15th International Conference on Network and System Security
Tianjin, China
| 23 October 2021
Day 1 (23 Oct 2021) @ Meeting Room I | |
---|---|
9:00-9:10 | Opening |
9:10-9:55 | Keynote (I)
Session Chair: Prof. Keqiu Li Frontier of IoT Security:Attacks and Defenses Kui Ren |
9:55-10:40 | Keynote (II)
Session Chair: Prof. Guangquan Xu Towards Intelligent Mobile Security Yingying Chen |
10:40-10:50 | Morning break |
10:50-11:30 | Blockchain
Session Chair: Prof. Wenxin Li
Revocable Data Sharing Methodology Based on SGX and Blockchain Liang Zhang, Haibin Kan, Yang Xu and Jinhao Ran ZERMIA - A Fault Injector framework for testing Byzantine Fault Tolerant protocols João Soares, Ricardo Fernandez, Miguel Silva, Tadeu Freitas and Rolando Martins |
11:30-13:00 | Lunch break |
13:00-13:55 | System security (I)
Session Chair: Dr. Zijuan Liu
An architecture for processing a dynamic heterogeneous information network of security intelligence Marios Anagnostopoulos, Egon Kidmose, Amine Laghaout, Rasmus L. Olsen, Sajad Homayoun, Christian D. Jensen and Jens M. Pedersen The Complexity of Testing Cryptographic Devices on Input Faults Alisher Ikramov and Gayrat Juraev A Scheme for Sensor Data Reconstruction in Smart Home Short Yegang Du |
13:55-14:50 | System security (II)
Session Chair: Dr. Yegang Du
Federated learning-based intrusion detection in the context of IIoT networks: Poisoning Attack and defense Nguyen Chi Vy, Nguyen Huu Quyen, Phan The Duy and Van-Hau Pham Collection of the main Anti-Virus detection and bypass techniques Jérémy Donadio, Guillaume Guerard , and Soufian Ben Amor A Secure and Privacy Preserving Federated Learning Approach for IoT Intrusion Detection System Short Phan The Duy, Huynh Nhat Hao, Huynh Minh Chu and Van-Hau Pham |
14:50-15:05 | Afternoon break |
15:05-16:35 | Machine Learning
Session Chair: Dr. Yuantian Miao
A Lightweight Android Malware Detection Framework based on Knowledge Distillation Yongbo Zhi, Ning Xi, Yuanqing Liu and Honglei Hui Profiled Attacks against the Elliptic Curve Scalar Point Multiplication using Neural Networks Alessandro Barenghi, Diego Carrera, Silvia Mella, Andrea Pace, Gerardo Pelosi and Ruggero Susella A Malware Family Classification Method Based on the Point Cloud Model DGCNN Yuxin Ding, Zihan Zhou and Wen Qian HALNet: A Hybrid Deep Learning Model for Encrypted C&C Malware Traffic Detection Short Ruiyuan Li, Zehui Song, Wei Xie, Chengwei Zhang, Guohui Zhong and Xiaobing Pei Tracing Software Exploitation Short Ayman Youssef, Mohamed Abdelrazek, Chandan Karmakar and Zubair Baig |
16:35-16:50 | Awards and Closing |
Day 1 (23 Oct 2021) @ Meeting Room III | |
13:00-13:55 | Network Security (I)
Session Chair: Dr. Haisheng Yu
Re-check Your Certificates! Experiences and Lessons Learnt from Real-world HTTPS Certificate Deployments Wenya Wang, Yakang Li, Chao Wang, Yuan Yan, Juanru Li and Dawu Gu Preventing Fake News Propagation in Social Networks using a context Trust-based security model Nadav Voloch, Ehud Gudes and Nurit Gal-Oz Cloud Key Management Based on Verifiable Secret Sharing Short Mustapha Hedabou |
13:55-14:50 | Network Security (II)
Session Chair: Dr. Nadav Voloch
A Simplified and Effective Solution for Hybrid SDN Network Deployment Haisheng Yu, Wenyong Wang, Yan Liu, Lihong Cheng and Sai Zou Deep Cross-modal Supervised Hashing based on Joint Semantic Matrix Na Chen, Yuan Cao and Chao Liu Accurate Polar Harmonic Transform-based Watermarking Using Blind Statistical Detector Short Yu Sang, Yilin Bei, Zhiyang Yang and Chen Zhao |
14:50-15:05 | Afternoon break |
15:05-16:35 | Privacy
Session Chair: Dr. João Soares
RLTree: Website Fingerprinting through Resource Loading Tree Changzhi Li, Lihai Nie and Laiping Zhao On the Analysis of the Outsourced Revocable Identity-Based Encryption from Lattices Yanhua Zhang, Ximeng Liu, Yupu Hu and Huiwen Jia Group Key Exchange Compilers from Generic Key Exchanges Hector B. Hougaard and Atsuko Miyaji Privacy-preserving and Auditable Federated Deep Reinforcement Learning for Robotic Manipulation Short Xudong Zhu and Hui Li Cryptanalysis of A Fully Anonymous Group Signature with Verifier-Local Revocation from ICICS 2018 Short Yanhua Zhang, Ximeng Liu, Yupu Hu and Huiwen Jia |
16:35-16:50 | Awards and Closing |