August
9, 2019 (Friday) |
|
14:00-18:00 |
Registration |
18:00-20:00 |
Welcome
Reception |
August 10, 2019 (Saturday) |
|
08:30-8:40 |
Opening
Remarks Professor
Guoping Jiang, Nanjing University of Posts and
Telecommunications |
08:40-09:40 |
Invited
Lecture I: Speaker:
Professor Moti Yung, Google & Columbia University, USA Title:
Title: Layers of Abstraction and Layers of Obstruction: how what makes
computing successful makes security hard Session
Chair: Shouhuai Xu(Shouhuai.Xu@utsa.edu) |
09:40-10:20 |
|
10:20-11:40 |
Full
Paper Presentation Session I: Artificial Intelligence for Cybersecurity (4
papers) Session
Chair: Qian Chen(guenevereqian.chen@utsa.edu) |
10:20-10:40 |
Cross-domain
Recommendation System based on Tensor Decomposition for Cybersecurity Data
Analytics Yuan Wang,Jinzhi
Wang,Jianhong Gao,Shengsheng
Hu(State Grid Electric Power Research Institute Co., Ltd.) Huacheng Sun,Yongli
Wang(Nanjing University of Science and Technology) |
10:40-11:00 |
Density Peak
Clustering Algorithm based on Differential Privacy Preserving Yun Chen(Nanjing
University of Posts and Telecommunications), Yunlan
Du(Nanjing University), Xiaomei Cao(Nanjing
University of Posts and Telecommunications) |
11:00-11:20 |
An Automatically
Online Spam Detector based on Deep Cascade Forest Kangyang Chen,Xinyi Zou,Xingguo Chen(Nanjing University of Posts and
Telecommunications) |
11:20-11:40 |
Multiplex PageRank
in Multilayer Networks Considering of Shunt Xiao Tu,Guo-Ping
Jiang(Nanjing University of Posts and Telecommunications) |
11:40-13:30 |
Lunch |
13:30-14:10 |
Invited
Lecture II: Speaker:
Dr. Bo Liu , Anheng information technology co.,
LTD, China Title:
Advanced Threat Detection and Automated Response Using Machine Learning Session
Chair: Feng Liu(liufeng@iie.ac.cn) |
14:10-15:40 |
Panel
Discussion: Future Research Directions towards Science of Cyber Security Moderator:
Professor Shouhuai Xu Panelists:
Professor Moti Yung, Professor Gene Tsudik, Dr. Bo
Liu, Professor Jingguo Wang |
15:40-16:10 |
Coffee Break |
16:10-17:00 |
Short
Paper Presentation Session I: Blockchain, Attack and Defense (5 papers) Session
Chair: Min Xiao(candymanxm2003@aliyun.com) |
16:10-16:20 |
Anonymous IoT Data
Storage and Transaction Protocol based on Blockchain and Edge Computing Zhi Qiao,Congcong
Zhu,Zhiwei Wang,Nianhua
Yang(Shanghai University of International Business and Economics) |
16:20-16:30 |
Incentive
Mechanism for Bitcoin Mining Pool based on Stackelberg
Game Gang Xue,Jia Xu,Hanwen Wu,Weifeng Lu,Lijie Xu(Nanjing University of Posts and
Telecommunications) |
16:30-16:40 |
Automated
Ransomware Behavior Analysis: Pattern Extraction and Early Detection Qian Chen,Henry
Haswell(University of Texas at San Anton), Sheikh Rabiul
Islam(Tennessee Technological University),Robert Bridges(Oak Ridge National
Laboratory) |
16:40-16:50 |
Behavior Flow
Construction from System Logs for Anomaly Analysis Hang Ling,Jiayi
Pang,Jia Xu,Zheng
Liu(Nanjing University of Posts and Telecommunications),Jing Han,Jianwei Liu(ZTE Corporation) |
16:50-17:00 |
Knowledge Graph based
Semi-automatic Code Auditing System Hongji Yin,Wei
Chen(Nanjing University of Posts and Telecommunications) |
17:00-18:00 |
SciSec Business Meeting Session
Chair: Professor Shouhuai Xu |
18:00-19:30 |
Dinner |
August 11, 2019 (Sunday) |
|
08:30-9:30 |
Invited
Lecture III: Speaker:
Prof. Gene Tsudik, University of California,
Irvine, USA Title:
VRASED: Verifiable Remote Attestation for Simple Embedded Devices Session
Chair: Guoping Jiang(jianggp@njupt.edu.cn) |
09:30-10:00 |
Coffee
Break |
10:00-11:20 |
Full
Paper Presentation Session II: Machine Learning for Cybersecurity (4 papers) Session
Chair: Professor Yun Li |
10:00-10:20 |
LogGAN: A Sequence-based Generative
Adversarial Network for Anomaly Detection based on System Logs Bin Xia,Junjie
Yin(Nanjing University of Posts and Telecommunications)Jian Xu(Nanjing
University of Science and Technology),Yun Li(Nanjing University of Posts and
Telecommunications) |
10:20-10:40 |
Security
