CSP 2021 ICMIP 2021 2021 IEEE 5th International Conference on Cryptography, Security and Privacy 2021 6th International Conference on Multimedia ...
←
→
Page content transcription
If your browser does not render page correctly, please read the page content below
CSP 2021 ICMIP 2021 January 8-10, 2021 Zhuhai, China 2021 IEEE 5th International Conference on Cryptography, Security and Privacy 2021 6th International Conference on Multimedia and Image Processing Sponsored by Supported by Patrons 11
CSP 2021 ICMIP 2021 January 8-10, 2021 Zhuhai, China Onsite Registration Guide: Arrive at the conference venue→Show your ID→Inform the conference staff of your paper ID→Sign your name on the participants list→Check your conference materials. Devices Provided by the Conference Organizer: Laptops (with MS-Office & Adobe Reader); Projectors & Screen; Laser Sticks Materials Provided by the Presenters: PowerPoint or PDF files Duration of Each Presentation: Regular Oral Session: 15 Minutes of Presentation including 2-3 Minutes of Q&A Notice: *Certificates of listener can be collected in the registration counter. *Certificates of presentation can be collected from the session chair after each session. *The organizer will not provide accommodation, so we suggest you make an early reservation. *One best presentation will be selected from each session. The best one will be announced when each session ends, and will be awarded by the session chair after each session in the meeting room. Attention: *Do not forget to wear a mask due to situation of COVID-19. *Wear your delegate badge (name tag) for all conference activities. *Take good care of your valuables at any time during the conference. Contacts: CSP 2021 ICMIP 2021 Ms. Ching Cao Ms. Sukie Yao Email: iccsp_conf@126.com Email: icmip2016@vip.163.com Tel: +86-137-3111-1131 Tel: +86-130-9633-3337 22
VENUE January 8-10, 2021 Zhuhai, China Grand Nest Hotel Zhuhai (珠海旭日湾巢酒店) Address: No.11 Tangqi Road, Tangjia Wan, Zhuhai, Guangdong 地址: 广东省珠海市唐家湾唐淇路 11 号 www.grandnesthotel.com Grand Nest Hotel Zhuhai is located in the beautiful surroundings of the Tangjia Bay in Zhuhai. The hotel has 217 individual rooms and high-end business club facilities. It is a themed boutique hotel in Zhuhai. The famous designer has designed 11 kinds of scenario rooms with ingenuity and ingenuity. The hotel is full of personality, fashion, warmth, comfort, romance and elegant design elements, creating a unique value-for-money stay experience. 3 3
Zoom Guidance Zoom Guidance Zoom Performance Chart KEYNOTE & PARALLEL SESSIONS ROOM Meeting ID Meeting Link A3 678 1262 6226 https://zoom.com.cn/j/67812626226 A6 687 1789 1504 https://zoom.com.cn/j/68717891504 B3 619 5144 3949 https://zoom.com.cn/j/61951443949 ◆Pre-Test Guidance January 8: All online attendees are required to join the pre-test via Zoom. Duration: 5 minutes for each one. Test for: Zoom operation, please get PPT or PDF slides prepared beforehand. ◆Naming Rule: ◆ Official Service WeChat Account Keynote Speaker: Keynote-Name Committee Member: Position-Name Author: Paper ID-Name Listener: Listener-Name 4 4
TABLE of CONTENTS January 8-10, 2021 Zhuhai, China Welcome Message 6 Conference Committees 7 Agenda Overview 9 Pre-test Timetable 12 Introduction of Speakers 13 Parallel Sessions Onsite Session: Data and Information Security 20 Virtual Session 1: Data security and Information Management 25 Virtual Session 2: Computer and Intelligent Computing 30 Virtual Session 3: Communication Network and Information Technology 36 Virtual Session 4: Image Processing Technology and Methods 42 One-day Tour 48 Note 49 5 5
WELCOME MESSAGE January 8-10, 2021 Zhuhai, China Welcome to 2021 IEEE 5th International Conference on Cryptography, Security and Privacy (CSP 2021), 2021 6th International Conference on Multimedia and Image Processing (ICMIP 2021). As you have been aware, COVID-19 is still out of control for many countries, and the safety and well-being of our participants is of paramount importance to us. Therefore, after serious consideration, the committee has made the difficult decision to have CSP 2021 and ICMIP 2021 as an onsite conference combined with virtual mode. The objective of the conferences is to provide a premium platform to bring together researchers, scientists, engineers, academics and graduate students to share up-to-date research results. We are confident that during this time you will get the theoretical grounding, practical knowledge, and personal contacts that will help you build a long term, profitable and sustainable communication among researchers and practitioners in the related scientific areas. We would like to express our gratitude to our distinguished speakers, IEEE and IET Fellow, Prof. Ce Zhu, University of Electronic Science and Technology of China, China; IEEE and AAAS Fellow, Prof. Jie Wu, Temple University, USA; IEEE Fellow, Prof. Guoliang XING, The Chinese University of Hong Kong, Hong Kong; Prof. Yong Guan, Iowa State University, USA; Prof. Hiroyuki Kudo, University of Tsukuba, Japan; Dr. Chau Kien Tsong, Universiti Sains Malaysia, Malaysia; Dr. Yang Liu, Harbin Institute of Technology (Shenzhen), China and other distinguished scholars for sharing their deep insights on future challenges and trends in the conferences. Special thanks go to our committee members, all the reviewers, researchers and students who participate in the conferences. Hope you will enjoy the conferences and have an unforgettable experience! Conference Committees CONFERENCE COMMITTEES 6 6
Conference Committees January 8-10, 2021 Zhuhai, China Advisory Committees Ce Zhu (IEEE and IET Fellow), University of Electronic Science and Technology of China, China Jie Wu (IEEE and AAAS Fellow), Temple University, USA Guoliang XING (IEEE Fellow), The Chinese University of Hong Kong, Hong Kong Conference Chairs Zhiwen Zhao (Dean), Beijing Normal University, Zhuahai, China Wanyang Dai, Nanjing University, China Conference Co-Chair Shuangbao Wang, Morgan State University, USA Steering Chair Yulin Wang, Wuhan University, China Program Chairs Shahram Latifi (IEEE Fellow), University of Nevada, USA Jaouhar Fattahi, Laval University, Canada Eric Sakk, Morgan State University, USA Rose Shumba, Bowie State University, USA Jalel Ben-Othman, Université de Paris, France Hiroyuki Kudo, University of Tsukuba, Japan Fehmi Jaafar, The Computer Research Institute of Montreal and Concordia University, Canada Publication Chair Jing Wang, Wuhan University, China Publicity Chairs Rongfang Bie, Beijing Normal University, China Xiangyang Hao, Information Engineering University, China 7 7
