IEEE Global Communications Conference
9-13 December 2019 // Waikoloa, HI, USA
Revolutionizing Communications

Program

FRIDAY, 13 DECEMBER 2019 (FULL DAY) 9:00 am - 5:30 pm
Room: Queen's 6
Session Chairs
: Xiaoyan Zhu (Xidian University, China); Jianfeng Ma (Xidian University, China); Shiwen Mao (Auburn University, USA)

Session 1: CPS and IoT Security
9:00 am – 10:30 am

Keynote Speech: TBD
Jian Ren (Michigan State University, USA)

  • Covert Wireless Data Collection Based on Unmanned Aerial Vehicles
    Xiaobo Zhou (Nanjing University of Science and Technology, P.R. China); Shihao Yan (Macquarie University, Australia); Feng Shu (Nanjing University of Science and Technology, P.R. China); Riqing Chen (Fujian Agriculture and Forestry University, P.R. China); Jun Li (Nanjing University of Science and Technology, P.R. China)
  • Lightweight Secure Communication Mechanism towards UAV Networks
    Teng Li, Jianfeng Ma and Xindi Ma (Xidian University, P.R. China); Chenyang Gao (Xidian Unibersity, P.R. China); He Wang, Chengyan Ma, Jing Yu, Di Lu and Jiawei Zhang (Xidian University, P.R. China)
  • Railway Key Exchange Scheme for Improving Communication Efficiency of RSSP-II Protocol
    Xinhong Hei, Wen Gao and Yichuan Wang (Xi'an University of Technology, P.R. China); Zhongdi Liang (Xi’an University of Technology, P.R. China); Wenjiang Ji (Xi'an University of Technology, P.R. China); Xianzhi Hu (Center of Network & Information Management, P.R. China)

Coffee Break: 10:30 am - 11:00 am

Session 2: Machine Learning Related Security and Privacy
11:00 am - 12:30 pm

  • PhishFry - A Proactive Approach to Classify Phishing Sites using SCIKIT Learn
    Daniel Brites and Mingkui Wei (Sam Houston State University, USA)
  • Detecting IoT Malicious Traffic based on Autoencoder and Convolutional Neural Network
    Ren-Hung Hwang (National Chung-Cheng University, Taiwan); Min-Chun Peng and Chien-Wei Huang (National Chung Cheng University, Taiwan)
  • Differentially Private Deep Learning for Load Forecasting on Smart Grid
    Elif Ustundag Soykan and Mehmet Akif Ersoy (Ericsson Research, Turkey); Zeki Bilgin (Researcher, Turkey); Emrah Tomur (Ericsson Research & Middle East Technical University, Turkey)
  • Quantum Machine Learning in the Refined Management of Smart Cities 
    Gege Guo, Ning Wang, Baonan Wang, Feng Hu and Chao Wang (Shanghai University, P.R. China)
  • On Fully Homomorphic Encryption for Privacy-Preserving Deep Learning
    Néstor J. Hernández Marcano, Mads Møller and Søren Hansen (Aarhus University, Denmark); Rune Hylsberg Jacobsen (Aarhus University & Electrical and Computer Engineering, Denmark)
  • Security Analysis of Wireless Train Control Systems
    Dongfeng Fang (California Polytechnic State University San Luis Obispo, USA); Shengjie Xu (Dakota State University, USA); Hamid Sharif (University of Nebraska-Lincoln, USA)

Lunch Break: 12:30 pm - 2:00 pm

Session 3: Lightweight Algorithms and Protocols for IoT Security
2:00 pm - 3:30 pm

