EAI - Reinventing the governance and economy of research and innovation
The leading professional community for research career enhancement in the digital age

Program

DAY 1 – 13 April, 2019
8:20 – 8:50 Registration
8:50 – 9:00 Opening Ceremony
9:00– 9:45 Keynote Speech: Xiaohua Jia

Title: Privacy-Preserving Service Matching in Public Clouds

9:45-10:30 Keynote Speech: Jie Li

Title: Big Data and AI Impacts on Information Networking, Security, and Privacy

10:30 – 10:50 Coffee break
10:50-11:35 Keynote Speech: Xinpeng Zhang

Title: Signal Processing in Encrypted Domain

12:00-13:00 Lunch
13:20 – 15:00

(parallel sessions)

SESSION 1

Privacy and Security Analysis

1. A Blind Signature Scheme Applying on Electronic Payment Scene based on Quantum Secret Sharing; Zhang, Jia-Lei; Hu, Ming-Sheng; Gong, Bei; Jia, Zhi-Juan; Wang, Li-Peng

2. Threshold Signature Scheme with Strong Forward Security Based on Chinese Remainder Theorem; Cheng, Yage; Jia, Zhijuan; Gong, Bei; Wang, Lipeng; Lei, Yanfang

3. Lightweight Secure Cloud Auditing Scheme for Shared Data Supporting Identity Privacy and Traceability; Tian, Junfeng; Jing, Xuan; Guo, Ruifang

4.  Research on Big Data Platform Security Based on Cloud Computing; Niu, Xiaxia; Zhao, Yan

5. Database Query System with Budget Option for Differential Privacy against Repeated Attacks; Jia, Jingyu; Wu, Yuduo; Guo, Yue; Gao, Jiqiang; Peng, Jin; Ran, Peng; Li, Min; Liu, Zheli

6. Research on Social Networks Publishing Method under Differential Privacy; Wang, Han; Li, Shuyu

7. CROSS: upervised Sharing of Private Data over Blockchains; Yin, Mingxin; Gao, Jiqiang; Guo, Xiaojie; Sun, Mengyao; Liu, Zheli; Zhang, Jianzhong; Wang, Jing

8. A Survey of Trusted Network Trust Evaluation Methods; Yin, Ansheng; Zhang, Shunyi

9. Anomaly Detection of Vehicle CAN Network based on Message Content; Chen, Pengyuan; Mo, Xiuliang; Wang, Jianing; Wang, Chundong

10.Android malware detection based on sensitive permissions and APIs; Zhao, Chunhui; Wang, Chundong; Zheng, Wenbai

SESSION 2

Internet of Things and Cloud Computing

1. FIREWORK: Fog orchestration for secure IoT networks ; Vahabi, Maryam; Fotouhi, Hossein; Björkman, Mats

2.  An Effective Encryption Scheme on Outsourcing Data for Query on Cloud Platform; Tang, Jianchao; Fu, Shaojing; Xu, Ming

3. Design of an Urban Waterlogging Monitoring System based on Internet of Things; Liu, Jiachen; Bao, Yintu; Liu, Yingcong; Li, Wuyungerile

4. A Multi-Objective Service Selection Method Based on Ant Colony Optimization for QoE Restrictions in the Internet of Things; Zhang, Chuxuan; Jia, Bing; Hao, Lifei

5. FDSCD:Fast Deletion Scheme of Cloud Data; Shao, Tong; Tian, ChiYue; Li, Zhen; Jing, Xuan

6. A RBAC Model Based on Identity-Based Cryptosystem in Cloud Storage; Xu, Jian; Yu, Yanbo; Meng, Qingyu; Wu, Qiyu; Zhou, Fucai

7. Public Auditing of Log Integrity for Cloud Storage Systems via Blockchain; Wang, Jia; Peng, Fang; Tian, Hui; Chen, Wenqi; Lu, Jin

8. Coordinated Web Scan Detection Based on Hierarchical Correlation; Yang, Jing; Wang, Liming; Xu, Zhen; Wang, Jigang; Tian, Tian

9. Research on Multi Domain Based Access Control in Intelligent Connected Vehicle; Wang, kaiyu; Liu, nan; Xiu, Jiapeng; yang, zhengqiu