Conference Committees January 8-10, 2021 Zhuhai, China Technical Committees Sherali Zeadally, University of Kentucky, USA Hung-Yu Chien, National Chi Nan University, Taiwan Pljonkin Anton Pavlovich, Southern Federal University, Russia Paulo Batista, Cultures and Societies of the University of Évora, Portugal Daniel B. da Costa, Federal University of Ceará, Brazil Mohammad Motiur Rahman, Mawlana Bhashani Science and Technology University, Bangladesh Ashraf Darwish, Helwan University, Russia Priteshkumar Prajapati, Chandubhai S. Patel Institute of Technology, India Nagendra Swamy Siddappa Handarakally, University of Mysore, India Ivan Izonin, Lviv Polytechnic National University, Ukraine Abdelkrim Mebarki, Université des sciences et de technologie d’Oran, Algeria Jian Dong, Tianjin University of Technology and Education, China Maleerat Maliyaem, King Mongkut's University of Technology North Bangkok, Thailand Lili Nurliyana Abdullah, Universiti Putra Malaysia, Malaysia Anyong Qing, Tsinghua University, China Xiaofeng Wang, Xi'an University of Technology, China Shixiang Cao, Beijing Institute of Space Mechanics & Electricity, China Min Li, Nanjing University of Science and Technology, China Malka N.Halgamuge, Melbourne School of Engineering, Australia Chau Kien Tsong, Universiti Sains Malaysia, Malaysia Por Fei Ping, Wawasan Open University, Malaysia Asmaa Shaker Ashoor, University of Babylon, Iraq Saju Subramanian, Dr. Mahalingam College of Engineering and Technology, India 8 8
AGENDA OVERVIEW January 8-10, 2021 Zhuhai, China January 8-Friday (GMT+8) 14:00-17:30 Participants Check-in & Materials Collection Lobby 10:00-17:00 Pre-test for Online Participants January 9 -Saturday (GMT+8) Keynote Session Venue for onsite: 海鸥厅 Seagull Seminar Room, 2F Online Room: B3 Link: https://zoom.com.cn/j/61951443949 ID: 619 5144 3949 Host: Shuangbao Wang, Morgan State University, USA Opening Remarks 09:00-09:05 Prof. Zhiwen Zhao, (Dean) Beijing Normal University, Zhuahai, China Speaker I Prof. Jie Wu, Temple University, USA (IEEE and AAAS Fellow) 09:05-09:45 Speech Title: Cyber Security Defense: From Moving Target Defense to Cyber Deception 09:45-09:50 Q&A Speaker II Prof. Yong Guan, Iowa State University, USA 09:50-10:30 Speech Title: An Algebraic Quality-Time-Advantage-Based Key Establishment Paradigm for Securing Wireless Networks 10:30-10:35 Q&A 10:35-10:50 Coffee Break & Group Photo Foyer Speaker III Prof. Ce Zhu, University of Electronic Science and Technology of China, China 10:50-11:30 (IEEE and IET Fellow) Speech Title: Substitute Training for Adversarial Attacks - Is Real Training Data Really Necessary? 11:30-11:35 Q&A Speaker IV Prof. Guoliang XING, the Chinese University of Hong Kong, Hong Kong (IEEE 11:35-12:15 Fellow) Speech Title: Tackling the Challenges of Machine Learning for Mobile Health Systems 12:15-12:20 Q&A 12:20-13:30 Lunch & Break Restaurant: 中餐厅, 1F 9 9
AGENDA OVERVIEW January 8-10, 2021 Zhuhai, China Speaker V 13:30-14:00 Prof. Hiroyuki Kudo, University of Tsukuba, Japan Online Room: B3 Speech Title: Image Reconstruction for Sparse-View CT and Interior CT Link: https://zoom.com.cn/j/61951443949 ID: 619 5144 3949 Speaker VI 14:00-14:25 Dr. Yang Liu, Harbin Institute of Technology (Shenzhen), China Venue: 海鸥厅, 2F Speech Title: On the Trade-off between Privacy and Utility in Mobile Services: A Seagull Seminar Room Qualitative Study Link: https://zoom.com.cn/j/68717891504 ID: 687 1789 1504 Speaker VII Dr. Chau Kien Tsong, Universiti Sains Malaysia, Malaysia 14:00-14:25 Speech Title: The Perception of University Learners on Multimedia and Image Online Room: B3 Processing Courses in Malaysia Link: https://zoom.com.cn/j/61951443949 ID: 619 5144 3949 Parallel Sessions 14:30-16:30 Onsite Session: Data and Information Security Venue: 海鸥厅, 2F Presentation Papers: P008 P009 P014 P1004 P016 P0007 P033 Seagull Seminar Room Link: https://zoom.com.cn/j/68717891504 ID: 687 1789 1504 Online Room: A6 16:30-17:00 Coffee Break-Foyer Virtual Session 1: Data Security and Information Management 14:30-16:45 Presentation Papers: P011 P022 P027 P028 P035 P037 P036 Online Room: B3 P013 P034 Link: https://zoom.com.cn/j/61951443949 ID: 619 5144 3949 Virtual Session 2: Computer and Intelligent Computing 14:30-17:15 Presentation Papers: P023 P001 P0012 P007 P025 P0010 P2003 Online Room: A3 P021 P2004 P038 P0019 Link: https://zoom.com.cn/j/67812626226 ID: 678 1262 6226 18:00-20:00 Dinner Restaurant: 中餐厅, 1F 10 10
AGENDA OVERVIEW January 8-10, 2021 Zhuhai, China January 10-Sunday Virtual Session 3: Communication Network and Information Technology 9:30-12:00 Presentation Papers: P019 P030 P017 P024 P032 P020 P015 P004 Online Room: B3 P031 P029 Link: https://zoom.com.cn/j/61951443949 ID: 619 5144 3949 Virtual Session 4: Image Processing Technology and Methods 9:30-12:00 Presentation Papers: P0009 P010 P0013 P0014 P0015 P0016 P0017 Online Room: A3 P0001 P0011 P2001 P2005 Link: https://zoom.com.cn/j/67812626226 ID: 678 1262 6226 One Day Tour in Zhuhai CONFERENCE VENUE 11 11
Pre-test Timetable January 8-Friday (GMT+8) Online Room: B3 Link: https://zoom.com.cn/j/61951443949 ID: 619 5144 3949 Time Paper ID Time Paper ID Morning P019 P034 P017 P001 P015 & P030 P0012 P031 P007 P032 P025 10:00-10:50 11:00-11:50 P023 P0010 P011 P2003 & P2004 P022 P024 P013 P020 P004 P029 Afternoon P0009 P027 P010 P028 P0013 P035 P0014 15:00-15:50 P037 P0015 P036 14:00-14:50 P0016 P021 P0017 P038 P0001 P0011 P2001 Note: 16:00-17:00 alternative time for participants who are unavailable at allocated time. 12 12
Introduction of Speakers Jie Wu Speech Title: Cyber Security Defense: From Moving Target Defense to Cyber Deception Abstract: Deception technology is an emerging field of cyber security defense. Products from deception technology can detect, analyze, and defend against zero-day and advanced attacks. The talk starts with the discussion of some unique challenges with cyber deception, as compared with some other deception technology such as in the military. We then focus on moving target defense with a couple of examples and some recent results. Finally, we discuss several future directions of cyber deception research with a focus on Temple University, USA game and theoretical models. Biography: Jie Wu is the Director of the Center for Networked Computing and Laura H. Carnell professor at Temple University. He also serves as the Director of International Affairs at College of Science and Technology. He served as Chair of Department of Computer and Information Sciences from the summer of 2009 to the summer of 2016 and Associate Vice Provost for International Affairs from the fall of 2015 to the summer of 2017. Prior to joining Temple University, he was a program director at the National Science Foundation and was a distinguished professor at Florida Atlantic University. His current research interests include mobile computing and wireless networks, routing protocols, cloud and green computing, network trust and security, and social network applications. Dr. Wu regularly publishes in scholarly journals, conference proceedings, and books. He serves on several editorial boards, including IEEE Transactions on Mobile Computing, IEEE Transactions on Service Computing, Journal of Parallel and Distributed Computing, and Journal of Computer Science and Technology. Dr. Wu was general co-chair for IEEE MASS 2006, IEEE IPDPS 2008, IEEE ICDCS 2013, ACM MobiHoc 2014, ICPP 2016, and IEEE CNS 2016, as well as program co- chair for IEEE INFOCOM 2011 and CCF CNCC 2013. He was an IEEE Computer Society Distinguished Visitor, ACM Distinguished Speaker, and chair for the IEEE Technical Committee on Distributed Processing (TCDP). Dr. Wu is a Fellow of the AAAS and a Fellow of the IEEE. He is the recipient of the 2011 China Computer Federation (CCF) Overseas Outstanding Achievement Award. 13 13
