DAY 1 – 13 April, 2019 | |
8:20 – 8:50 | Registration (注册) |
8:50 – 9:00 | Opening Ceremony (开幕式)
(Location: Comprehensive East Building, 114)(地点:综合业务东楼,114) |
9:00– 9:50 | Keynote Speech: Xiaohua Jia
Title: Privacy-Preserving Service Matching in Public Clouds |
9:50-10:40 | Keynote Speech: Jie Li
Title: Big Data and AI Impacts on Information Networking, Security, and Privacy |
10:40 – 11:00 | Coffee break (茶歇) |
11:00 – 11:50 | Keynote Speech: Xinpeng Zhang
Title: Signal Processing in Encrypted Domain |
12:00-13:00 | Lunch (午餐) |
13:20 – 15:00
(parallel sessions) |
SESSION 1
Privacy and Security Analysis (Location: College of computer science, 523)(地点:计算机楼,523) Session chair: Xianglin Wei 1. A Blind Signature Scheme Applying on Electronic Payment Scene based on Quantum Secret Sharing; Zhang, Jia-Lei; Hu, Ming-Sheng; Gong, Bei; Jia, Zhi-Juan; Wang, Li-Peng 2. Threshold Signature Scheme with Strong Forward Security Based on Chinese Remainder Theorem; Cheng, Yage; Jia, Zhijuan; Gong, Bei; Wang, Lipeng; Lei, Yanfang 3. Lightweight Secure Cloud Auditing Scheme for Shared Data Supporting Identity Privacy and Traceability; Tian, Junfeng; Jing, Xuan; Guo, Ruifang 4. Research on Big Data Platform Security Based on Cloud Computing; Niu, Xiaxia; Zhao, Yan 5. Database Query System with Budget Option for Differential Privacy against Repeated Attacks; Jia, Jingyu; Wu, Yuduo; Guo, Yue; Gao, Jiqiang; Peng, Jin; Ran, Peng; Li, Min; Liu, Zheli 6. Research on Social Networks Publishing Method under Differential Privacy; Wang, Han; Li, Shuyu 7. CROSS: Supervised Sharing of Private Data over Blockchains; Yin, Mingxin; Gao, Jiqiang; Guo, Xiaojie; Sun, Mengyao; Liu, Zheli; Zhang, Jianzhong; Wang, Jing 8. A Survey of Trusted Network Trust Evaluation Methods; Yin, Ansheng; Zhang, Shunyi 9. Anomaly Detection of Vehicle CAN Network based on Message Content; Chen, Pengyuan; Mo, Xiuliang; Wang, Jianing; Wang, Chundong 10. Android malware detection based on sensitive permissions and APIs; Zhao, Chunhui; Wang, Chundong; Zheng, Wenbai SESSION 2 Internet of Things and Cloud Computing (Location: College of computer science, 620) (地点:计算机楼,620) Session chair: Shaojing Fu 1. FIREWORK: Fog orchestration for secure IoT networks ; Vahabi, Maryam; Fotouhi, Hossein; Björkman, Mats; 2. An Effective Encryption Scheme on Outsourcing Data for Query on Cloud Platform; Tang, Jianchao; Fu, Shaojing; Xu, Ming 3. Design of an Urban Waterlogging Monitoring System based on Internet of Things; Liu, Jiachen; Bao, Yintu; Liu, Yingcong; Li, Wuyungerile 4. A Multi-Objective Service Selection Method Based on Ant Colony Optimization for QoE Restrictions in the Internet of Things; Zhang, Chuxuan; Jia, Bing; Hao, Lifei 5. FDSCD:Fast Deletion Scheme of Cloud Data; Shao, Tong; Tian, ChiYue; Li, Zhen; Jing, Xuan 6. A RBAC Model Based on Identity-Based Cryptosystem in Cloud Storage; Xu, Jian; Yu, Yanbo; Meng, Qingyu; Wu, Qiyu; Zhou, Fucai 7. Public Auditing of Log Integrity for Cloud Storage Systems via Blockchain; Wang, Jia; Peng, Fang; Tian, Hui; Chen, Wenqi; Lu, Jing 8. Coordinated Web Scan Detection Based on Hierarchical Correlation; Yang, Jing; Wang, Liming; Xu, Zhen; Wang, Jigang; Tian, Tian 9. Research on Multi Domain Based Access Control in Intelligent Connected Vehicle; Wang, kaiyu; Liu, nan; Xiu, Jiapeng; yang, zhengqiu