SESSION 3

System Building

1. Cryptanalysis of a public key cryptosystem based on data complexity under quantum environment ; Jing, Zheng Jun; Gu, Chunsheng; Shi, Peizhong

2. A Design of the Group Decision Making Medical Diagnosis Expert System based on SED-JD Algorithm ; Zong, Na; Li, Wuyungerile; Li, Pengyu; Jia, Bing; Ma, Xuebin

3. Design and Implementation of a Lightweight Intrusion Detection and Prevention System; wei, xiaogang

4. Reliability Analysis of Coupled Cyber-Physical Systems under Different Network Types; Peng, Hao; Kan, Zhe; Zhao, Dandan; Han, Jianmin; Hu, Zhaolong

5. Invulnerability Assessment of Cyber-Physics Systems for Blockchain Environment; Peng, Hao; Kan, Zhe; Zhao, Dandan; Zheng, zhonglong

6. Intrusion Detection System for IoT Heterogeneous Perceptual Network Based on Game Theory; Zhou, Man; Han, Lansheng; Lu, Hongwei; Fu, Cai

7. A Blockchain-based Digital Advertising Media Promotion System ; Ding, Yong; Luo, Decun; Xiang, Hengkui; Tang, Chenjun; Liu, Lingang; Zou, Xiuqing; Li, Shijie; Wang, Yujue

8. Detecting Steganography in AMR Speech Based on Pulse Correlation; Liu, Jie; Tian, Hui; Liu, Xiaokang; Lu, Jing

9. State Consistency Checking for Non-Reentrant Function Based on Taint Assisted Symbol Execution; Yu, Bo; Yang, Qiang; Song, Congxi

10. SE Dots : A Sensitive and Extensible Framework for cross-region DDoS processing; Su, Li; Chen, Meiling; Peng, Jin; Ran, Peng

15:00 – 15:20 Coffee break
15:20 – 17:20

 

SESSION 4

Privacy and Security Analysis

1. Security Assessment for Cascading Failures of Cyber-Physical Systems under Target attack Strategy ; Peng, Hao; Kan, Zhe; Zhao, Dandan; Han, Jianmin

2. Privacy Preservation in Publishing Electronic Health Records Based on Perturbation; Yao, Lin; Wang, Xinyu; Chen, Zhenyu; Wu, Guowei

3. Privacy in Location-Based Services: Present Facts and Future Paths; Sahnoune, Zakaria; Aïmeur, Esma

4. Privacy Disclosures Detection in Natural-Language Text Through Linguistically-motivated Artificial Neural Networks; Mehrpouyan, Hoda; Mehdy, Nuhil; Kenningto, Casey

5. Research on Information Security Test Evaluation Method Based on Intelligent Connected Vehicle; Zhang, Yanan; Han, Shengqiang; Zhong, Stevenyin; Shi, Peiji; Shao, Xuebin

6. Study on Incident Response System of Automotive Cybersecurity; Zhang, Yanan; Shi, Peiji; Liu, Yangyang; Han, Shengqiang; Mu, Baoying; Zheng, Jia

7. Secure Multi-keyword Fuzzy Search Supporting Logic Query over Encrypted Cloud Data; Zhang, Qi; Fu, Shaojing; Jia, Nan; Tang, Jianchao; Xu, Ming

8. A Practical Group Signatures for Providing Privacy-Preserving Authentication with Revocation; Yue, Xiaohan; Xu, Jian; Chen, Bing; He, Yuan

9. A privacy-preserving palmprint authentication scheme based on ElGamal; Ding, Yong; Wang, Huiyong; Gao, Zhiqiang; Wang, Yujue; Fan, Kefeng; Tang, Shijie

10. PJC: A multi-source method for identifying information dissemination in networks; Ding, Yong; Cui, Xiaoqing; Wang, Huiyong; Wang, Yujue

11. Steganalysis of Adaptive Multiple-rate Speech Using Parity of Pitch-delay Value; Liu, Xiaokang; Tian, Hui; Liu, Jie; Li, Xiang; Lu, Jing

