August 14, 2021 (Beijing Time)

Chair

09:00-9:20

Open Remarks:

Fneg Liu (General Co-Chair)

Wenlian Lu

09:20-10:20

Keynote Lecture I:

Title: Layers of Abstraction and Layers of Obstruction and the U2F

Speaker: Moti Yung (Google and Columbia University, USA)

Kouichi Sakurai

10:20-10:40

Break

10:40-11:40

Keynote Lecture Ⅱ:

Title: Progresses and Challenges in Federated Learning

Speaker: Gong Zhang (Huawei, China)

Wenlian Lu

13:30-15:10

Regular Session Ⅰ: Detection

Chengyi Xia

13:30-13:50

Detecting Internet-scale Surveillance Devices using RTSP Recessive Features

Zhaoteng Yan, Zhi Li, Wenping Bai, Nan Yu, Hongsong Zhu and Limin Sun

13:50-14:10

An Intrusion Detection Framework for IoT using Partial Domain Adaptation

Yulin Fan, Yang Li, Huajun Cui, Huiran Yang, Yan Zhang and Weiping Wang

14:10-14:30

Mining Trojan Detection Based on Multi-dimensional Static Features

Zixian Tang, Qiang Wang, Wenhao Li, Huaifeng Bao, Wen Wang and Feng Liu

14:30-14:50

Botnet Detection Based on Multilateral Attribute Graph

Hua Cheng, Yinda Shen, Tao Cheng, Yiquan Fang and Jianfan Ling

14:50-15:10

A New Method for Inferring Ground-Truth Labels and Malware Detector Effectiveness Metrics

John Charlton Pang Du and Shouhuai Xu

15:10-15:20

Break

15:20-17:40

Regular Session Ⅱ: Machine Learning

Xiwei liu

15:20-15:40

Protecting Data Privacy in Federated Learning Combining Differential Privacy and Weak Encryption

Chuanyin Wang, Cunqing Ma, Min Li, Neng Gao, Yifei Zhang and Zhuoxiang Shen

15:40-16:00

Using Chinese Natural Language Authorization Policies in Attribute-based Access Control System

Zhuoxiang Shen, Neng Gao, Zeyi Liu, Min Li and Chuanyin Wang

16:00-16:20

A data-free approach for targeted universal adversarial perturbation

Xiaoyu Wang, Tao Bai and Jun Zhao

16:20-16:40

Caps-LSTM: A Novel Hierarchical Encrypted VPN Network Traffic Identification using CapsNet and LSTMStackelberg Game

Jiyue Tang, Le Yang, Song Liu, Wenmao Liu, Meng Wang, Chonghua Wang, Bo Jiang and Zhigang Lu

16:40-17:00

Multi-granularity Mobile Encrypted Traffic Classification Based On Fusion Features

Hui Zhang, Gaopeng Gou, Gang Xiong, Chang Liu, Yuewen Tan and Ke Ye

17:00-17:20

Stochastic Simulation Techniques for Inference and Sensitivity Analysis of Bayesian Attack Graphs

Isaac Matthews, Sadegh Soudjani and Aad Van Moorsel

17:20-17:40

Simulations of Event-based Cyber Dynamics via Adversarial Machine Learning

Zhaofeng Liu, Yinchong Wang, Huashan Chen and Wenlian Lu

20:00-21:00

SciSec Business Meeting

1. Steering Committee’s report: Shouhuai Xu

2. SciSec’2021 Program Co-Chair’s Report: Wenlian Lu

3. Announcement of Distinguishing Papers: Wenlian Lu

4. SciSec’2022 Presentation: Chunhua Su

August 15, 2021 (Beijing Time)

Chair

08:30-09:30

Keynote Lecture Ⅲ:

Title: SARR: A Cybersecurity Metrics and Quantification Framework

Speaker: Shouhuai Xu (University of Colorado Colorado Springs, USA)

Kun Sun

09:30-10:30

Keynote Lecture Ⅳ:

Title: Preliminary Exploration on Several Security Issues in AI

Speaker: Yugang Jiang (Fudan University, China)

Feng Liu

10:30-10:40

Break

10:40-11:40

Discussion Panel:

Topic: Where are Cybersecurity Boundaries?

Moderator: Shouhuai Xu (University of Colorado Colorado Springs, USA)

Panelists: Yugang Jiang (Fudan University, China), Yung Moti(Google and Columbia University, USA), Lingyu Wang (Concordia University, Canada)

13:30-15:10

Regular Session Ⅲ: Dynamics, Network and Inference

TBA

13:30-13:50

Dismantling interdependent networks based on Supra-Laplacian energy

Wei Lin, Shuming Zhou, Min Li and Gaolin Chen

13:50-14:10

DWT-DQFT-based Color Image Blind Watermark with QR Decomposition

Liangcheng Qin, Ling Ma and Fu Xiongjun

14:10-14:30

A Multi-Level Elastic Encryption Protection Model

Caimei Wang, Zijian Zhou, Hong Li, Zhengmao Li and Bowen Huang

14:30-14:50

An Event-based Parameter Switching Method for Controlling Cybersecurity Dynamics

Zhaofeng Liu, Wenlian Lu and Yingying Lang

14:50-15:10

RansomLens: Understanding Ransomware via Causality Analysis on System Provenance Graph

Rui Mei, Han-Bing Yan and Zhi-Hui Han

15:10-16:10

Post Presentation

A Review on Network Mutation of Moving Target Defense

Meimei Li, Yiyan Xu, Yuhan Li, Jiguo Liu and Nan Li

A Step-by-step Defense Mechanism for Insider Threat: Review, Challenges and Opportunities

Meichen Liu, Meimei Li and Degang Sun

Impact of Social Distancing and Information Diffusion on Virus Spreading in Multiplex Networks

Qian Yin, Zhishuang Wang and Chengyi Xia

DCDS: A Distributed Cybersecurity Dynamics Simulator based on ns-3

Huashan Chen and Wenlian Lu

A Modeling Method of Cyberspace Security Structure Based on Layer-Level Division

Yuwen Zhu

Wenlian Lu

16:10-16:20

Closing Remarks

Wenlian Lu