Comparison of Machine Learning Models Facing Different Attack Targets Zhaofeng Liu,Zhen Jia,Wenlian Lu(Fudan University) |
10:40-11:00 |
Adversarial
Training based Feature Selection Binghui Liu,Keji Han,Jie Hang,Yun Li(Nanjing
University of Post and Telecommunications Nanjing) |
11:00-11:20 |
Application of DeepWalk based on Hyperbolic Coordinates on Unsupervised
Clustering Shikang Yu,Yang Wu,Guoping Jiang,Yurong
Song(Nanjing University of Posts and Telecommunications), Xiaoping Su(Nanjing Institute of Industry Technology) |
11:20-11:30 |
Break |
11:30-12:00 |
Short
Paper Presentation Session II: Encryption and Application (3 papers) Session
Chair: Yingzhou Zhang(zhangyz@njupt.edu.cn) |
11:30-11:40 |
Implicit-Key
Attack on the RSA Cryptosystem Mengce Zheng,Honggang
Hu(University of Science and Technology of China) |
11:40-11:50 |
High-Efficiency
Triangle Counting on the GPU Yang Wu,Shikang
Yu,Yurong Song,Guoping Jiang,Xiao Tu(Nanjing University of Posts and
Telecommunications) |
11:50-12:00 |
A Pairing-Free
Certificateless Signature Scheme for Future Internet of Things Zhenchao Zhang,Xinchun
Yin,Xincheng Li(Yangzhou University) Yali Liu(Yangzhou University and Jiangsu Normal
University) |
12:00-13:30 |
Lunch |
13:30-14:50 |
Full
Paper Presentation Session III: Attack and Defense (4 papers) Session
Chair: Zhiwei Wang(zhwwang@njupt.edu.cn) |
13:30-13:50 |
HoneyGadget: A Deception based ROP Detection
Scheme Xin Huang,Fei Yan,Liqiang Zhang,Kai Wang(Wuhan University) |
13:50-14:10 |
LET-attack: Latent
Encodings of Normal-data Manifold Transferring to Adversarial Examples Jie Zhang,Zhihao
Zhang(Nanjing University of Posts and Telecommunications) |
14:10-14:30 |
New Robustness
Measures of Communication Networks against Virus Attacks Yinwei Li,Bo Song,Xu Zhang,Guo-Ping Jiang,Yurong Song(Nanjing University of Posts and
Telecommunications) |
14:30-14:50 |
Application and
Performance Analysis of Data Preprocessing for Intrusion Detection System Shuai Jiang,Xiaolong
Xu(Nanjing University of Posts and Telecommunications) |
14:50-15:10 |
Coffee
Break |
15:10-16:30 |
Full
Paper Presentation Session IV: Encryption and Application1 (4 papers) Session
Chair: Prof. Jingguo Wang(JWANG@uta.edu) |
15:10-15:30 |
Effective Matrix
Factorization for Recommendation with Local Differential Privacy Hao Zhou,Geng
Yang,Yahong Xu,Weiya
Wang(Nanjing University of Posts and Telecommunications) |
15:30-15:50 |
Fully Anonymous
Blockchain Constructed based on Aggregate Signature and Ring Signature Tianfu Chen,Zhenghua
Qi,Jiagen Cheng(Nanjing University of Posts and
Telecommunications) |
15:50-16:10 |
Overloading
Identification of Transmission Lines in Power Systems Using FIDA Da-Tian Peng,Jianmin
Dong,Qinke Peng(Xi'an Jiaotong
University) Bo Zeng,Zhi-Hong Mao(University of
Pittsburgh) |
16:10-16:30 |
Optimal Key-Tree
for RFID Authentication Protocols with Storage Constraints Shaohui Wang,Yan-Xuan
Zhang,Chang-Bo Ke,Fu Xiao,Ru-Chuan Wang(Nanjing University of Posts and
Telecommunications) |
16:30-16:50 |
Coffee
Break |
16:50-18:10 |
Full
Paper Presentation Session V: Encryption and Application2 (4 papers) Session
Chair: Prof. Kouichi Sakurai(sakuraicsce2009g@gmail.com) |
16:50-17:10 |
Towards Realizing
Authorized Encrypted Search with Designed Access Policy Lin Mei,Chungen Xu, Lei Xu,Zhongyi
Liu, Xiaoling, Zhigang
Yao(Nanjing university of science and technology) |
17:10-17:30 |
Forward Private
Searchable Encryption with Conjunctive Keywords Query Zhigang Yao,Chungen Xu,Lei Xu,Lin Mei(Nanjing
university of science and technology) |
17:30-17:50 |
PAFR:
Privacy-Aware Friends Retrieval over Online Social Networks Yuxi Li, Fucai Zhou,Zifeng Xu(Northeastern University) |
17:50-18:10 |
An ID-based Linear
Homomorphic Cryptosystem and its Applications for the Isolated Smart Grid
Devices Zhiwei Wang, Zhiyuan
Cheng(Nanjing University of Posts and
Telecommunications), Nianhua Yang(Shanghai University of International
Business and Economics) |
18:10-20:00 |
SciSec 2019 Banquet Award Ceremony |
SciSec 2019 Adjourns |