22nd Oct 2017 |
||
14:00-22:00 |
Registration |
Jiyuan International Hotel |
23rd Oct 2017 |
||
8:30-9:30 |
Opening and Group Photo |
|
Keynote Speech 1 Session Chair: Tatsuaki Okamoto |
||
9:30-10:30 |
Title: Computations on Encrypted Data and Privacy Speaker: David Pointcheval |
|
10:30-10:50 |
Tea Break |
|
Invited Talk 1 Session Chair: Yang Xiang |
||
10:50-11:40 |
Title: Location Privacy and its Applications Speaker: Wanlei Zhou, Tianqing Zhu |
|
Invited Talk 2 Session Chair: Yong Yu |
||
11:40-12:30 |
Title: Digital Signatures with Tight Reductions Speaker: Willy Susilo |
|
12:30-14:00 |
Lunch Buffet |
|
Session 1. Session Chair: Tom Luan |
||
14:00-14:20 |
Detection of lurkers in On-line Social Networks Flora Amato, Aniello Castiglione, Vincenzo Moscato, Antonio Picariello and Giancarlo Sperlì. |
|
14:20-14:40 |
IP Geolocation Base on Local Delay Distribution Similarity Fan Zhao, Xiangyang Luo, Yong Gan, Shuodi Zu and Fenlin Liu. |
|
14:40-15:00 |
An Online Approach to Defeating Return-Oriented-Programming Attacks Donghai Tian. |
|
15:00-15:20 |
Modeling and Hopf bifurcation analysis of benign worms with quarantine strategy Yu Yao, Qiang Fu, Chuan Sheng and Wei Yang. |
|
15:20-15:40 |
A Fair Three-party Contract Singing Protocol Based on Blockchain Hui Huang, Kuan-Ching Li and Xiaofeng Chen. |
|
15:40-16:00 |
Tea Break |
|
Session 2. Session Chair: Tianqing Zhu |
||
16:00-16:20 |
Protecting in-memory data cache with secure enclaves in untrusted cloud Yuxia Cheng. |
|
16:20-16:40 |
Privacy Preserving Authenticating and Billing Scheme for Video Streaming Service Xingwen Zhao and Hui Li. |
|
16:40-17:00 |
Accountable Multi-Authority Ciphertext-Policy Attribute-Based Encryption without Key Escrow and Key Abuse Gang Yu, Xiaoxiao Ma, Zhenfu Cao, Weihua Zhu and Junjie Zeng. |
|
17:00-17:20 |
Users' Perceived Control, Trust and Expectation on Privacy Settings of Smartphone Yun Zhou, Alexander Raake, Tao Xu and Xuyun Zhang. |
|
17:20-17:40 |
An Anonymization Method to Improve Data Utility for Classification Jianmin Han, Juan Yu, Jianfeng Lu, Hao Peng and Jiandang Wu. |
|
17:40-18:00 |
Securely Outsourcing Decentralized Multi-authority Attribute Based Signature Sun Jiameng, Qin Jing and J Ma. |
|
18:30 |
Banquet |
|
24th Oct 2017 |
||
Session 3. Session Chair: Sheng Wen |
||
8:00-8:20 |
Detecting Malicious Nodes in Medical Smartphone Networks through Euclidean Distance-based Behavioral Profiling Weizhi Meng, Wenjuan Li, Yu Wang and Man Ho Au. |
|
8:20-8:40 |
Static Taint Analysis Method for Intent Injection Vulnerability in Android Applications Xiong Bin, Guangli Xiang, Tianyu Du, Jing Selena He and Shouling Ji. |
|
8:40-9:00 |
A DP Canopy K-means Algorithm for Privacy Preservation of Hadoop Platform Tao Shang, Zheng Zhao, Zhenyu Guan and Jianwei Liu. |
|
9:20-9:40 |
HypTracker: A Hypervisor to Detect Malwares through System Call Analysis on ARM Dong Shen, Zhoujun Li and Xiaojing Su. |
|
9:40-10:00 |
Efficient CCA2 Secure Revocable Multi-Authority Large-Universe Attribute-Based Encryption Dawei Li, Jianwei Liu, Qianhong Wu and Weiran Liu. |
|
10:00-10:20 |
DexPro: A Bytecode Level Code Protection System for Android Applications Beibei Zhao, Zhanyong Tang, Xiaoqing Gong, Dingyi Fang, Fangyuan Liu and Zheng Wang. |
|
10:20-10:40 |
Tea Break |
|
Invited Talk 3 Session Chair: Sheng Wen |
||
10:40-11:30 |
Title: Physically Obfuscated Keys based Efficient Authentication Scheme for Wireless Medical Devices Speaker: Xiao-Jiang Du |
|
Session 4. Session Chair: Yu Wang |
||
11:30-11:50 |
Achieving Differential Privacy of Data Disclosure from Non-Intrusive Load Monitoring in Smart Grid Hui Cao, Zhitao Guan, Shubo Liu, Longfei Wu and Guanlin Si. |
|
11:50-12:10 |
