM:+0700
TZOFFSETTO:+0700
RRULE:FREQ=YEARLY;BYDAY=3TU;BYMONTH=1
TZNAME:+07
END:DAYLIGHT
BEGIN:STANDARD
DTSTART:19200401T001756
TZOFFSETFROM:+0642
TZOFFSETTO:+0700
RRULE:FREQ=YEARLY;BYDAY=1TH;BYMONTH=4
TZNAME:+07
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTAMP:20251129T190400Z
UID:6084C5C7-4670-4E31-8487-625EA6A80A61
DTSTART;TZID=Asia/Bangkok:20251124T080000
DTEND;TZID=Asia/Bangkok:20251126T190000
DESCRIPTION:AI-Enhanced DAO Security\n\nhttps://hakiri.github.io/AIDAOS25/\
 n\nco-located with MEDES 2025 in Ho chi minh\, Vietnam\, 24-26 November 20
 25\n\n- The rise of Decentralized Autonomous Organizations (DAOs) has revo
 lutionized the way digital communities and organizations collaborate\, all
 ocate resources\, and make decisions. Built on blockchain technology and p
 owered by smart contracts\, DAOs promise transparency\, decentralization\,
  and automation. However\, this promise comes with significant security ch
 allenges stemming from complex governance systems\, smart contract vulnera
 bilities\, and token economy manipulations\, as seen in high-profile incid
 ents like the 2016 DAO hack.\n\n- This workshop will explore how AI techno
 logies and model-driven design methodologies can be leveraged to address t
 hese challenges. AI techniques such as machine learning\, natural language
  processing (NLP)\, and reinforcement learning offer proactive solutions f
 or real-time anomaly detection\, predictive risk management\, and adaptive
  governance. These tools can identify governance vulnerabilities\, detect 
 unusual token flow patterns\, and optimize tokenomics to improve stakehold
 er engagement while preventing centralization. Through practical case stud
 ies\, participants will see how AI-driven methods enhance DAO resilience\,
  monitor system behavior\, and help mitigate governance failures.\n\n- Add
 itionally\, model-driven design principles provide a structured approach t
 o reducing vulnerabilities in DAO development. By systematically modeling 
 governance and organizational structures\, DAOs can achieve higher securit
 y and scalability\, ensuring that the design process aligns with best prac
 tices and reduces the risk of coding errors. The workshop will also addres
 s the ethical integration of AI to maintain user privacy\, ensure fairness
 \, and uphold the core principles of decentralization. Participants will g
 ain actionable insights into how combining AI\, model-driven design\, and 
 decentralized technologies can lead to the development of secure\, transpa
 rent\, and adaptive DAOs\, paving the way for more robust decentralized ec
 osystems.\n\nworkshop Topics\nSecurity &amp; Smart Contracts - Formal verifica
 tion and smart contract security - Threat detection in DAOs using AI - Att
 ack prevention and mitigation in decentralized governance  AI for DAO Opti
 mization &amp; Governance:&gt; - AI-driven governance models and voting mechanism
 s - Machine learning for fraud detection in DAOs - NLP for proposal analys
 is and decision-making Model-Driven Approaches for DAO Security: - Model-d
 riven design for secure DAO development - Structured DAO design methodolog
 ies - Enhancing scalability and resilience in DAOs - Token economy modelin
 g and risk assessment  Ethical &amp; Regulatory Considerations: - AI bias in d
 ecentralized decision-making - Privacy-preserving AI techniques for DAOs -
  Legal implications and compliance in AI-enhanced DAOs\n\nImportant Dates:
 \n\n- - Submission deadline: August 20\, 2025\n- - Acceptance notification
 : September 05\, 2025\n- - Camera-ready papers : September 25\, 2025\n- - 
 Workshop Date: November 24\, 2025\n\nGuidelines for Manuscripts\n\n- Submi
 ssions must be in an electronic form as PDF format and should be uploaded 
 using the conference website. The submitted paper should be at most 8-12 p
 rinted pages . Papers that fail to comply with length limit will be reject
 ed. Submissions will be peer-reviewed by at least 3 peer reviewers. After 
 the preliminary notification date\, authors rebut by evidence and argument
 s all reviewer inquiries and their comments. Based on the rebuttal feedbac
