Conference Schedule

CCS 2017 Program

22nd Oct 2017

14:00-22:00

Registration

Jiyuan International Hotel

23rd Oct 2017

8:30-9:30

Opening and Group Photo

Keynote Speech 1

Session Chair: Tatsuaki Okamoto

9:30-10:30

Title: Computations on Encrypted Data and Privacy

Speaker: David Pointcheval

10:30-10:50

Tea Break

Invited Talk 1

Session Chair: Yang Xiang

10:50-11:40

Title: Location Privacy and its Applications

Speaker: Wanlei Zhou, Tianqing Zhu

Invited Talk 2

Session Chair: Yong Yu

11:40-12:30

Title: Digital Signatures with Tight Reductions

Speaker: Willy Susilo

12:30-14:00

Lunch Buffet

Session 1.

Session Chair: Tom Luan

14:00-14:20

Detection of lurkers in On-line Social Networks

Flora Amato, Aniello Castiglione, Vincenzo Moscato, Antonio Picariello and Giancarlo Sperlì.

14:20-14:40

IP Geolocation Base on Local Delay Distribution Similarity

Fan Zhao, Xiangyang Luo, Yong Gan, Shuodi Zu and Fenlin Liu.

14:40-15:00

An Online Approach to Defeating Return-Oriented-Programming Attacks

Donghai Tian.

15:00-15:20

Modeling and Hopf bifurcation analysis of benign worms with quarantine strategy

Yu Yao, Qiang Fu, Chuan Sheng and Wei Yang.

15:20-15:40

A Fair Three-party Contract Singing Protocol Based on Blockchain

Hui Huang, Kuan-Ching Li and Xiaofeng Chen.

15:40-16:00

Tea Break

Session 2.

Session Chair: Tianqing Zhu

16:00-16:20

Protecting in-memory data cache with secure enclaves in untrusted cloud

Yuxia Cheng.

16:20-16:40

Privacy Preserving Authenticating and Billing Scheme for Video Streaming Service

Xingwen Zhao and Hui Li.

16:40-17:00

Accountable Multi-Authority Ciphertext-Policy Attribute-Based Encryption without Key Escrow and Key Abuse

Gang Yu, Xiaoxiao Ma, Zhenfu Cao, Weihua Zhu and Junjie Zeng.

17:00-17:20

Users' Perceived Control, Trust and Expectation on Privacy Settings of Smartphone

Yun Zhou, Alexander Raake, Tao Xu and Xuyun Zhang.

17:20-17:40

An Anonymization Method to Improve Data Utility for Classification

Jianmin Han, Juan Yu, Jianfeng Lu, Hao Peng and Jiandang Wu.

17:40-18:00

Securely Outsourcing Decentralized Multi-authority Attribute Based Signature

Sun Jiameng, Qin Jing and J Ma.

18:30

Banquet

24th Oct 2017

Session 3.

Session Chair: Sheng Wen

8:00-8:20

Detecting Malicious Nodes in Medical Smartphone Networks through Euclidean Distance-based Behavioral Profiling

Weizhi Meng, Wenjuan Li, Yu Wang and Man Ho Au.

8:20-8:40

Static Taint Analysis Method for Intent Injection Vulnerability in Android Applications

Xiong Bin, Guangli Xiang, Tianyu Du, Jing Selena He and Shouling Ji.

8:40-9:00

A DP Canopy K-means Algorithm for Privacy Preservation of Hadoop Platform

Tao Shang, Zheng Zhao, Zhenyu Guan and Jianwei Liu.

9:20-9:40

HypTracker: A Hypervisor to Detect Malwares through System Call Analysis on ARM

Dong Shen, Zhoujun Li and Xiaojing Su.

9:40-10:00

Efficient CCA2 Secure Revocable Multi-Authority Large-Universe Attribute-Based Encryption

Dawei Li, Jianwei Liu, Qianhong Wu and Weiran Liu.

10:00-10:20

DexPro: A Bytecode Level Code Protection System for Android Applications

Beibei Zhao, Zhanyong Tang, Xiaoqing Gong, Dingyi Fang, Fangyuan Liu and Zheng Wang.

10:20-10:40

Tea Break

Invited Talk 3

Session Chair: Sheng Wen

10:40-11:30

Title: Physically Obfuscated Keys based Efficient Authentication Scheme for Wireless Medical Devices

Speaker: Xiao-Jiang Du

Session 4.

Session Chair: Yu Wang

11:30-11:50

Achieving Differential Privacy of Data Disclosure from Non-Intrusive Load Monitoring in Smart Grid

Hui Cao, Zhitao Guan, Shubo Liu, Longfei Wu and Guanlin Si.