  • Shifting Hash Table: An Efficient Hash Table with Delicate Summary
    Jie Jiang (Peking University, P.R. China); Yibo Yan (Peking University & School of Electronics and Computer Engineering (SECE), P.R. China); Mengyu Zhang (Peking University, P.R. China); Binchao Yin (Beijing University of Posts and Telecommunications, P.R. China); Yumeng Jiang, Tong Yang, XiaoMing Li and Tengjiao Wang (Peking University, P.R. China)
  • Leakage-resilient Certificateless Signcryption Scheme
    Qiliang Yang and Yanwei Zhou (Shaanxi Normal Universiy, P.R. China); Yong Yu (Shaanxi Normal University, P.R. China)
  • A Cooperative Spectrum Sensing Scheme in Malicious Cognitive Radio Networks
    Gao Rui, Zhenghua Zhang and Meixiang Zhang (Yangzhou University, P.R. China); Jing Yang (Yangzhou University & Southeast University, P.R. China); Peihan Qi (Xidian University, P.R. China)
  • Cooperate Delegation Computation for Rational Party using Zero-determinant Strategy
    Duo Zhang, Youliang Tian and Chaoyue Yue (Guizhou University, P.R. China)
  • Performance of Covert Surveillance in Jamming-Aided Eavesdropping System with Channel Uncertainty
    JiangBo Si (Xi'dian, P.R. China); Zihao Cheng, Lei Guan, Zan Li and Jia Shi (Xidian University, P.R. China)
  • Bootstrapping security configuration for IoT devices on networks with TLS inspection
    Victor Danilchenko, Daniel Cohen and Matthew Theobald (Schneider Electric, Inc., USA)

Coffee Break: 3:30 pm - 4:00 pm

Session 4: Poster Session
4:00 pm - 5:30 pm

  • 0-RTT Attack and Defense of QUIC Protocol
    Xudong Cao (University of Chinese Academy of Sciences & National Computer Network Intrusion Protection Center, P.R. China); Shangru Zhao (Xidian University, P.R. China); Zhang Yuqing (University of Chinese Academy of Sciences, P.R. China)
  • Secure Quantized Sequential Detection in the Internet of Things with Eavesdroppers
    Jiangfan Zhang (Missouri University of Science and Technology, USA)
  • A Community Detection Strategy in Opportunity Network
    ZiWen Liu and Jian Zhou (Hefei University of Technology, P.R. China); YanRan Zhou (GitHub Inc, USA)
  • Privacy Leakage Game of Differential Privacy
    Ningbo Wu and Changgen Peng (Guizhou University, P.R. China); Danchi Jiang (University of Tasmania, Australia)
  • Fine-grained Comparable Encryption Scheme in Multi-user Settings
    Jun Ye, Chunjie Cao and Zhen Guo (Hainan University, P.R. China)
  • An Efficient Key-Aggregate Keyword Searchable Encryption for Data Sharing in Cloud Storage
    Xuqi Wang (Qingdao University, P.R. China); Yu Xie (Tongji University, P.R. China); Xiangguo Cheng (Qingdao University, P.R. China); Zhengtao Jiang (Communication University of China, P.R. China)
  • Modular Vulnerability Indication for the IoT in IP-based Networks
    Rolf Egert (TU Darmstadt, Germany); Tim Grube (Technische Universitaet Darmstadt, Germany); Dustin Born (TU Darmstadt, Germany); Max Muehlhaeuser (Technical University Darmstadt, Germany)
  • MSPP: A Trajectory Privacy-Preserving Framework for Participatory Sensing based on multi-strategy
    Zhenqiang XU (Information Engineering University, P.R. China); Weidong Yang (Henan University of Technology, P.R. China); Jiayao Wang (Information Engineering University, P.R. China)
  • User identity authentication and identification based on multi-factor behavior features
    Xing Ding (Guizhou University & CETC Big Data Research Institute Co, Ltd., P.R. China); Changgen Peng, Hongfa Ding and Maoni Wang (Guizhou University, P.R. China); Qilin Mou and Hui Yang (CETC Big Data Research Institute Co, Ltd., P.R. China)
  • A provable secure server friendly two-party SM2 singing protocol for blockchain IoT
    Haibo Tian (Sun Yat Sen University, P.R. China); Yinxue Su (Sun Yat-Sen University, P.R. China); Zhenquan Liang (Shenzhen Digital Certificate Authority Center Co., Ltd, P.R. China)
 

Patrons

Exhibitors

Innovation Center Exhibitors

Partners and Supporters