EAI - Reinventing the governance and economy of research and innovation
The leading professional community for research career enhancement in the digital age

program

DAY 1 – 13 April, 2019
8:20 – 8:50 Registration (注册)
8:50 – 9:00 Opening Ceremony (开幕式)

(Location: Comprehensive East Building, 114)(地点:综合业务东楼,114

9:00– 9:50 Keynote Speech: Xiaohua Jia

Title: Privacy-Preserving Service Matching in Public Clouds

9:50-10:40 Keynote Speech: Jie Li

Title: Big Data and AI Impacts on Information Networking, Security, and Privacy

10:40 – 11:00 Coffee break (茶歇)
11:00 – 11:50 Keynote Speech: Xinpeng Zhang

Title: Signal Processing in Encrypted Domain

12:00-13:00 Lunch (午餐)
13:20 – 15:00

(parallel sessions)

SESSION 1

Privacy and Security Analysis

(Location: College of computer science, 523)(地点:计算机楼,523

Session chair: Xianglin Wei

1.        A Blind Signature Scheme Applying on Electronic Payment Scene based on Quantum Secret Sharing; Zhang, Jia-Lei; Hu, Ming-Sheng; Gong, Bei; Jia, Zhi-Juan; Wang, Li-Peng

2.        Threshold Signature Scheme with Strong Forward Security Based on Chinese Remainder Theorem; Cheng, Yage; Jia, Zhijuan; Gong, Bei; Wang, Lipeng; Lei, Yanfang

3.        Lightweight Secure Cloud Auditing Scheme for Shared Data Supporting Identity Privacy and Traceability; Tian, Junfeng; Jing, Xuan; Guo, Ruifang

4.        Research on Big Data Platform Security Based on Cloud Computing; Niu, Xiaxia; Zhao, Yan

5.        Database Query System with Budget Option for Differential Privacy against Repeated Attacks; Jia, Jingyu; Wu, Yuduo; Guo, Yue; Gao, Jiqiang; Peng, Jin; Ran, Peng; Li, Min; Liu, Zheli

6.        Research on Social Networks Publishing Method under Differential Privacy; Wang, Han; Li, Shuyu

7.        CROSS: Supervised Sharing of Private Data over Blockchains; Yin, Mingxin; Gao, Jiqiang; Guo, Xiaojie; Sun, Mengyao; Liu, Zheli; Zhang, Jianzhong; Wang, Jing

8.        A Survey of Trusted Network Trust Evaluation Methods; Yin, Ansheng; Zhang, Shunyi

9.        Anomaly Detection of Vehicle CAN Network based on Message Content; Chen, Pengyuan; Mo, Xiuliang; Wang, Jianing; Wang, Chundong

10.     Android malware detection based on sensitive permissions and APIs; Zhao, Chunhui; Wang, Chundong; Zheng, Wenbai

SESSION 2

Internet of Things and Cloud Computing

(Location: College of computer science, 620) (地点:计算机楼,620

Session chair: Shaojing Fu

1.          FIREWORK: Fog orchestration for secure IoT networks ; Vahabi, Maryam; Fotouhi, Hossein; Björkman, Mats;

2.          An Effective Encryption Scheme on Outsourcing Data for Query on Cloud Platform; Tang, Jianchao; Fu, Shaojing; Xu, Ming

3.          Design of an Urban Waterlogging Monitoring System based on Internet of Things; Liu, Jiachen; Bao, Yintu; Liu, Yingcong; Li, Wuyungerile

4.          A Multi-Objective Service Selection Method Based on Ant Colony Optimization for QoE Restrictions in the Internet of Things; Zhang, Chuxuan; Jia, Bing; Hao, Lifei

5.          FDSCD:Fast Deletion Scheme of Cloud Data; Shao, Tong; Tian, ChiYue; Li, Zhen; Jing, Xuan

6.          A RBAC Model Based on Identity-Based Cryptosystem in Cloud Storage; Xu, Jian; Yu, Yanbo; Meng, Qingyu; Wu, Qiyu; Zhou, Fucai

7.          Public Auditing of Log Integrity for Cloud Storage Systems via Blockchain; Wang, Jia; Peng, Fang; Tian, Hui; Chen, Wenqi; Lu, Jing

8.          Coordinated Web Scan Detection Based on Hierarchical Correlation; Yang, Jing; Wang, Liming; Xu, Zhen; Wang, Jigang; Tian, Tian