11:50-12:10

CloudDPI: Cloud-based Privacy-preserving Deep Packet Inspection via Reversible Sketch

Jie Li, Jinshu Su, Xiaofeng Wang, Hao Sun and Shuhui Chen.

12:10-12:30

A novel image encryption scheme using Josephus permutation and image filtering

Binxuan Xu, Hejiao Huang and Zhongyun Hua.

12:30-14:00

Lunch Buffet

Session 5.

Session Chair: Sheng Wen

14:00-14:20

Secure Role-based Access Control over Outsourced EMRs against Unwanted Leakage

Xingguang Zhou, Jianwei Liu, Qianhong Wu and Zongyang Zhang.

14:20-14:40

Privacy-preserving Comparable Encryption Scheme in Cloud Computing

Qian Meng, Jianfeng Ma, Kefei Chen, Yinbin Miao and Tengfei Yang.

14:40-15:00

Noise Smoothing Camera Model Identification

Yuying Liu, Yonggang Huang, Jun Zhang and Xu Liu.

15:00-15:20

A Fibonacci based batch auditing protocol for cloud data

Jian Shen, Jun Shen, Chen Wang and Anxi Wang.

15:20-15:40

Optimization of Cloud Workflow Scheduling Based on Balanced Clustering

Lei Zhang, Dongjin Yu and Hongsheng Zheng.

15:40-16:00

Tea Break

16:00-16:20

An efficient and provably secure pairing-free certificateless signature scheme based on variant of RSA

Liangliang Wang, Mi Wen, Kefei Chen, Zhongqin Bi and Yu Long.

16:20-16:40

Two-phase Locality-Sensitive Hashing for Privacy-preserving Distributed Service Recommendation

Lianyong Qi, Wanchun Dou and Xuyun Zhang.

16:40-17:00

A New Way for Extracting Region of Interest from Palmprint by Detecting Key Points

Zhiqiang Gao, Yong Ding and Huiyong Wang.

17:00-17:20

A WeChat User Geolocating Algorithm Based on the Relation Between Reported and Actual Distance

Wenqi Shi, Xiangyang Luo, Fan Zhao, Ziru Peng and Yong Gan.

17:20-17:40

My Smartphone Knows Your Health Data: Exploiting Android-Based Deception Attacks Against Smartbands

Jun Xie, Sha Wu, Yansong Li, Jun Guo, Wen Sun and Jiajia Liu.

17:40-18:00

A Privacy-Preserving Framework for Collaborative Intrusion Detection Networks through Fog Computing

Yu Wang, Lin Xie, Wenjuan Li, Weizhi Meng and Jin Li.

18:30

Banquet

25th Oct 2017

Session 6.

Session Chair: Yu Wang

8:30-8:50

Predicting Vulnerable Software Components using software network graph

Shengjun Wei, Xiaojiang Du and Changzhen Hu.

8:50-9:10

Trusted Industry Control System based on Hardware Security Module

Yu Qin.

9:10-9:30

An Improved Authentication Scheme for the Integrated EPR Information System

Pei Wang, Hua Guo and Yuanfei Huang.

9:30-9:50

Efficient Privacy Preserving Multi-factor Ranking with Approximate Search over Encrypted Big Cloud Data

Jing He, Yiming Wu, Shouling Ji and Guangli Xiang.

9:50-10:10

KGBIAC: Knowledge Graph Based Intelligent Alert Correlation Framework

Wei Wang, Rong Jiang, Yan Jia, Aiping Li and Yi Chen

10:10-10:30

Tea Break

Session 7.

Session Chair: Tianqing Zhu

10:30-10:50

An efficient privacy-preserving palmprint authentication scheme based on homomorphic encryption

Huiyong Wang, Yong Ding and Shijie Tang.

10:50-11:10

An Information Theory Based Approach for Identifying Influential Spreaders in Temporal Networks

Liang Luo, Li Tao, Hongyi Xu, Zhenyun Yuan, Hong Lai and Zili Zhang.

11:10-11:30

On Using Wearable Devices to Steal Your Passwords: A Fuzzy Inference Approach

Chao Shen, Ziqiang Ren, Yufei Chen and Zhao Wang.

11:30-11:50

Supporting User Authorization Queries in RBAC Systems by Role-Permission Reassignment

Jianfeng Lu, Yun Xin, Hao Peng, Jianmin Han and Feilong Lin.

11:50-12:10

Cloud Data Integrity Checking with Deduplication for Confidential Data Storage

Hongyu Liu and Leiting Chen

12:10-12:25

Closing

12:25-14:00

Lunch Buffet