Introduction of Speakers Yong Guan Speech Title: An Algebraic Quality-Time-Advantage-Based Key Establishment Paradigm for Securing Wireless Networks Abstract: The essence of information assurance resides in the ability to establish secret keys between the legitimate communicating parties. Common approaches to key establishment include public-key infrastructure, key-distribution centers, physical-layer security, or key extraction from common randomness. Of these, the latter two are based on specific natural advantages that the legitimate parties hold over their adversaries – most often, such advantages rely on superior or privileged communication channels. Our efforts in this work tackle a key-establishment protocol that relies on a completely different type of advantage: time. The protocol builds Iowa State University, USA on the idea that when two devices are able to spend a pre-determined, mostly uninterrupted, interval of time in the company of each other, and when such a feat is outside the capability of any realistic attacker, then the legitimate parties should be able to establish a secret key without any prior common information. In this talk, we will present a basic efficient time-based key establishment protocol, and demonstrate how it can be extended to follow customized information transfer functions and deal with predictable fluctuations of wireless interference. This line of research starting from our Adopted-Pet protocol, has created a full set of research opportunities and new paradigm in securing the next-generation wireless networks such as various IoT and 5G systems. Biography: Dr. Yong Guan is a professor of Electrical and Computer Engineering, the Associate Director for Research of Information Assurance Center at Iowa State University, and Cyber Forensics Coordinator of the NIST Center of Excellence in Forensic Sciences – CSAFE. He received his Ph.D. degree in Computer Science from Texas A&M University in 2002, MS and BS degrees in Computer Science from Peking University in 1996 and 1990, respectively. With the support of NSF, IARPA, NIST, and ARO, his research focuses on security and privacy issues, including digital forensics, network security, and privacy-enhancing technologies for the Internet. The resulted solutions have addressed issues in attack attribution, secure network coding, key management, localization, computer forensics, anonymity, and online frauds detection. He served as the general chair of 2008 IEEE Symposium on Security and Privacy (Oakland 2008, the top conference in security), co-organizer for ARO Workshop on Digital Forensics, and the co-coordinator of Digital Forensics Working Group at NSA/DHS CAE Principals Meetings. Dr. Guan has been recognized by awards including NSF Career Award, ISU Award for Early Achievement in Research, the Litton Industries Professorship, and the Outstanding Community Service Award of IEEE Technical Committee on Security and Privacy. 14 14
Introduction of Speakers Ce Zhu Speech Title: Substitute Training for Adversarial Attacks - Is Real Training Data Really Necessary? Abstract: Recent study shows machine learning models are extremely vulnerable to adversarial attacks. Substitute attacks, typically black-box ones, employ pre-trained models to generate adversarial examples. It is generally accepted that substitute attacks need to acquire a large amount of real training data combined with model-stealing methods to obtain a University of Electronic Science substitute model. However, the real training data may be difficult (if not and Technology of China, China impossible) to be obtained for some practical tasks, e.g., in medical or financial sectors. As the first trial study, the talk will present our recently developed data-free model-stealing method for substitute training that does not require any real training data. The experimental results demonstrate that the substitute models produced by the proposed method without any real training data can achieve competitive performance against the baseline models trained by the same training set as in attacked models. Biography: Ce ZHU is currently with the School of Information and Communication Engineering, University of Electronic Science and Technology of China (UESTC), China, as a Changjiang Professor and the founding Director of Lab of Advanced Visual Communication & Computing. He was with the School of Electrical & Electronic Engineering, Nanyang Technological University (NTU), Singapore, for 14 years from 1998 to 2012, where he was a Research Fellow, a Program Manager, an Assistant Professor and then promoted to an Associate Professor in 2005. He also held visiting positions at Queen Mary, University of London (UK) in 2008, and Nagoya University (Japan) in 2011. Before that, he pursued postdoctoral research at the Chinese University of Hong Kong, Hong Kong, in 1995, City University of Hong Kong, Hong Kong, and the University of Melbourne, Australia, from 1996 to 1998. He received the B.S. degree from Sichuan University, Chengdu, China, in 1989, and the M.Eng and Ph.D. degrees from Southeast University, Nanjing, China, in 1992 and 1994, respectively, all in electronic and information engineering. He is a Fellow of the IEEE (2017, "for contributions to video coding and communications"), and a Fellow of the IET (2014). He is an IEEE Distinguished Lecturer of CASS (2019-2020) and of BTS (2012- ). More details... 15 15
Introduction of Speakers Guoliang XING Speech Title: Tackling the Challenges of Machine Learning for Mobile Health Systems Abstract: The prominence of mobile devices and recent breakthroughs in machine learning have enabled an emerging class of new mobile health systems which hold the promise of transforming today’s reactive healthcare practice to proactive, individualized care and wellbeing. However, the current mainstream machine learning approaches are largely supervised and must be trained by a large amount of labelled high-quality data. Moreover, personal health data collected by on-device sensors cannot be The Chinese University of uploaded or shared with other devices due to privacy concerns. These Hong Kong, Hong Kong challenges have significantly hindered the performance and utility of mobile health systems in real-world settings. In this talk, I will first discuss new mobile systems that exploit human physiological models and innovative use of sensing modalities to achieve highly robust sensing performance without requiring extensive training. I will describe RunBuddy - the first smartphone-based system for monitoring continuous running rhythm and improving exercise efficiency. Based on this result, we also develop BreathCoach, a smart and unobtrusive system using smartwatch and smartphone-based VR for in-home RSA-BT (Respiratory Sinus Arrhythmia biofeedback-based Breathing Training), which is a common cardiorespiratory intervention to diseases such as asthma and an effective exercise to reduce anxiety. More details... Biography: Prof. Guoliang Xing received the B.S. and M.S degrees from Xi’an Jiao Tong University, China, in 1998 and 2001, and the D.Sc. degree from Washington University in St. Louis, in 2006. He is currently a Professor in the Department of Information Engineering, the Chinese University of Hong Kong. Previously, he was a faculty member at City University of Hong Kong and Michigan State University, U.S. Professor Xing’s research lies at the intersection between systems, embedded AI, data/information processing algorithms, and domain sciences, with a focus on interdisciplinary applications in health, environment, and energy. His research group develops new technologies at the frontier of mobile health, Cyber-Physical Systems (CPS), Internet of Things (IoT), wireless networks, security and privacy. Several mobile health 16 16