 k\, reviewers notify authors with the final decision. Selection criteria w
 ill include: relevance\, significance\, impact\, originality\, technical s
 oundness\, and quality of presentation. Preference will be given to submis
 sions that take strong or challenging positions on important emergent topi
 cs related to Digital Ecosystems. At least one author should attend the co
 nference to present the paper.\n- - Publication: The conference Proceeding
 s will be published and indexed by the [Communications in Computer and Inf
 ormation Science (Springer CCIS)](http://www.springer.com/series/7899) .\n
 - - Submission: All paper submissions for MEDES-2025 will be via [Easychai
 r](https://easychair.org/my/conference?conf=aidaos25) .\n\nOrganizers\n\n-
  - Alex Norta\, PhD. Tallinn University\, Estonia / Dymaxion OÜ\, Estonia
  / University of Pretoria\, South Africa\n-  - Akram Hakiri\, PhD.  Associ
 ate Professor of Computer Science. University of Pau &amp; Pays de l&#39;Adour\, F
 rance.\n- - Anne Laurent\, PhD.  Professor of Computer Science. University
  of Montpellier\, LIRMM\n\nTechnical Program Committee\n- Sellami Bassem\,
  Université de Perpignan Via Domitia\, France - Nedra Mellouli\, Pole Uni
 versitaire Léonardo De Vinci\, Research Center\, La Defense\, Paris\, Fra
 nce - Hella Kaffel Ben AyedUniversity of Tunis El Manar\, Tunisia - Amel M
 ammar\, Université de Versailles\, France - Sadok Ben Yahia\, University 
 of Southern Denmark\, Denmark - Claudio Schifanella\, University of Turin\
 , Italy - Tiziana Margaria\, Lero\, Ireland - Guido Boella\, Università d
 i Torino\, Italy - Dirk Draheim\, Software Competence Center Hagenberg. Fr
 eistadt\, Austria - Davor Svetinovic\, Khalifa University of Science and T
 echnology\, UAE - Adedoyin Hussain\, Near East University\, Nicosia\, Nort
 h Cyprus\, via Mersin 10\, Cyprus - Pradipkumar Sharma\, University of Abe
 rdeen\, UK - Diogo Mattos\, Universidade Federal Fluminense\, Brazil - Wol
 fgang Arendt\, Chalmers University of Technology\, Germany - Ibrahim Javed
 \, The University of British Columbia\, Canada\nWe acknowledge support fro
 m the following.\n\nhttps://blockchain.ieee.org/\n\nCo-sponsored by: MEDES
 &#39;2025 conference\n\nHo chi minh\, An Giang\, Vietnam
LOCATION:Ho chi minh\, An Giang\, Vietnam
ORGANIZER:alex.norta.phd@ieee.org
SEQUENCE:16
SUMMARY:Workshop: AI-Enhanced DAO Security (AIDAOS&#39;25)
URL;VALUE=URI:https://events.vtools.ieee.org/m/479718
X-ALT-DESC:Description: &lt;br /&gt;&lt;h3&gt;AI-Enhanced DAO Security&lt;/h3&gt;\n&lt;p&gt;https:/
 /hakiri.github.io/AIDAOS25/&lt;/p&gt;\n&lt;h5&gt;co-located with MEDES 2025 in Ho chi 
 minh\, Vietnam\, 24-26 November 2025&lt;/h5&gt;\n&lt;p&gt;&amp;nbsp\;&lt;/p&gt;\n&lt;ul&gt;\n&lt;li&gt;The r
 ise of Decentralized Autonomous Organizations (DAOs) has revolutionized th
 e way digital communities and organizations collaborate\, allocate resourc
 es\, and make decisions. Built on blockchain technology and powered by sma
 rt contracts\, DAOs promise transparency\, decentralization\, and automati
 on. However\, this promise comes with significant security challenges stem
 ming from complex governance systems\, smart contract vulnerabilities\, an
 d token economy manipulations\, as seen in high-profile incidents like the
  2016 DAO hack.&lt;/li&gt;\n&lt;/ul&gt;\n&lt;p&gt;&amp;nbsp\;&lt;/p&gt;\n&lt;p&gt;&amp;nbsp\;&lt;/p&gt;\n&lt;ul&gt;\n&lt;li&gt;Thi
 s workshop will explore how AI technologies and model-driven design method
 ologies can be leveraged to address these challenges. AI techniques such a
 s machine learning\, natural language processing (NLP)\, and reinforcement
  learning offer proactive solutions for real-time anomaly detection\, pred
 ictive risk management\, and adaptive governance. These tools can identify
  governance vulnerabilities\, detect unusual token flow patterns\, and opt
 imize tokenomics to improve stakeholder engagement while preventing centra
 lization. Through practical case studies\, participants will see how AI-dr
 iven methods enhance DAO resilience\, monitor system behavior\, and help m
