August 9, 2019 (Friday)

14:00-18:00

Registration

18:00-20:00

Welcome Reception

August 10, 2019 (Saturday)

08:30-8:40

Opening Remarks

Professor Guoping Jiang, Nanjing University of Posts and Telecommunications

08:40-09:40

Invited Lecture I:

Speaker: Professor Moti Yung, Google & Columbia University, USA

Title: Title: Layers of Abstraction and Layers of Obstruction: how what makes computing successful makes security hard

Session Chair: Shouhuai Xu(Shouhuai.Xu@utsa.edu)

09:40-10:20

Conference Group Photo & Coffee Break

10:20-11:40

Full Paper Presentation Session I: Artificial Intelligence for Cybersecurity (4 papers)

Session Chair: Qian Chen(guenevereqian.chen@utsa.edu)

10:20-10:40

Cross-domain Recommendation System based on Tensor Decomposition for Cybersecurity Data Analytics

Yuan Wang,Jinzhi Wang,Jianhong Gao,Shengsheng Hu(State Grid Electric Power Research Institute Co., Ltd.) Huacheng Sun,Yongli Wang(Nanjing University of Science and Technology)

10:40-11:00

Density Peak Clustering Algorithm based on Differential Privacy Preserving

Yun  Chen(Nanjing University of Posts and Telecommunications), Yunlan Du(Nanjing University), Xiaomei Cao(Nanjing University of Posts and Telecommunications)

11:00-11:20

An Automatically Online Spam Detector based on Deep Cascade Forest

Kangyang Chen,Xinyi Zou,Xingguo Chen(Nanjing University of Posts and Telecommunications)

11:20-11:40

Multiplex PageRank in Multilayer Networks Considering of Shunt

Xiao Tu,Guo-Ping Jiang(Nanjing University of Posts and Telecommunications)

11:40-13:30

Lunch

13:30-14:10

Invited Lecture II:

Speaker: Dr. Bo Liu , Anheng information technology co., LTD, China

Title: Advanced Threat Detection and Automated Response Using Machine Learning

Session Chair: Feng Liu(liufeng@iie.ac.cn)

14:10-15:40

Panel Discussion: Future Research Directions towards Science of Cyber Security

Moderator: Professor Shouhuai Xu

Panelists: Professor Moti Yung, Professor Gene Tsudik, Dr. Bo Liu, Professor Jingguo Wang

15:40-16:10

Coffee Break

16:10-17:00

Short Paper Presentation Session I: Blockchain, Attack and Defense (5 papers)

Session Chair: Min Xiao(candymanxm2003@aliyun.com)

16:10-16:20

Anonymous IoT Data Storage and Transaction Protocol based on Blockchain and Edge Computing

Zhi Qiao,Congcong Zhu,Zhiwei Wang,Nianhua Yang(Shanghai University of International Business and Economics)

16:20-16:30

Incentive Mechanism for Bitcoin Mining Pool based on Stackelberg Game

Gang Xue,Jia Xu,Hanwen Wu,Weifeng Lu,Lijie Xu(Nanjing University of Posts and Telecommunications)

16:30-16:40

Automated Ransomware Behavior Analysis: Pattern Extraction and Early Detection

Qian Chen,Henry Haswell(University of Texas at San Anton), Sheikh Rabiul Islam(Tennessee Technological University),Robert Bridges(Oak Ridge National Laboratory)

16:40-16:50

Behavior Flow Construction from System Logs for Anomaly Analysis

Hang Ling,Jiayi Pang,Jia Xu,Zheng Liu(Nanjing University of Posts and Telecommunications),Jing Han,Jianwei Liu(ZTE Corporation)

16:50-17:00

Knowledge Graph based Semi-automatic Code Auditing System

Hongji Yin,Wei Chen(Nanjing University of Posts and Telecommunications)

17:00-18:00

SciSec Business Meeting

Session Chair: Professor Shouhuai Xu

18:00-19:30

Dinner

August 11, 2019 (Sunday)

08:30-9:30

Invited Lecture III:

Speaker: Prof. Gene Tsudik, University of California, Irvine, USA

Title: VRASED: Verifiable Remote Attestation for Simple Embedded Devices

Session Chair: Guoping Jiang(jianggp@njupt.edu.cn)

09:30-10:00

Coffee Break

10:00-11:20

Full Paper Presentation Session II: Machine Learning for Cybersecurity (4 papers)

Session Chair: Professor Yun Li

10:00-10:20

LogGAN: A Sequence-based Generative Adversarial Network for Anomaly Detection based on System Logs

Bin Xia,Junjie Yin(Nanjing University of Posts and Telecommunications)Jian Xu(Nanjing University of Science and Technology),Yun Li(Nanjing University of Posts and Telecommunications)

10:20-10:40

Security Comparison of Machine Learning Models Facing Different Attack Targets

Zhaofeng Liu,Zhen Jia,Wenlian Lu(Fudan University)