Introduction of Speakers Hiroyuki Kudo Speech Title: Image Reconstruction for Sparse-View CT and Interior CT Abstract: Since 2000, it has been widely recognized that radiation dose in CT examinations increases cancer risk. To overcome this drawback, new designs of CT scanners such as sparse-view CT and interior CT have been actively investigated in CT community. The sparse-view CT refers to CT in which the number of projection data is reduced to decrease patient dose as well as to accelerate data acquisition. The interior CT refers to CT in which x-rays are radiated only to a small region of interest (ROI) to decrease University of Tsukuba, Japan patient dose. A key in these scanners is how to reconstruct images with sufficient quality from the limited projection data. This talk mainly consists of two parts. The first part is concerned with image reconstruction for the sparse-view CT using Compressed Sensing (CS) and Deep Learning (DL). CS is a promising technique appeared around 2005, which is able to reconstruct high-quality images even from the limited number of projection data. Furthermore, since 2018, DL has also been investigated for the sparse-view CT image reconstruction. The explanation will be constructed as follows. First, we explain basic knowledge on this subject, which includes the principle of sparse-view CT, as well as the principle of CS and DL image reconstruction. Second, we introduce our recent research activities on this topic, as well as showing application examples to medical xray CT, x-ray phase CT, and electron tomography. The second part is concerned with image reconstruction for interior CT. More details... Biography: In March 1990. Hiroyuki Kudo received his doctoral degree in electrical and communication engineering from the Tohoku University, Japan. Since then, he has worked at the Tohoku University for 2 years, and then at the University of Tsukuba for 28 years. Currently, he is a Professor at Faculty of Engineering, Information and Systems, the University of Tsukuba, Japan. His scientific interests include medical image analysis, image reconstruction for medical tomography devices such as Computed Tomography (CT) and Positron Emission Tomography (PET), and computer-aided-diagnosis. In particular, he spent a long time of his research career to develop advanced image reconstruction methods in tomography. Most of his research results have been published in top journals in this research field such as Physics in Medicine and Biology and IEEE Transactions on Medical Imaging. Furthermore, his papers have been cited 4,000 times in Google Scholar and 2,000 times in Web of Science, in total. and worked as a Guest Editor for IEEE Transactions on Medical Imaging. More details... 17 17
Introduction of Speakers Yang Liu Speech Title: On the Trade-off between Privacy and Utility in Mobile Services: A Qualitative Study Abstract: While the widespread use of mobile services offers a variety of benefits to mobile users, it also raises serious privacy concerns. We report the results of a user study that investigated the factors that influence the decision-making process pertaining to the trade-off between privacy and utility in mobile services. Through two focus groups, 16 individual interviews and a questionnaire survey involving 60 participants, the study Harbin Institute of Technology identified awareness and knowledge of privacy risks, trust in service (Shenzhen), China providers, desire for mobile services, and belief of cyber privacy as four factors that contribute to the perceived trade-off. The results also suggest that, with appropriate adoption, privacy-preserving tools can positively influence the privacy trade-off. In addition, our findings explore the cultural differences regarding privacy between participants from western countries (with the UK as the main representative) and China. In particular, the results suggest that participants from China are more likely to be comfortable with a government department protecting their individual privacy, while participants from western countries are more likely to wish to see such responsibility reside with some combination of individuals and non-governmental organisations. Biography: Yang Liu received his D.Phil (PhD) degree in Computer Science from University of Oxford in July 2018. Prior to joining Oxford, He received an MSc from Peking University and a B.Eng from Ocean University of China. He is currently an Assistant Professor and an Associate Research Fellow in School of Computer Science and Technology, Harbin Institute of Technology (Shenzhen), China. He is also a dual-employed research scholar in Cyber Security Research Center, Peng Cheng Laboratory (Provincial Laboratory of Cyberspace Science and Technology of Guangdong). He is interested in security and privacy problems and, in particular, the privacy issues on mobile devices and Internet of Things (IoT). He has received research grants for more than 4 million RMB during the past two years. He is currently undertaking several national, provincial and municipal scientific research projects directly related to the topic of privacy protection. 18 18
Introduction of Speakers Chau Kien Tsong Speech Title: The Perception of University Learners on Multimedia and Image Processing Courses in Malaysia Abstract: Multimedia and Image Processing Courses are always presumed as difficult and hard subjects for students in the Universities. These are attributed to their technical algorithms and abstract concepts in the two courses. In this talk, Dr Chau will present the research outcomes on his students on why and what makes this two courses difficult from the perspectives of the students. Knowledge and understanding in these respect would facilitate effective teaching and learning, thereby allow the students Universiti Sains Malaysia, to attain better learning performance for these two subjects in University. Malaysia Discussion on these two courses are of significance because Multimedia and Image Processing are foundational courses for higher end courses such as Artificial Intelligence courses. Biography: Dr. Chau Kien Tsong is Deputy Director (Postgraduate, Network & Alumni) at the Centre for Instructional Technology and Multimedia, Universiti Sains Malaysia (USM), Penang, Malaysia. Dr. Chau received his undergraduate degree from the National University of Malaysia (UKM). He has Master of Science (IT) from Prince University of Malaysia (UPM). His PhD. degree is from USM. His academic background is image processing, multimedia authoring, 2D and 3D animations, and educational technology. He has been recognised for excellence in teaching and research, earning 2 gold medals in two international innovation competitions held in 2018 in Malaysia and best paper award for research paper on motivated sensing multimedia system for preschoolers in “International Conference on Education, Teaching, and E-Learning” in 2017. Prior to his career at the USM, Dr. Chau was a research fellow in USM. Dr. Chau is currently editorial board members of three international journals, academic consultant and external examiner of private institutions of higher learning in Malaysia, META and IEEE member, and has been judge, session chair, and program committee for several conferences. Dr. Chau has over 25 publications, which include SCOPUS and ERA indexed journals. 19 19