9.          Research on Multi Domain Based Access Control in Intelligent Connected Vehicle; Wang, kaiyu; Liu, nan; Xiu, Jiapeng; yang, zhengqiu

SESSION 3

System Building

(Location: College of computer science, 621) (地点:计算机楼,621

Session chair: Hao Peng

1.        Cryptanalysis of a public key cryptosystem based on data complexity under quantum environment ; Jing, Zheng Jun; Gu, Chunsheng; Shi, Peizhong

2.        A Design of the Group Decision Making Medical Diagnosis Expert System based on SED-JD Algorithm ; Zong, Na; Li, Wuyungerile; Li, Pengyu; Jia, Bing; Ma, Xuebin

3.        Design and Implementation of a Lightweight Intrusion Detection and Prevention System; wei, xiaogang

4.        Reliability Analysis of Coupled Cyber-Physical Systems under Different Network Types; Peng, Hao; Kan, Zhe; Zhao, Dandan; Han, Jianmin; Hu, Zhaolong

5.        Invulnerability Assessment of Cyber-Physics Systems for Blockchain Environment; Peng, Hao; Kan, Zhe; Zhao, Dandan; Zheng, zhonglong

6.        Intrusion Detection System for IoT Heterogeneous Perceptual Network Based on Game Theory; Zhou, Man; Han, Lansheng; Lu, Hongwei; Fu, Cai

7.        A Blockchain-based Digital Advertising Media Promotion System ; Ding, Yong; Luo, Decun; Xiang, Hengkui; Tang, Chenjun; Liu, Lingang; Zou, Xiuqing; Li, Shijie; Wang, Yujue

8.        Detecting Steganography in AMR Speech Based on Pulse Correlation; Liu, Jie; Tian, Hui; Liu, Xiaokang; Lu, Jing

9.        State Consistency Checking for Non-Reentrant Function Based on Taint Assisted Symbol Execution; Yu, Bo; Yang, Qiang; Song, Congxi

10.     SE Dots : A Sensitive and Extensible Framework for cross-region DDoS processing; Su, Li; Chen, Meiling; Peng, Jin; Ran, Peng

15:00 – 15:20 Coffee break(茶歇)
15:20 – 17:20

 

SESSION 4

Privacy and Security Analysis

(Location: College of computer science, 523)(地点:计算机楼,523

Session chair: Xianglin Wei

1.        Security Assessment for Cascading Failures of Cyber-Physical Systems under Target attack Strategy ; Peng, Hao; Kan, Zhe; Zhao, Dandan; Han, Jianmin

2.        Privacy Preservation in Publishing Electronic Health Records Based on Perturbation; Yao, Lin; Wang, Xinyu; Chen, Zhenyu; Wu, Guowei

3.        Privacy in Location-Based Services: Present Facts and Future Paths; Sahnoune, Zakaria; Aïmeur, Esma

4.        Privacy Disclosures Detection in Natural-Language Text Through Linguistically-motivated Artificial Neural Networks; Mehrpouyan, Hoda; Mehdy, Nuhil; Kenningto, Casey

5.        Research on Information Security Test Evaluation Method Based on Intelligent Connected Vehicle; Zhang, Yanan; Han, Shengqiang; Zhong, Stevenyin; Shi, Peiji; Shao, Xuebin

6.        Study on Incident Response System of Automotive Cybersecurity; Zhang, Yanan; Shi, Peiji; Liu, Yangyang; Han, Shengqiang; Mu, Baoying; Zheng, Jia

7.        Secure Multi-keyword Fuzzy Search Supporting Logic Query over Encrypted Cloud Data; Zhang, Qi; Fu, Shaojing; Jia, Nan; Tang, Jianchao; Xu, Ming

8.        A Practical Group Signatures for Providing Privacy-Preserving Authentication with Revocation; Yue, Xiaohan; Xu, Jian; Chen, Bing; He, Yuan

9.        A privacy-preserving palmprint authentication scheme based on ElGamal; Ding, Yong; Wang, Huiyong; Gao, Zhiqiang; Wang, Yujue; Fan, Kefeng; Tang, Shijie

10.     PJC: A multi-source method for identifying information dissemination in networks; Ding, Yong; Cui, Xiaoqing; Wang, Huiyong; Wang, Yujue

11.     Steganalysis of Adaptive Multiple-rate Speech Using Parity of Pitch-delay Value; Liu, Xiaokang; Tian, Hui; Liu, Jie; Li, Xiang; Lu, Jing