 itigate governance failures.&lt;/li&gt;\n&lt;/ul&gt;\n&lt;p&gt;&amp;nbsp\;&lt;/p&gt;\n&lt;p&gt;&amp;nbsp\;&lt;/p&gt;\n
 &lt;ul&gt;\n&lt;li&gt;Additionally\, model-driven design principles provide a structur
 ed approach to reducing vulnerabilities in DAO development. By systematica
 lly modeling governance and organizational structures\, DAOs can achieve h
 igher security and scalability\, ensuring that the design process aligns w
 ith best practices and reduces the risk of coding errors. The workshop wil
 l also address the ethical integration of AI to maintain user privacy\, en
 sure fairness\, and uphold the core principles of decentralization. Partic
 ipants will gain actionable insights into how combining AI\, model-driven 
 design\, and decentralized technologies can lead to the development of sec
 ure\, transparent\, and adaptive DAOs\, paving the way for more robust dec
 entralized ecosystems.&lt;/li&gt;\n&lt;/ul&gt;\n&lt;p&gt;&amp;nbsp\;&lt;/p&gt;\n&lt;p&gt;&amp;nbsp\;&lt;/p&gt;\n&lt;h3&gt;wo
 rkshop Topics&lt;/h3&gt;\n&lt;dl&gt;\n&lt;dt&gt;&lt;strong&gt;Security &amp;amp\; Smart Contracts&lt;/str
 ong&gt;&lt;/dt&gt;\n&lt;dd&gt;- Formal verification and smart contract security&lt;/dd&gt;\n&lt;dt
 &gt;- Threat detection in DAOs using AI&lt;/dt&gt;\n&lt;dd&gt;- Attack prevention and mit
 igation in decentralized governance&lt;/dd&gt;\n&lt;dt&gt;&lt;strong&gt; AI for DAO Optimiza
 tion &amp;amp\; Governance:&lt;/strong&gt;&amp;gt\;&lt;/dt&gt;\n&lt;dd&gt;- AI-driven governance mod
 els and voting mechanisms&lt;/dd&gt;\n&lt;dd&gt;- Machine learning for fraud detection
  in DAOs&lt;/dd&gt;\n&lt;dd&gt;- NLP for proposal analysis and decision-making&lt;/dd&gt;\n&lt;
 dt&gt;&lt;strong&gt;Model-Driven Approaches for DAO Security:&lt;/strong&gt;&lt;/dt&gt;\n&lt;dd&gt;- 
 Model-driven design for secure DAO development&lt;/dd&gt;\n&lt;dd&gt;- Structured DAO 
 design methodologies&lt;/dd&gt;\n&lt;dd&gt;- Enhancing scalability and resilience in D
 AOs&lt;/dd&gt;\n&lt;dd&gt;- Token economy modeling and risk assessment&lt;/dd&gt;\n&lt;dt&gt;&lt;stro
 ng&gt; Ethical &amp;amp\; Regulatory Considerations:&lt;/strong&gt;&lt;/dt&gt;\n&lt;dd&gt;- AI bias
  in decentralized decision-making&lt;/dd&gt;\n&lt;dd&gt;- Privacy-preserving AI techni
 ques for DAOs&lt;/dd&gt;\n&lt;dd&gt;- Legal implications and compliance in AI-enhanced
  DAOs&lt;/dd&gt;\n&lt;/dl&gt;\n&lt;p&gt;&amp;nbsp\;&lt;/p&gt;\n&lt;h3&gt;Important Dates:&lt;/h3&gt;\n&lt;ul&gt;\n&lt;li&gt;- 
 Submission deadline: August 20\, 2025&lt;/li&gt;\n&lt;li&gt;- Acceptance notification:
  September 05\, 2025&lt;/li&gt;\n&lt;li&gt;- Camera-ready papers : September 25\, 2025
 &lt;/li&gt;\n&lt;li&gt;- Workshop Date: November 24\, 2025&lt;/li&gt;\n&lt;/ul&gt;\n&lt;h3&gt;Guidelines
  for Manuscripts&lt;/h3&gt;\n&lt;ul&gt;\n&lt;li&gt;Submissions must be in an electronic form
  as PDF format and should be uploaded using the conference website. The su
 bmitted paper should be at most &lt;strong&gt;8-12 printed pages&lt;/strong&gt; . Pape
 rs that fail to comply with length limit will be rejected. Submissions wil
 l be peer-reviewed by at least 3 peer reviewers. After the preliminary not
 ification date\, authors rebut by evidence and arguments all reviewer inqu
 iries and their comments. Based on the rebuttal feedback\, reviewers notif
 y authors with the final decision. Selection criteria will include: releva
 nce\, significance\, impact\, originality\, technical soundness\, and qual
 ity of presentation. Preference will be given to submissions that take str
 ong or challenging positions on important emergent topics related to Digit
 al Ecosystems. At least one author should attend the conference to present
  the paper.&lt;/li&gt;\n&lt;li&gt;- Publication: The conference Proceedings will be pu
 blished and indexed by the &lt;a href=&quot;http://www.springer.com/series/7899&quot; t
 arget=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;Communications in Computer and Information S
 cience (Springer CCIS) &lt;/a&gt; .&lt;/li&gt;\n&lt;li&gt;- Submission: All paper submission
 s for MEDES-2025 will be via &lt;a href=&quot;https://easychair.org/my/conference?