Parallel Sessions Time Zone: GMT+8 Tips: Please arrive at conference room/join in online meeting room 15 minutes earlier. There will be a session group photo part at the end of each session. Onsite Session: Data and Information Security Chair: Dr. Yang Liu, Harbin Institute of Technology (Shenzhen), China Time: 14:30-16:30, January 9 Venue: 海鸥厅 Seagull Seminar Room, 2F Online Room: A6 Link: https://zoom.com.cn/j/68717891504 ID: 687 1789 1504 P002 A Partial-Lifting-Based Compiling Concolic Execution Approach 14:30-14:45 Haotian Zhang State Key Laboratory of Mathematical Engineering and Advanced Computing, China Abstract-It has been a common phenomenon that embedded devices are used ubiquitously while the security of proprietary software running on devices has become more and more significant. These softwares are often presented to researchers in binary forms. Due to the lack of program semantics and meta-information, it is very difficult to analyze manually in large-scale binary programs. Therefore, automatic binary program analysis has become a critical research direction. Symbolic execution is an important method of automatic analysis, due to the problem of path explosion in traditional symbolic execution, it is sometimes complecated to explore the deep-level path of the program, and the most of current execution engines using IR translation execution, resulting in symbolic execution velocity has been exceedingly restrained, comparing to native execution. To this end, we propose a binary program oriented partial-lifting-based compile concolic execution approach, which is combined with static analysis to dissect the binary parts that researchers are intrigued in. The program is simultaneously combined with semantic lifting, dynamic memory monitoring, and symbolic compiler to reconstruct it into a symbolic binary program. Users can perform concolic execution on this program repeatly, so as to explore the part of the original binary program at a rate close to nativeexecution. 20 20
CSP 2021 ICMIP 2021 P008 A Blockchain-based Privacy-Preserving Recommendation Mechanism 14:45-15:00 Liangjie Lin Harbin Institute of Technology (Shenzhen), China Abstract-System is widely used to predict users’ interests and provide targeted products for them, which effectively facilitates users in the era of big data where information overload problem is prevalent. Unfortunately, massive data closely related to users’ privacy is in high demand to produce more accurate predictions. In this case, the collection and transmission of such data is communication costly; to process and analyze such data is of high possibility to compromise users’ privacy. In this paper, we propose a privacy-preserving recommendation mechanism based on blockchain, which well addresses these problems. Leveraging the inherent advantages of blockchain, we establish a completely distributed model mitigating the risk of privacy disclosure caused by central data storage. Moreover, we combine Inter-Planetary File System with blockchain to greatly improve the communication efficiency. We also introduce local sensitive hashing and local differential privacy into proposed mechanism to reduce the computation load and provide a strong privacy guarantee. The experimental results demonstrate that the proposed mechanism shows better performance on privacy preservation while maintaining desirable recommendation accuracy when compared with the baseline. P009 A Novel Edge Computing Offloading and Privacy-preserving Scheme for Energy 15:00-15:15 Internet Kunchang Li North China Electric Power University, China Abstract-With the rapid development of Internet of things technology, "massive" data generated by Internet of things terminals ,which leads to the problem of excessive cloud computing pressure and network delay. Therefore, edge computing emerges as the time requires. At the same time, the privacy security of edge computing is particularly important. In this paper, ZSS short signature algorithm and Paillier homomorphic cryptosystem are used to propose a secure and efficient edge computing privacy-preserving in energy Internet. The scheme can achieve data confidentiality and privacy-preserving. Finally, the model of unloading is established to solve the problem quickly. Experimental results show that our scheme has less computation and communication overhead. 21 21
CSP 2021 ICMIP 2021 P014 Dimensionality-reduced Secure Outlier Detection on Union of Subspaces 15:15-15:30 Kunzan Liu Tsinghua University, China Abstract-In the problem of outlier detection (OD) on a union of subspaces (UoS), inliers are assumed to lie around a union of low-dimensional subspaces, and the goal is to detect the outliers that are not close to any of these subspaces. Among various algorithms, sparse self-representation-based ones have attracted much attention because of their theoretical performance guarantee. However, these algorithms need direct access to all raw data, and thus have poor data security and privacy protection capability. To solve this problem, in this paper we propose a new algorithm called dimensionalityreduced secure outlier detection (DrSOD), which uses random projection as a preprocessing step to avoid direct access to the raw data. We theoretically prove that DrSOD can correctly detect outliers with overwhelming probability under connectivity assumptions. In addition, the random projection step improves the computational efficiency of the algorithm. Experiments on synthetic and real-world datasets also demonstrate the effectiveness and efficiency of DrSOD. P1004 Research on Malware Variant Detection Method Based on Deep Neural Network 15:30-15:45 XING Jianhua Beijing Jinghang Computation and Communication Research Institute, China Abstract-To deal with the increasingly serious threat of industrial information malicious code, the simulations and characteristics of the domestic security and controllable operating system and office software were implemented in the virtual sandbox environment based on virtualization technology in this study. Firstly, the serialization detection scheme based on the convolution neural network algorithm was improved. Then, the API sequence was modeled and analyzed by the improved convolution neural network algorithm to excavate more local related information of variant sequences. Finally the variant detection of malicious code was realized.Results showed that this improved method had higher efficiency and accuracy for a large number of malicious code detection, and could be applied to the malicious code detection in security and controllable operating system. 22 22