12.     Network risk assessment based on improved MulVAL framework and HMM; Wang, Chundong; Li, Kongbo; Tian, Yunkun; He, Xiaonan

SESSION 5

Scheme, Model and Application for Data

(Location: College of computer science, 620) (地点:计算机楼,620

Session chair: Shaojing Fu

1.        A one-way variable threshold proxy re-signature scheme for mobile internet; Lei, Yanfang; Hu, Mingsheng; Gong, Bei; Wang, Lipeng; Cheng, Yage

2.        A New Signcryption Scheme Based on Elliptic Curves; Cui, Wenjun; Jia, Zhijuan; Hu, Mingsheng; Gong, Bei; Wang, Lipeng

3.        A robust reversible watermarking scheme for relational data; Hou, Ruitao; Xian, Hequn; Wang, Xiao; Li, Jing

4.        BL-IDS:Detecting Web Attacks Using Bi-LSTM Model Based on Deep Learning; hao, saiyu; long, jun; yang, yingchuan

5.        An Static Propositional Function Model to Detect Software Vulnerability; Han, Lansheng; Zhou, Man; Fu, Cai

6.        Design of ZigBee-based Energy Harvesting Wireless Sensor Network and Modeling of Solar Energy; liu, yingcong; Li, Wuyungerile; Meng, Baoyintu; Jia, Bing

7.        Application of Big Data Technology in JD; Shi, Ning; Liu, Huwei

8.        A Trusted International Settlement Solution Based on Cross Check of CDRs; Ran, Peng; Su, Li

9.        Fog-enabled Smart Campus: Architecture and Challenges; Tang, Chaogang; Xia, Shixiong; Liu, Chong; Wei, Xianglin; Bao, Yu; Chen, Wei

10.     An Ant Colony Optimization Fuzzy Clustering Task Scheduling Algorithm in Mobile Edge Computing; Liu, Jianwei; Wei, Xianglin; Wang, Tongxiang; Wang, Junwei

SESSION 6

Mechanism and Method in New Computing

(Location: College of computer science, 621)(地点:计算机楼,621

Session chair: Hao Peng

1.          A Posted Pricing Mechanism Based on Random Forests in Crowdsourcing Market; Hao, Lifei; Jia, Bing; Zhang, Chuxuan

2.          A Reverse Auction Incentive Mechanism Based on the Participant’s Behavior in Crowdsensing; Zhou, Tao; Jia, Bing; Li, Wuyungerile

3.          Identification and trust techniques compatible with eIDAS regulation; Mocanu, Stefan; Chiriac, Ana Maria; Popa, Cosmin; Dobrescu, Radu; Saru, Daniela

4.          A General Hardware Trojan Technique Targeted on Lightweight Cryptography with Bit-serial Structure; Yang, Yijun; Wu, Liji; Yuan, Ye; Zhang, Xiangmin

5.          Gathering Pattern Mining Method based on Trajectory Data Stream; Xia, Ying; Diao, Lian; Zhang, Xu; Bae, Hae-young

6.          Travel Modes Recognition Method Based on Mobile Phone Signaling Data; Xia, Ying; Tang, Jie; Zhang, Xu; Bae, Hae-young

7.          Two-level Feature Selection Method for Low Detection Rate Attacks in Intrusion Detection; Wang, Chundong; Ye, Xin; He, Xiaonan; Tian, Yunkun; Gong, Liangyi

8.          A Novel Wireless Sensor Networks Malicious Node Detection Method; Yang, Hongyu; Zhang, Xugao; Cheng, Fang

9.          Grid partition and agglomeration for bidirectional hierarchical clustering; wu, lei; chen, hechang; yu, xiangchun; yu, zhezhou; dou, ruiting; sun, chao

10.       A non-repudiable dynamic provable data possession; Tian, FengJun; Guo, FangRui; Jing, Xuan

11.       Zone based Lossy Image Compression using Discrete Wavelet and Discrete Cosine Transformations; Ahmad, Nafees; Iqbal, Khalid; Han, Lansheng; Iqbal, Naeem; Abid, Muhammad Adil

18:00 – 20:00 Gala Dinner(晚宴)
DAY 2 – 14 April, 2019
8:30 – 9:00 Registration (注册)
9:00 – 9:50 Keynote Speech: Wenjing Lou

Title: Blockchain, Smart Contract, and Private Data Usage Control

10:40 – 11:00 Coffee break (茶歇)
12:00 – 13:00 Lunch  (午餐)
EAI Institutional Members