10:40-11:00

Adversarial Training based Feature Selection

Binghui Liu,Keji Han,Jie Hang,Yun Li(Nanjing University of Post and Telecommunications Nanjing)

11:00-11:20

Application of DeepWalk based on Hyperbolic Coordinates on Unsupervised Clustering

Shikang Yu,Yang Wu,Guoping Jiang,Yurong Song(Nanjing University of Posts and Telecommunications), Xiaoping Su(Nanjing Institute of Industry Technology)

11:20-11:30

Break

11:30-12:00

Short Paper Presentation Session II: Encryption and Application (3 papers)

Session Chair: Yingzhou Zhang(zhangyz@njupt.edu.cn)

11:30-11:40

Implicit-Key Attack on the RSA Cryptosystem

Mengce Zheng,Honggang Hu(University of Science and Technology of China)

11:40-11:50

High-Efficiency Triangle Counting on the GPU

Yang Wu,Shikang Yu,Yurong Song,Guoping Jiang,Xiao Tu(Nanjing University of Posts and Telecommunications)

11:50-12:00

A Pairing-Free Certificateless Signature Scheme for Future Internet of Things

Zhenchao Zhang,Xinchun Yin,Xincheng Li(Yangzhou University) Yali Liu(Yangzhou University and Jiangsu Normal University)

12:00-13:30

Lunch

13:30-14:50

Full Paper Presentation Session III: Attack and Defense (4 papers)

Session Chair: Zhiwei Wang(zhwwang@njupt.edu.cn)

13:30-13:50

HoneyGadget: A Deception based ROP Detection Scheme

Xin Huang,Fei Yan,Liqiang Zhang,Kai Wang(Wuhan University)

13:50-14:10

LET-attack: Latent Encodings of Normal-data Manifold Transferring to Adversarial Examples

Jie Zhang,Zhihao Zhang(Nanjing University of Posts and Telecommunications)

14:10-14:30

New Robustness Measures of Communication Networks against Virus Attacks

Yinwei Li,Bo Song,Xu Zhang,Guo-Ping Jiang,Yurong Song(Nanjing University of Posts and Telecommunications)

14:30-14:50

Application and Performance Analysis of Data Preprocessing for Intrusion Detection System

Shuai Jiang,Xiaolong Xu(Nanjing University of Posts and Telecommunications)

14:50-15:10

Coffee Break

15:10-16:30

Full Paper Presentation Session IV: Encryption and Application1 (4 papers)

Session Chair: Prof. Jingguo Wang(JWANG@uta.edu)

15:10-15:30

Effective Matrix Factorization for Recommendation with Local Differential Privacy

Hao Zhou,Geng Yang,Yahong Xu,Weiya Wang(Nanjing University of Posts and Telecommunications)

15:30-15:50

Fully Anonymous Blockchain Constructed based on Aggregate Signature and Ring Signature

Tianfu Chen,Zhenghua Qi,Jiagen Cheng(Nanjing University of Posts and Telecommunications)

15:50-16:10

Overloading Identification of Transmission Lines in Power Systems Using FIDA

Da-Tian Peng,Jianmin Dong,Qinke Peng(Xi'an Jiaotong University) Bo Zeng,Zhi-Hong Mao(University of Pittsburgh)

16:10-16:30

Optimal Key-Tree for RFID Authentication Protocols with Storage Constraints

Shaohui Wang,Yan-Xuan Zhang,Chang-Bo Ke,Fu Xiao,Ru-Chuan Wang(Nanjing University of Posts and Telecommunications)

16:30-16:50

Coffee Break

16:50-18:10

Full Paper Presentation Session V: Encryption and Application2 (4 papers)

Session Chair: Prof. Kouichi Sakurai(sakuraicsce2009g@gmail.com)

16:50-17:10

Towards Realizing Authorized Encrypted Search with Designed Access Policy

Lin Mei,Chungen Xu, Lei Xu,Zhongyi Liu, Xiaoling, Zhigang Yao(Nanjing university of science and technology)

17:10-17:30

Forward Private Searchable Encryption with Conjunctive Keywords Query

Zhigang Yao,Chungen Xu,Lei Xu,Lin Mei(Nanjing university of science and technology)

17:30-17:50

PAFR: Privacy-Aware Friends Retrieval over Online Social Networks

Yuxi Li, Fucai Zhou,Zifeng Xu(Northeastern University)

17:50-18:10

An ID-based Linear Homomorphic Cryptosystem and its Applications for the Isolated Smart Grid Devices

Zhiwei Wang, Zhiyuan Cheng(Nanjing University of Posts and Telecommunications), Nianhua Yang(Shanghai University of International Business and Economics)

18:10-20:00

SciSec 2019 Banquet 

Award Ceremony

SciSec 2019 Adjourns