CSP 2021 ICMIP 2021 P016 A LSTM-Based Channel Fingerprinting Method for Intrusion Detection 15:45-16:00 Ma Ting Southwest Petroleum University, China Abstract-Intrusion detection is a crucial issue for 5th generation (5G) access networks to securely support various services. Traditional cryptographic key-based solutions are not suitable for severe resources-constrained networks, such as the Internet of Things (IoT). In this paper, we propose a lightweight intrusion detection mechanism by exploring physical layer attributes that are unique and difficult to impersonate. Specifically, a long-short memory network (LSTM) is employed as an intelligent classifier to distinguish different transmitters based on channel state information (CSI) features. Then we develop a comprehensive 5G NR channel detection model based on LSTM under dynamic channel conditions to identify malicious attacks by intelligently analyzing CSI. The simulation results demonstrate that the proposed solution improves detection accuracy and successfully prevent systems from spoofing attacks. P0007 Nonlinear Filtered Compressed Sensing Applied on Image De-noising 16:00-16:15 Jian Dong Tianjin University of Technology and Education, China Abstract-In the present era, the need for studies on noise removal by image processing is still considerable. In this paper, we developed a compressed sensing (CS) based algorithm for image de-nosing. Optimization theory was utilized. A cost function consisting of data fidelity term and penalty term was proposed. The minimization of cost function was achieved by proximal minimization method. The advantage of the algorithm is two-fold. First, we embedded the filtering procedure into a CS framework. It enhanced the effectiveness of filtering strategy. As known, repetitive post filters make images blurred, but CS in the proposed algorithm could keep the image clarity while achieving noise depression. Second, selectivity of filter type, especially nonlinear filters, strengthened the effectiveness and practicability of CS. With increasing number of literatures revealing the failure of total variation (TV) method in processing images with rich details, the new algorithm could preserve image textures and object boundaries accurately. Convergence property of the novel algorithm was also proved by the de-nosing instance. Among the nonlinear filters, nonlocal weighted median filter based CS presented the best de-noising effectiveness. The algorithm is considered to have a potential application value in other image processing issues, such as image restoration and reconstruction. 23 23
CSP 2021 ICMIP 2021 P033 DECH: A novel attack pattern of cloud environment and its countermeasures 16:15-16:30 Haoyu Gao College of Data Science and Application, Inner Mongolia University of Technology, China Abstract-Cloud computing has become more and more vital in digital world as a basic technique of many services. As the foundation of cloud computing, the cloud platform hosts various cloud services running on it and providing interfaces to cloud users. Thus, it becomes a high-value target in attacker’s eyes. This paper proposes a novel attack pattern named DECH for intruding and controlling a cloud platform standing on the side of attackers. From the defenders’ perspective, this paper points out the key measures to enforce cloud service security are to restrict the Trust Computing Base (TCB) size and strengthen the isolation between cloud components. Then we provide countermeasures against “Detect Escape Control and Harvest” (DECH) based on the combination of Software Guard Extensions (SGX) and Trust Domain Extensions (TDE). This research provisions references for building secure cloud services. 24 24
CSP 2021 ICMIP 2021 Virtual Session 1: Data Security and Information Management Chair: Prof. Martin Butler, Stellenbosch University, South Africa Time: 14:30-16:45, January 9 Online Room: B3 Link: https://zoom.com.cn/j/61951443949 ID: 619 5144 3949 P011 ECDSA-Compatible Privacy Preserving Signature with Designated Verifier 14:30-14:45 Sam Ng Crypto.com, Hong Kong Abstract-We present the first ECDSA compatible privacy preserving signature scheme, which is based on the work of nominative signature, with a designated verifier. The use case for this signature scheme is to sign personal information. For example, a user can prove to an insurance company that they are diagnosed with a certain disease and is eligible for an insurance claim. The insurance company will be convinced the doctor’s signature is genuine but it cannot leak the information with a convincing proof (i.e. the signature verification proof is not transferable, but leaking information without a proof is still possible). As in our example, the signature generation has to be initiated by the patient, with the help of the doctor, and the signature can only be verified by interacting with the patient directly. P022 PRADroid: Privacy Risk Assessment for Android Applications 14:45-15:00 Yang Yang Henan Province Key Laboratory of Information Security, China Abstract-Android has become the most popular mobile operating system all over the world. Due to its openness, users can install applications freely. At the same time, users are increasingly storing personal privacy information in their mobile phones, which has led to Android becoming the main target of malicious applications, and privacy leaks have occurred from time to time. Although the Android operating system provides the permissions to restrict the ability of applications to access sensitive resources, users do not pay much attention to the granting of permissions, which makes malicious applications available. Therefore, it is of great significance to make risk assessments for applications before installation. In this paper we propose a privacy risk assessment framework called PRADroid for Android applications. Through likelihood assessment based on permissions and severity assessment based on information flow analysis, a risk matrix is finally generated to score the application privacy risk. We evaluate PRADroid on 2000 Android applications, and the experimental results show that PRADroid can score reasonably and effectively. 25 25