 conf=aidaos25&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;Easychair&lt;/a&gt; .&lt;/li&gt;\n&lt;/ul&gt;\
 n&lt;h3&gt;Organizers&lt;/h3&gt;\n&lt;p&gt;&amp;nbsp\;&lt;/p&gt;\n&lt;ul&gt;\n&lt;li&gt;&lt;strong&gt;- Alex Norta\, PhD
 .&lt;/strong&gt; Tallinn University\, Estonia / Dymaxion O&amp;Uuml\;\, Estonia / Un
 iversity of Pretoria\, South Africa&lt;/li&gt;\n&lt;li&gt;&lt;strong&gt; - Akram Hakiri\, Ph
 D. &lt;/strong&gt; Associate Professor of Computer Science. University of Pau &amp;a
 mp\; Pays de l&#39;Adour\, France.&lt;/li&gt;\n&lt;li&gt;&lt;strong&gt;- Anne Laurent\, PhD. &lt;/s
 trong&gt; Professor of Computer Science. University of Montpellier\, LIRMM&lt;/l
 i&gt;\n&lt;/ul&gt;\n&lt;p&gt;&amp;nbsp\;&lt;/p&gt;\n&lt;h3&gt;Technical Program Committee&lt;/h3&gt;\n&lt;dl&gt;\n&lt;dt
 &gt;- Sellami Bassem\, Universit&amp;eacute\; de Perpignan Via Domitia\, France&lt;/
 dt&gt;\n&lt;dt&gt;- Nedra Mellouli\, Pole Universitaire L&amp;eacute\;onardo De Vinci\,
  Research Center\, La Defense\, Paris\, France&lt;/dt&gt;\n&lt;dt&gt;- Hella Kaffel Be
 n AyedUniversity of Tunis El Manar\, Tunisia&lt;/dt&gt;\n&lt;dt&gt;- Amel Mammar\, Uni
 versit&amp;eacute\; de Versailles\, France&lt;/dt&gt;\n&lt;dt&gt;- Sadok Ben Yahia\, Unive
 rsity of Southern Denmark\, Denmark&lt;/dt&gt;\n&lt;dt&gt;- Claudio Schifanella\, Univ
 ersity of Turin\, Italy&lt;/dt&gt;\n&lt;dt&gt;- Tiziana Margaria\, Lero\, Ireland&lt;/dt&gt;
 \n&lt;dt&gt;- Guido Boella\, Universit&amp;agrave\; di Torino\, Italy&lt;/dt&gt;\n&lt;dt&gt;- Di
 rk Draheim\, Software Competence Center Hagenberg. Freistadt\, Austria&lt;/dt
 &gt;\n&lt;dt&gt;- Davor Svetinovic\, Khalifa University of Science and Technology\,
  UAE&lt;/dt&gt;\n&lt;dt&gt;- Adedoyin Hussain\, Near East University\, Nicosia\, North
  Cyprus\, via Mersin 10\, Cyprus&lt;/dt&gt;\n&lt;dt&gt;- Pradipkumar Sharma\, Universi
 ty of Aberdeen\, UK&lt;/dt&gt;\n&lt;dt&gt;- Diogo Mattos\, Universidade Federal Flumin
 ense\, Brazil&lt;/dt&gt;\n&lt;dt&gt;- Wolfgang Arendt\, Chalmers University of Technol
 ogy\, Germany&lt;/dt&gt;\n&lt;dt&gt;- Ibrahim Javed\, The University of British Columb
 ia\, Canada&lt;/dt&gt;\n&lt;/dl&gt;\n&lt;p&gt;We acknowledge support from the following.&lt;/p&gt;
 \n&lt;table border=&quot;0&quot; cellspacing=&quot;0&quot; cellpadding=&quot;0&quot; align=&quot;center&quot;&gt;\n&lt;tbod
 y&gt;\n&lt;tr&gt;\n&lt;td&gt;&lt;a href=&quot;https://blockchain.ieee.org/&quot; target=&quot;_blank&quot; rel=&quot;
 noopener&quot;&gt;&lt;img src=&quot;https://hakiri.github.io/AIDAOS25/assets/ieee-blockcha
 in_logo.png&quot; width=&quot;300&quot; border=&quot;0&quot;&gt;&lt;/a&gt;&lt;/td&gt;\n&lt;/tr&gt;\n&lt;/tbody&gt;\n&lt;/table&gt;
END:VEVENT
END:VCALENDAR

