FRIDAY, 13 DECEMBER 2019 (FULL DAY) 9:00 am - 5:30 pm
Room: Queen's 6
Session Chairs: Xiaoyan Zhu (Xidian University, China); Jianfeng Ma (Xidian University, China); Shiwen Mao (Auburn University, USA)
Session 1: CPS and IoT Security
9:00 am – 10:30 am
Keynote Speech: TBD
Jian Ren (Michigan State University, USA)
- Covert Wireless Data Collection Based on Unmanned Aerial Vehicles
Xiaobo Zhou (Nanjing University of Science and Technology, P.R. China); Shihao Yan (Macquarie University, Australia); Feng Shu (Nanjing University of Science and Technology, P.R. China); Riqing Chen (Fujian Agriculture and Forestry University, P.R. China); Jun Li (Nanjing University of Science and Technology, P.R. China) - Lightweight Secure Communication Mechanism towards UAV Networks
Teng Li, Jianfeng Ma and Xindi Ma (Xidian University, P.R. China); Chenyang Gao (Xidian Unibersity, P.R. China); He Wang, Chengyan Ma, Jing Yu, Di Lu and Jiawei Zhang (Xidian University, P.R. China) - Railway Key Exchange Scheme for Improving Communication Efficiency of RSSP-II Protocol
Xinhong Hei, Wen Gao and Yichuan Wang (Xi'an University of Technology, P.R. China); Zhongdi Liang (Xi’an University of Technology, P.R. China); Wenjiang Ji (Xi'an University of Technology, P.R. China); Xianzhi Hu (Center of Network & Information Management, P.R. China)
Coffee Break: 10:30 am - 11:00 am
Session 2: Machine Learning Related Security and Privacy
11:00 am - 12:30 pm
- PhishFry - A Proactive Approach to Classify Phishing Sites using SCIKIT Learn
Daniel Brites and Mingkui Wei (Sam Houston State University, USA) - Detecting IoT Malicious Traffic based on Autoencoder and Convolutional Neural Network
Ren-Hung Hwang (National Chung-Cheng University, Taiwan); Min-Chun Peng and Chien-Wei Huang (National Chung Cheng University, Taiwan) - Differentially Private Deep Learning for Load Forecasting on Smart Grid
Elif Ustundag Soykan and Mehmet Akif Ersoy (Ericsson Research, Turkey); Zeki Bilgin (Researcher, Turkey); Emrah Tomur (Ericsson Research & Middle East Technical University, Turkey) - Quantum Machine Learning in the Refined Management of Smart Cities
Gege Guo, Ning Wang, Baonan Wang, Feng Hu and Chao Wang (Shanghai University, P.R. China) - On Fully Homomorphic Encryption for Privacy-Preserving Deep Learning
Néstor J. Hernández Marcano, Mads Møller and Søren Hansen (Aarhus University, Denmark); Rune Hylsberg Jacobsen (Aarhus University & Electrical and Computer Engineering, Denmark) - Security Analysis of Wireless Train Control Systems
Dongfeng Fang (California Polytechnic State University San Luis Obispo, USA); Shengjie Xu (Dakota State University, USA); Hamid Sharif (University of Nebraska-Lincoln, USA)
Lunch Break: 12:30 pm - 2:00 pm
Session 3: Lightweight Algorithms and Protocols for IoT Security
2:00 pm - 3:30 pm
- Shifting Hash Table: An Efficient Hash Table with Delicate Summary
Jie Jiang (Peking University, P.R. China); Yibo Yan (Peking University & School of Electronics and Computer Engineering (SECE), P.R. China); Mengyu Zhang (Peking University, P.R. China); Binchao Yin (Beijing University of Posts and Telecommunications, P.R. China); Yumeng Jiang, Tong Yang, XiaoMing Li and Tengjiao Wang (Peking University, P.R. China) - Leakage-resilient Certificateless Signcryption Scheme
Qiliang Yang and Yanwei Zhou (Shaanxi Normal Universiy, P.R. China); Yong Yu (Shaanxi Normal University, P.R. China) - A Cooperative Spectrum Sensing Scheme in Malicious Cognitive Radio Networks
Gao Rui, Zhenghua Zhang and Meixiang Zhang (Yangzhou University, P.R. China); Jing Yang (Yangzhou University & Southeast University, P.R. China); Peihan Qi (Xidian University, P.R. China) - Cooperate Delegation Computation for Rational Party using Zero-determinant Strategy
Duo Zhang, Youliang Tian and Chaoyue Yue (Guizhou University, P.R. China) - Performance of Covert Surveillance in Jamming-Aided Eavesdropping System with Channel Uncertainty
JiangBo Si (Xi'dian, P.R. China); Zihao Cheng, Lei Guan, Zan Li and Jia Shi (Xidian University, P.R. China) - Bootstrapping security configuration for IoT devices on networks with TLS inspection
Victor Danilchenko, Daniel Cohen and Matthew Theobald (Schneider Electric, Inc., USA)
Coffee Break: 3:30 pm - 4:00 pm
Session 4: Poster Session
4:00 pm - 5:30 pm
- 0-RTT Attack and Defense of QUIC Protocol
Xudong Cao (University of Chinese Academy of Sciences & National Computer Network Intrusion Protection Center, P.R. China); Shangru Zhao (Xidian University, P.R. China); Zhang Yuqing (University of Chinese Academy of Sciences, P.R. China) - Secure Quantized Sequential Detection in the Internet of Things with Eavesdroppers
Jiangfan Zhang (Missouri University of Science and Technology, USA) - A Community Detection Strategy in Opportunity Network
ZiWen Liu and Jian Zhou (Hefei University of Technology, P.R. China); YanRan Zhou (GitHub Inc, USA) - Privacy Leakage Game of Differential Privacy
Ningbo Wu and Changgen Peng (Guizhou University, P.R. China); Danchi Jiang (University of Tasmania, Australia) - Fine-grained Comparable Encryption Scheme in Multi-user Settings
Jun Ye, Chunjie Cao and Zhen Guo (Hainan University, P.R. China) - An Efficient Key-Aggregate Keyword Searchable Encryption for Data Sharing in Cloud Storage
Xuqi Wang (Qingdao University, P.R. China); Yu Xie (Tongji University, P.R. China); Xiangguo Cheng (Qingdao University, P.R. China); Zhengtao Jiang (Communication University of China, P.R. China) - Modular Vulnerability Indication for the IoT in IP-based Networks
Rolf Egert (TU Darmstadt, Germany); Tim Grube (Technische Universitaet Darmstadt, Germany); Dustin Born (TU Darmstadt, Germany); Max Muehlhaeuser (Technical University Darmstadt, Germany) - MSPP: A Trajectory Privacy-Preserving Framework for Participatory Sensing based on multi-strategy
Zhenqiang XU (Information Engineering University, P.R. China); Weidong Yang (Henan University of Technology, P.R. China); Jiayao Wang (Information Engineering University, P.R. China) - User identity authentication and identification based on multi-factor behavior features
Xing Ding (Guizhou University & CETC Big Data Research Institute Co, Ltd., P.R. China); Changgen Peng, Hongfa Ding and Maoni Wang (Guizhou University, P.R. China); Qilin Mou and Hui Yang (CETC Big Data Research Institute Co, Ltd., P.R. China) - A provable secure server friendly two-party SM2 singing protocol for blockchain IoT
Haibo Tian (Sun Yat Sen University, P.R. China); Yinxue Su (Sun Yat-Sen University, P.R. China); Zhenquan Liang (Shenzhen Digital Certificate Authority Center Co., Ltd, P.R. China)