CSP 2021 ICMIP 2021 P027 DOSing Distributed Ledger Technology: IOTA 15:00-15:15 Mark A. Brady University of Twente, Netherlands Abstract-With advancements in connected technology, the number of ambitious applications involving Internet of Things (IoT) are drastically growing. This increases concerns related to security, scalability, and interoperability of IoT. As the network of connected devices grows, decentralized technologies become inevitable. Within this trend towards decentralization, distributed ledger technology (for instance IOTA) will be a significant driving force. IOTA is an innovative distributed ledger technology targeted towards low power devices, where energy efficiency is a high priority. Public research regarding security threats against IOTA especially denial-of-service (DoS) is essentially non-existent. In this paper we focus on exploring a DoS attack against IOTA. The proposed attack methodology takes advantage of the lack of fees along with the ability to transfer minuscule amounts. By sending many conflicting transactions as it results in a high number of re-attachments. The high number of re-attachments threatens IOTA’s suitability for the IoT sphere. The implications of such attack, as well as the future of this issue in terms of the planned removal of the centralized coordinator are discussed. P028 The Influence of Mobile Operation Systems on Mobile User Security Behavior 15:15-15:30 Martin J Butler Stellenbosch University, South Africa Abstract-Mobile security remains a concern for multiple stakeholders. Safe user behavior is crucial key to avoid and mitigate mobile threats. The research used a survey design to capture key constructs of mobile user threat avoidance behavior. Analysis revealed that there is no significant difference between the two key drivers of secure behavior, threat appraisal and coping appraisal, for Android and iOS users. However, statistically significant differences in avoidance motivation and avoidance behavior of users of the two operating systems were displayed. This indicates that existing threat avoidance models may be insufficient to comprehensively deal with factors that affect mobile user behavior. A newly introduced variable, perceived security, shows a difference in the perceptions of their level of protection among the users of the two operating systems, providing a new direction for research into mobile security. these methods. Finally, the developed models are reliable for not only the conceptual phase of future rural road projects but also the related construction fields can be recovered about the cost model creation. 26 26
CSP 2021 ICMIP 2021 for track utilization charges. In this study, the costs of infrastructure construction and maintenance on 5 route sections representing different traffic characteristics were studied by using records from 5 years. It was found that the maintenance cost of the telecommunication and signalling system ranges from 1.3 to 1.7 million baht per year per station. The average annual maintenance cost of the railway track was 280,000 to 310,000 baht per track per kilometre. The traffic density was found to be the main factor that influenced the maintenance cost. P035 velink - A Blockchain-based Shared Mobility Platform for Private and Commercial 15:30-15:45 Vehicles utilizing ERC-721 Tokens Dominic Pirker Graz University of Technology, Austria Abstract-Transportation of people and goods is important and crucial in the context of smart cities. The trend in regard of people’s mobility is moving from privately owned vehicles towards shared mobility. This trend is even stronger in urban areas, where space for parking is limited, and the mobility is supported by the public transport system, which lowers the need for private vehicles. Several challenges and barriers of currently available solutions retard a massive growth of this mobility option, such as the trust problem, data monopolism, or intermediary costs. Decentralizing mobility management is a promising approach to solve the current problems of the mobility market, allowing to move towards a more usable internet of mobility and smart transportation. Leveraging blockchain technology allows to cut intermediary costs, by utilizing smart contracts. Important in this ecosystem is the proof of identity of participants in the blockchain network. To proof the possession of the claimed identity, the private key corresponding to the wallet address is utilized, and therefore essential to protect. In this paper, a blockchain-based shared mobility platform is proposed and a proof-of-concept is shown. First, current problems and stateof- the-art systems are analyzed. Then, a decentralized concept is built based on ERC-721 tokens, implemented in a smart contract, and augmented with a Hardware Security Module (HSM) to protect the confidential key material. Finally, the system is evaluated and compared against state-of-the-art solutions. P037 Lightweight Blockchain-based Platform for GDPR-Compliant Personal Data 15:45-16:00 Management Cristòfol Daudén-Esmel Universitat Rovira i Virgili, Spain Abstract-New digital technologies generate large amounts of information. This data is processed by Service Providers in order to improve and develop new services or products, but also to fund themselves. However, processing these personal data can result in the extraction of sensitive information. 27 27
CSP 2021 ICMIP 2021 In consequence, it can lead to users’ privacy risk. To mitigate this risk, the EU elaborated the GDPR. It forces Service Providers to have Data Subjects’ explicit consent for collecting and processing their personal data. The problem is that legislative text does not define how to transparently demonstrate that they already have this consent. Also, most users do not know the rights they have over their personal data, neither this regulation provides techniques for them to be aware about what happens with it. In this paper, we propose a lightweight blockchain-based GDPRcompliant personal data management platform. It provides public access to immutable evidences that show the agreements between the Data Subjects and Service Providers. The Service Providers can demonstrate that they are fulfilling the regulation, and Data Subjects are aware about what happens with their personal data and can manage it according to their rights. P036 Assessment of Remote Biometric Authentication Systems: Another Take on the 16:00-16:15 Quest to Replace Passwords Daniel Köhler Hasso Plattner Institure, Germany Abstract—Passwords are often criticized due to being prone to misuses such as bad password creation and management practices. Experts usually advise using other forms of authentication. While there are plenty of alternative authentication methods available, an overall assessment often proves to be challenging. This is because of aspects such as differences in security techniques, different applicability of the system, or varying difficulties of implementation. To tackle the issue of comparing different authentication systems, unified criteria are needed. Bonneau et al. proposed a framework for comparing authentication schemes in their ”The Quest to Replace Passwords”. We contribute to the quest by providing information and assessment on the previously unassessed Remote Biometric Authentication Systems, thus increasing the variety of analyzed systems. We achieve this by analyzing six exemplary implementations. To enable proper evaluation of the details of that new category of authentication schemes, this work furthermore expands the framework by the two aspects Resilient-to-Biometric-Loss and No-Trusted-Execution-Environments. 28 28