12. Network risk assessment based on improved MulVAL framework and HMM; Wang, Chundong; Li, Kongbo; Tian, Yunkun; He, Xiaonan

SESSION 5

Scheme, Model and Application for Data

1. A one-way variable threshold proxy re-signature scheme for mobile internet; Lei, Yanfang; Hu, Mingsheng; Gong, Bei; Wang, Lipeng; Cheng, Yage

2. A New Signcryption Scheme Based on Elliptic Curves; Cui, Wenjun; Jia, Zhijuan; Hu, Mingsheng; Gong, Bei; Wang, Lipeng

3. A robust reversible watermarking scheme for relational data; Hou, Ruitao; Xian, Hequn; Wang, Xiao; Li, Jing

4. BL-IDS:Detecting Web Attacks Using Bi-LSTM Model Based on Deep Learning; hao, saiyu; long, jun; yang, yingchuan

5. An Static Propositional Function Model to Detect Software Vulnerability; Han, Lansheng; Zhou, Man; Fu, Cai

6. Design of ZigBee-based Energy Harvesting Wireless Sensor Network and Modeling of Solar Energy; liu, yingcong; Li, Wuyungerile; Meng, Baoyintu; Jia, Bing

7.  Application of Big Data Technology in JD; Shi, Ning; Liu, Huwei

8.  A Trusted International Settlement Solution Based on Cross Check of CDRs; Ran, Peng; Su, Li

9. Fog-enabled Smart Campus: Architecture and Challenges; Tang, Chaogang; Xia, Shixiong; Liu, Chong; Wei, Xianglin; Bao, Yu; Chen, Wei

10.  An Ant Colony Optimization Fuzzy Clustering Task Scheduling Algorithm in Mobile Edge Computing; Liu, Jianwei; Wei, Xianglin; Wang, Tongxiang; Wang, Junwei

SESSION 6

Mechanism and Method in New Computing

1. A Posted Pricing Mechanism Based on Random Forests in Crowdsourcing Market; Hao, Lifei; Jia, Bing; Zhang, Chuxuan

2. A Reverse Auction Incentive Mechanism Based on the Participant’s Behavior in Crowdsensing; Zhou, Tao; Jia, Bing; Li, Wuyungeril

3. A General Hardware Trojan Technique Targeted on Lightweight Cryptography with Bit-serial Structure; Yang, Yijun; Wu, Liji; Yuan, Ye; Zhang, Xiangmin

4. Identification and trust techniques compatible with eIDAS regulation; Mocanu, Stefan; Chiriac, Ana Maria; Popa, Cosmin; Dobrescu, Radu; Saru, Daniela

5. Gathering Pattern Mining Method based on Trajectory Data Stream; Xia, Ying; Diao, Lian; Zhang, Xu; Bae, Hae-young

6. Travel Modes Recognition Method Based on Mobile Phone Signaling Data; Xia, Ying; Tang, Jie; Zhang, Xu; Bae, Hae-young

7. Two-level Feature Selection Method for Low Detection Rate Attacks in Intrusion Detection; Wang, Chundong; Ye, Xin; He, Xiaonan; Tian, Yunkun; Gong, Liangyi

8. A Novel Wireless Sensor Networks Malicious Node Detection Method; Yang, Hongyu; Zhang, Xugao; Cheng, Fang

9. Grid partition and agglomeration for bidirectional hierarchical clustering; wu, lei; chen, hechang; yu, xiangchun; yu, zhezhou; dou, ruiting; sun, chao

10. A non-repudiable dynamic provable data possession; Tian, FengJun; Guo, FangRui; Jing, Xuan

11. Zone based Lossy Image Compression using Discrete Wavelet and Discrete Cosine Transformations; Ahmad, Nafees; Iqbal, Khalid; Han, Lansheng; Iqbal, Naeem; Abid, Muhammad Adi

18:00 – 2000 Gala Dinner

 

 

 

 

 

 

 

DAY 2– 14 April, 2019
8:30 – 9:00 Registration
9:00 – 9:45 Keynote Speech: Wenjing Lou

Title: Blockchain, Smart Contract, and Private Data Usage Control

 

12:00 – 13:00 Lunch

 

EAI Institutional Members