SESSION 3 System Building (Location: College of computer science, 621) (地点:计算机楼,621) Session chair: Hao Peng 1. Cryptanalysis of a public key cryptosystem based on data complexity under quantum environment ; Jing, Zheng Jun; Gu, Chunsheng; Shi, Peizhong 2. A Design of the Group Decision Making Medical Diagnosis Expert System based on SED-JD Algorithm ; Zong, Na; Li, Wuyungerile; Li, Pengyu; Jia, Bing; Ma, Xuebin 3. Design and Implementation of a Lightweight Intrusion Detection and Prevention System; wei, xiaogang 4. Reliability Analysis of Coupled Cyber-Physical Systems under Different Network Types; Peng, Hao; Kan, Zhe; Zhao, Dandan; Han, Jianmin; Hu, Zhaolong 5. Invulnerability Assessment of Cyber-Physics Systems for Blockchain Environment; Peng, Hao; Kan, Zhe; Zhao, Dandan; Zheng, zhonglong 6. Intrusion Detection System for IoT Heterogeneous Perceptual Network Based on Game Theory; Zhou, Man; Han, Lansheng; Lu, Hongwei; Fu, Cai 7. A Blockchain-based Digital Advertising Media Promotion System ; Ding, Yong; Luo, Decun; Xiang, Hengkui; Tang, Chenjun; Liu, Lingang; Zou, Xiuqing; Li, Shijie; Wang, Yujue 8. Detecting Steganography in AMR Speech Based on Pulse Correlation; Liu, Jie; Tian, Hui; Liu, Xiaokang; Lu, Jing 9. State Consistency Checking for Non-Reentrant Function Based on Taint Assisted Symbol Execution; Yu, Bo; Yang, Qiang; Song, Congxi 10. SE Dots : A Sensitive and Extensible Framework for cross-region DDoS processing; Su, Li; Chen, Meiling; Peng, Jin; Ran, Peng |
15:00 – 15:20 | Coffee break(茶歇) |
15:20 – 17:20
|
SESSION 4
Privacy and Security Analysis (Location: College of computer science, 523)(地点:计算机楼,523) Session chair: Xianglin Wei 1. Security Assessment for Cascading Failures of Cyber-Physical Systems under Target attack Strategy ; Peng, Hao; Kan, Zhe; Zhao, Dandan; Han, Jianmin 2. Privacy Preservation in Publishing Electronic Health Records Based on Perturbation; Yao, Lin; Wang, Xinyu; Chen, Zhenyu; Wu, Guowei 3. Privacy in Location-Based Services: Present Facts and Future Paths; Sahnoune, Zakaria; Aïmeur, Esma 4. Privacy Disclosures Detection in Natural-Language Text Through Linguistically-motivated Artificial Neural Networks; Mehrpouyan, Hoda; Mehdy, Nuhil; Kenningto, Casey 5. Research on Information Security Test Evaluation Method Based on Intelligent Connected Vehicle; Zhang, Yanan; Han, Shengqiang; Zhong, Stevenyin; Shi, Peiji; Shao, Xuebin 6. Study on Incident Response System of Automotive Cybersecurity; Zhang, Yanan; Shi, Peiji; Liu, Yangyang; Han, Shengqiang; Mu, Baoying; Zheng, Jia 7. Secure Multi-keyword Fuzzy Search Supporting Logic Query over Encrypted Cloud Data; Zhang, Qi; Fu, Shaojing; Jia, Nan; Tang, Jianchao; Xu, Ming 8. A Practical Group Signatures for Providing Privacy-Preserving Authentication with Revocation; Yue, Xiaohan; Xu, Jian; Chen, Bing; He, Yuan 9. A privacy-preserving palmprint authentication scheme based on ElGamal; Ding, Yong; Wang, Huiyong; Gao, Zhiqiang; Wang, Yujue; Fan, Kefeng; Tang, Shijie 10. PJC: A multi-source method for identifying information dissemination in networks; Ding, Yong; Cui, Xiaoqing; Wang, Huiyong; Wang, Yujue 11. Steganalysis of Adaptive Multiple-rate Speech Using Parity of Pitch-delay Value; Liu, Xiaokang; Tian, Hui; Liu, Jie; Li, Xiang; Lu, Jing 12. Network risk assessment based on