CSP 2021 ICMIP 2021 P013 Detecting Android Malware Based on Dynamic Feature Sequence and Attention 16:15-16:30 Mechanism Hanlin Long Harbin Institute of Technology (Shenzhen), China Abstract-The mechanism of running software on virtual machines partly ensures the security of Android system. However, with all kinds of malicious codes being developed, there has been a huge number of massive security incidents caused by malware on Android. Malware has various code patterns, but their behaviors are measurable. In this paper, a new method of detecting Android malware by analyzing malware’s behaviors is proposed. The method is characterized by the ability to mine the contextual relationships between system calls and network activities. Besides, the method requires only a small data set to achieve good classification performance. We propose a set of methods for automatically collecting and organizing dynamic features from Android application Based on the collected features, deep neural network is used to classify software samples. We validate the effectiveness of the proposed method on a set of 2210 applications obtained from Androzoo. The experimental results demonstrate that the proposed method has high detection accuracy against wild malware as compared with other methods. P034 A Study on Privacy Issues in Internet of Things (IoT) 16:30-16:45 Mayasarah Maslizan Cybersecurity Malaysia, Malaysia Abstract-Internet of Things (IoT) is an interconnected wireless network where smart nodes (IoT devices) interact with each other in order to exchange data through the communicating medium. Internet of Things (IoT) have rapidly increased in popularity, demand and commercial availability within the past several years. Various IoT applications generate a huge amount of data from different types of resources, including smart cities, manufacturing industries, health institutions, and governments. Due to the pervasive nature of IoT and the limitless opportunities that this technology provides, security and privacy becomes two key concerns for the users of these smart offerings. Most of the privacy threats disclosing the private information to unwanted party and gives rise to serious implications in various IoT application. Thus, this paper will analyse existing literature related to various privacy threats in IoT, privacy issues in different applications of IoT and present summary of the study. 29 29
CSP 2021 ICMIP 2021 Virtual Session 2: Computer and Intelligent Computing Chair: Dr. Chau Kien Tsong, Universiti Sains Malaysia, Malaysia Time: 14:30-17:15, January 9 Online Room: A3 Link: https://zoom.com.cn/j/67812626226 ID: 678 1262 6226 P023 Forensic Analysis of Binary Structures of Video Files 14:30-14:45 Md Abir Hasan University of Alaska Fairbanks, USA Abstract-As technology advances, multimedia files such as videos are susceptible to manipulation. This has led to serious concerns that images and videos are not trustworthy evidence as the files can be manipulated easily. As a result, forensic analysis of electronic multimedia files plays an important role in verifying the authenticity of video files. This paper provides comprehensive details of a binary file forensic analysis technique for different media file containers, mostly focused on AVI and MP4/MOV container format. We also provide a considerable number of details to identify a forgery among video files. We present pivotal parameters which need to be tested to authenticate a video file. By analyzing the binary data structures and metadata, we can detect the use of editing tools, verify the purported source of a video file, and identify the true acquisition device model. P001 Trend Analysis and Countermeasure Research of DDoS Attack under 5G Network 14:45-15:00 Haiou Huang College of Computer Science and Technology, Jilin University, China Abstract-DDoS has been terrorizing network operators since its birth in the late 20th century, and people are constantly researching new methods and techniques to mitigate or solve DDoS attacks. However, with the network technology update iteration, DDoS attacks also emerge in endlessly. When we exclaims the high speed experience brought by 5G, we should not forget that the network is a double-edged sword, and the security problem of 5G network is also not to be underestimated. As traditional DDoS defenses continue to fail, researchers who have grown more aggressive in recent years have seen some promising, low-cost technologies emerge. This paper first analyzes the trend of DDoS attacks in the past two years, then analyzes some DDoS defense mitigation schemes based on SDN, NFV and MTD, and points out some challenges faced by using new technologies to defend DDoS attacks. 30 30
CSP 2021 ICMIP 2021 P0012 Vehicle Flow Detection Based on Improved Deep Structure and Deep Sort 15:00-15:15 Haobin Li Sichuan University, China Abstract-Real-time vehicle detection based traffic monitoring is a hot research topic within the area of computer vision. In view of the problem of low detection accuracy and low processing speed, a vehicle detection method based on Improved Deep Structure is proposed in this study. Due to the characteristics of highway vehicles with a fixed aspect ratio, k-means ++ clustering method is used to select new anchor boxes to eliminate false targets at an early stage followed by improved depth structure with deep sort. Experimental results demonstrated that our proposed method on standard data set KITTI-UA achieved higher precision and faster speed than the existing algorithms. P007 A Scheme of Key Distribution in Smart Grid 15:15-15:30 Youwu Zhou State Grid JiangXi Electric Power Research Institute, China Abstract-Group communication for Smart Grid, because of its special characteristics of large-scale nodes, open communication channel and high packets loss rate, making secure group communication of Smart Grid face many security threatens, so how to realize secure communication between groups and how to establish secure session keys shared between nodes has been the focus of Smart Grid. Aimed at the problem mentioned above, a group key distribution scheme based on three hash chains is proposed for Smart Grid. This scheme introduces a self-healing hash chain based on two-way hash chain, when a node is revoked, the corresponding self-healing hash value will be replaced by a new random value, so that revoked nodes can’t realize collusion attack with the newly added node; This scheme also takes into account the problem of high packet loss rate in Smart Grid, and realizes self-healing property. The security and performance analysis shows that the scheme can meet the security requirements of group communication for Smart Grid, and it has the characteristics of dynamic revocation and resisting collusion. The scheme also reduces the storage overhead and the communication load of node to a large extent, and can meet the performance requirements of group communication for Smart Grid. CSP 2021 ICMIP 2021 31 31
You can also read