August
14, 2021 (Beijing Time) |
Chair |
|
09:00-9:20 |
Open
Remarks: Fneg Liu (General Co-Chair) |
Wenlian Lu |
09:20-10:20 |
Keynote
Lecture I: Title:
Layers of Abstraction and Layers of Obstruction and the U2F Speaker:
Moti Yung (Google and Columbia University, USA) |
Kouichi Sakurai |
10:20-10:40 |
||
10:40-11:40 |
Keynote Lecture Ⅱ:
Title:
Progresses and Challenges in Federated Learning Speaker: Gong Zhang (Huawei, China) |
Wenlian Lu |
|
||
13:30-15:10 |
Regular Session Ⅰ: Detection |
Chengyi Xia |
13:30-13:50 |
Detecting Internet-scale Surveillance Devices using RTSP Recessive Features Zhaoteng Yan, Zhi Li, Wenping Bai, Nan Yu, Hongsong Zhu and Limin Sun |
|
13:50-14:10 |
An Intrusion Detection Framework for IoT using Partial Domain Adaptation Yulin Fan, Yang Li, Huajun Cui, Huiran Yang, Yan Zhang and Weiping Wang |
|
14:10-14:30 |
Mining Trojan Detection Based on Multi-dimensional Static Features Zixian Tang, Qiang Wang, Wenhao Li, Huaifeng
Bao, Wen Wang and Feng Liu |
|
14:30-14:50 |
Botnet Detection Based on Multilateral Attribute Graph Hua Cheng, Yinda Shen, Tao Cheng, Yiquan Fang
and Jianfan Ling |
|
14:50-15:10 |
A New Method for Inferring Ground-Truth Labels and Malware Detector Effectiveness Metrics John Charlton Pang Du and Shouhuai Xu |
|
15:10-15:20 |
||
15:20-17:40 |
Regular Session Ⅱ: Machine Learning |
Xiwei liu |
15:20-15:40 |
Protecting Data Privacy in Federated Learning Combining Differential Privacy and Weak Encryption Chuanyin Wang, Cunqing Ma, Min Li, Neng Gao, Yifei Zhang and Zhuoxiang Shen |
|
15:40-16:00 |
Using Chinese Natural Language Authorization Policies in Attribute-based Access Control System Zhuoxiang Shen, Neng Gao, Zeyi Liu, Min Li and Chuanyin Wang |
|
16:00-16:20 |
A data-free approach for targeted universal adversarial perturbation Xiaoyu Wang, Tao Bai and Jun Zhao |
|
16:20-16:40 |
Caps-LSTM: A Novel Hierarchical Encrypted VPN Network Traffic Identification using CapsNet and LSTMStackelberg
Game Jiyue Tang, Le Yang, Song Liu, Wenmao Liu, Meng Wang, Chonghua Wang, Bo Jiang and Zhigang Lu |
|
16:40-17:00 |
Multi-granularity Mobile Encrypted Traffic Classification Based On Fusion Features Hui Zhang, Gaopeng Gou, Gang Xiong, Chang Liu, Yuewen Tan and Ke Ye |
|
17:00-17:20 |
Stochastic Simulation Techniques for Inference and Sensitivity Analysis of Bayesian Attack Graphs Isaac Matthews, Sadegh Soudjani and Aad Van Moorsel |
|
17:20-17:40 |
Simulations of Event-based Cyber Dynamics via Adversarial Machine Learning Zhaofeng Liu, Yinchong Wang, Huashan Chen and Wenlian Lu |
|
|
||
20:00-21:00 |
SciSec Business Meeting 1. Steering Committee’s report: Shouhuai Xu 2. SciSec’2021 Program Co-Chair’s Report: Wenlian Lu 3. Announcement of Distinguishing Papers: Wenlian Lu 4. SciSec’2022 Presentation: Chunhua Su |
|
August 15, 2021 (Beijing Time) |
Chair |
|
08:30-09:30 |
Keynote Lecture Ⅲ: Title: SARR: A Cybersecurity Metrics and Quantification Framework Speaker:
Shouhuai Xu (University of Colorado Colorado Springs, USA) |
Kun Sun |
09:30-10:30 |
Keynote Lecture Ⅳ: Title: Preliminary Exploration on Several Security Issues in AI Speaker:
Yugang Jiang (Fudan University, China) |
Feng Liu |
10:30-10:40 |
||
10:40-11:40 |
Discussion Panel: Topic: Where are Cybersecurity Boundaries? Moderator: Shouhuai Xu (University of Colorado Colorado Springs, USA) Panelists: Yugang Jiang (Fudan University, China), Yung Moti(Google and Columbia University, USA), Lingyu Wang (Concordia University, Canada) |
|
|
||
13:30-15:10 |
Regular Session Ⅲ: Dynamics, Network and Inference |
TBA |
13:30-13:50 |
Dismantling interdependent networks based on Supra-Laplacian energy Wei Lin, Shuming Zhou, Min Li and Gaolin Chen |
|
13:50-14:10 |
DWT-DQFT-based Color Image Blind Watermark with QR Decomposition Liangcheng Qin, Ling Ma and Fu Xiongjun |
|
14:10-14:30 |
A Multi-Level Elastic Encryption Protection Model Caimei Wang, Zijian Zhou, Hong Li, Zhengmao Li and Bowen Huang |
|
14:30-14:50 |
An Event-based Parameter Switching Method for Controlling Cybersecurity Dynamics Zhaofeng Liu, Wenlian Lu and Yingying Lang |
|
14:50-15:10 |
RansomLens: Understanding Ransomware via Causality Analysis on System Provenance Graph Rui Mei, Han-Bing Yan and Zhi-Hui Han |
|
15:10-16:10 |
Post Presentation A Review on Network Mutation of Moving Target Defense Meimei Li, Yiyan Xu, Yuhan Li, Jiguo Liu and Nan Li A Step-by-step Defense Mechanism for Insider Threat: Review, Challenges and Opportunities Meichen Liu, Meimei Li and Degang Sun Impact of Social Distancing and Information Diffusion on Virus Spreading in Multiplex Networks Qian Yin, Zhishuang Wang and Chengyi Xia DCDS: A Distributed Cybersecurity Dynamics Simulator based on ns-3 Huashan Chen and Wenlian Lu A Modeling Method of Cyberspace Security Structure Based on Layer-Level Division Yuwen Zhu |
Wenlian Lu |
16:10-16:20 |
Closing Remarks |
Wenlian Lu |