improved MulVAL framework and HMM; Wang, Chundong; Li, Kongbo; Tian, Yunkun; He, Xiaonan SESSION 5 Scheme, Model and Application for Data (Location: College of computer science, 620) (地点:计算机楼,620) Session chair: Shaojing Fu 1. A one-way variable threshold proxy re-signature scheme for mobile internet; Lei, Yanfang; Hu, Mingsheng; Gong, Bei; Wang, Lipeng; Cheng, Yage 2. A New Signcryption Scheme Based on Elliptic Curves; Cui, Wenjun; Jia, Zhijuan; Hu, Mingsheng; Gong, Bei; Wang, Lipeng 3. A robust reversible watermarking scheme for relational data; Hou, Ruitao; Xian, Hequn; Wang, Xiao; Li, Jing 4. BL-IDS:Detecting Web Attacks Using Bi-LSTM Model Based on Deep Learning; hao, saiyu; long, jun; yang, yingchuan 5. An Static Propositional Function Model to Detect Software Vulnerability; Han, Lansheng; Zhou, Man; Fu, Cai 6. Design of ZigBee-based Energy Harvesting Wireless Sensor Network and Modeling of Solar Energy; liu, yingcong; Li, Wuyungerile; Meng, Baoyintu; Jia, Bing 7. Application of Big Data Technology in JD; Shi, Ning; Liu, Huwei 8. A Trusted International Settlement Solution Based on Cross Check of CDRs; Ran, Peng; Su, Li 9. Fog-enabled Smart Campus: Architecture and Challenges; Tang, Chaogang; Xia, Shixiong; Liu, Chong; Wei, Xianglin; Bao, Yu; Chen, Wei 10. An Ant Colony Optimization Fuzzy Clustering Task Scheduling Algorithm in Mobile Edge Computing; Liu, Jianwei; Wei, Xianglin; Wang, Tongxiang; Wang, Junwei SESSION 6 Mechanism and Method in New Computing (Location: College of computer science, 621)(地点:计算机楼,621) Session chair: Hao Peng 1. A Posted Pricing Mechanism Based on Random Forests in Crowdsourcing Market; Hao, Lifei; Jia, Bing; Zhang, Chuxuan 2. A Reverse Auction Incentive Mechanism Based on the Participant’s Behavior in Crowdsensing; Zhou, Tao; Jia, Bing; Li, Wuyungerile 3. Identification and trust techniques compatible with eIDAS regulation; Mocanu, Stefan; Chiriac, Ana Maria; Popa, Cosmin; Dobrescu, Radu; Saru, Daniela 4. A General Hardware Trojan Technique Targeted on Lightweight Cryptography with Bit-serial Structure; Yang, Yijun; Wu, Liji; Yuan, Ye; Zhang, Xiangmin 5. Gathering Pattern Mining Method based on Trajectory Data Stream; Xia, Ying; Diao, Lian; Zhang, Xu; Bae, Hae-young 6. Travel Modes Recognition Method Based on Mobile Phone Signaling Data; Xia, Ying; Tang, Jie; Zhang, Xu; Bae, Hae-young 7. Two-level Feature Selection Method for Low Detection Rate Attacks in Intrusion Detection; Wang, Chundong; Ye, Xin; He, Xiaonan; Tian, Yunkun; Gong, Liangyi 8. A Novel Wireless Sensor Networks Malicious Node Detection Method; Yang, Hongyu; Zhang, Xugao; Cheng, Fang 9. Grid partition and agglomeration for bidirectional hierarchical clustering; wu, lei; chen, hechang; yu, xiangchun; yu, zhezhou; dou, ruiting; sun, chao 10. A non-repudiable dynamic provable data possession; Tian, FengJun; Guo, FangRui; Jing, Xuan 11. Zone based Lossy Image Compression using Discrete Wavelet and Discrete Cosine Transformations; Ahmad, Nafees; Iqbal, Khalid; Han, Lansheng; Iqbal, Naeem; Abid, Muhammad Adil |
18:00 – 20:00 | Gala Dinner(晚宴) |
DAY 2 – 14 April, 2019 | |
8:30 – 9:00 | Registration (注册) |
9:00 – 9:50 | Keynote Speech: Wenjing Lou
Title: Blockchain, Smart Contract, and Private Data Usage Control |
10:40 – 11:00 | Coffee break (茶歇) |
12:00 – 13:00 | Lunch (午餐) |