CloudDPI: Cloud-based Privacy-preserving Deep Packet Inspection via Reversible Sketch Jie Li, Jinshu Su, Xiaofeng Wang, Hao Sun and Shuhui Chen. |
|
12:10-12:30 |
A novel image encryption scheme using Josephus permutation and image filtering Binxuan Xu, Hejiao Huang and Zhongyun Hua. |
|
12:30-14:00 |
Lunch Buffet |
|
Session 5. Session Chair: Sheng Wen |
||
14:00-14:20 |
Secure Role-based Access Control over Outsourced EMRs against Unwanted Leakage Xingguang Zhou, Jianwei Liu, Qianhong Wu and Zongyang Zhang. |
|
14:20-14:40 |
Privacy-preserving Comparable Encryption Scheme in Cloud Computing Qian Meng, Jianfeng Ma, Kefei Chen, Yinbin Miao and Tengfei Yang. |
|
14:40-15:00 |
Noise Smoothing Camera Model Identification Yuying Liu, Yonggang Huang, Jun Zhang and Xu Liu. |
|
15:00-15:20 |
A Fibonacci based batch auditing protocol for cloud data Jian Shen, Jun Shen, Chen Wang and Anxi Wang. |
|
15:20-15:40 |
Optimization of Cloud Workflow Scheduling Based on Balanced Clustering Lei Zhang, Dongjin Yu and Hongsheng Zheng. |
|
15:40-16:00 |
Tea Break |
|
16:00-16:20 |
An efficient and provably secure pairing-free certificateless signature scheme based on variant of RSA Liangliang Wang, Mi Wen, Kefei Chen, Zhongqin Bi and Yu Long. |
|
16:20-16:40 |
Two-phase Locality-Sensitive Hashing for Privacy-preserving Distributed Service Recommendation Lianyong Qi, Wanchun Dou and Xuyun Zhang. |
|
16:40-17:00 |
A New Way for Extracting Region of Interest from Palmprint by Detecting Key Points Zhiqiang Gao, Yong Ding and Huiyong Wang. |
|
17:00-17:20 |
A WeChat User Geolocating Algorithm Based on the Relation Between Reported and Actual Distance Wenqi Shi, Xiangyang Luo, Fan Zhao, Ziru Peng and Yong Gan. |
|
17:20-17:40 |
My Smartphone Knows Your Health Data: Exploiting Android-Based Deception Attacks Against Smartbands Jun Xie, Sha Wu, Yansong Li, Jun Guo, Wen Sun and Jiajia Liu. |
|
17:40-18:00 |
A Privacy-Preserving Framework for Collaborative Intrusion Detection Networks through Fog Computing Yu Wang, Lin Xie, Wenjuan Li, Weizhi Meng and Jin Li. |
|
18:30 |
Banquet |
|
25th Oct 2017 |
||
Session 6. Session Chair: Yu Wang |
||
8:30-8:50 |
Predicting Vulnerable Software Components using software network graph Shengjun Wei, Xiaojiang Du and Changzhen Hu. |
|
8:50-9:10 |
Trusted Industry Control System based on Hardware Security Module Yu Qin. |
|
9:10-9:30 |
An Improved Authentication Scheme for the Integrated EPR Information System Pei Wang, Hua Guo and Yuanfei Huang. |
|
9:30-9:50 |
Efficient Privacy Preserving Multi-factor Ranking with Approximate Search over Encrypted Big Cloud Data Jing He, Yiming Wu, Shouling Ji and Guangli Xiang. |
|
9:50-10:10 |
KGBIAC: Knowledge Graph Based Intelligent Alert Correlation Framework Wei Wang, Rong Jiang, Yan Jia, Aiping Li and Yi Chen |
|
10:10-10:30 |
Tea Break |
|
Session 7. Session Chair: Tianqing Zhu |
||
10:30-10:50 |
An efficient privacy-preserving palmprint authentication scheme based on homomorphic encryption Huiyong Wang, Yong Ding and Shijie Tang. |
|
10:50-11:10 |
An Information Theory Based Approach for Identifying Influential Spreaders in Temporal Networks Liang Luo, Li Tao, Hongyi Xu, Zhenyun Yuan, Hong Lai and Zili Zhang. |
|
11:10-11:30 |
On Using Wearable Devices to Steal Your Passwords: A Fuzzy Inference Approach Chao Shen, Ziqiang Ren, Yufei Chen and Zhao Wang. |
|
11:30-11:50 |
Supporting User Authorization Queries in RBAC Systems by Role-Permission Reassignment Jianfeng Lu, Yun Xin, Hao Peng, Jianmin Han and Feilong Lin. |
|
11:50-12:10 |
Cloud Data Integrity Checking with Deduplication for Confidential Data Storage Hongyu Liu and Leiting Chen |
|
12:10-12:25 |
Closing |
|
12:25-14:00 |
Lunch Buffet |