Copenhagen, Denmark
14-17 July 2019
Social Networks and Big Data have pervaded all aspects of our daily lives. With their unparalleled popularity, social networks have evolved from the platforms for social communication and news dissemination, to indispensable tools for professional networking, social recommendations, marketing, and online content distribution. Social Networks, together with other activities, produce Big Data that is beyond the ability of commonly used computer software and hardware tools to capture, manage, and process within a tolerable elapsed time. It has been widely recognised that security and privacy are the critical challenges for Social Networks and Big Data applications due to their scale, complexity and heterogeneity.
The 5th International Symposium on Security and Privacy in Social Networks and Big Data (SocialSec 2019) will be held at Technical University of Denmark in Copenhagen, Denmark on 14-17 July 2019. It follows the success of SocialSec 2015 in Hangzhou, China, SocialSec 2016 in Fiji, SocialSec 2017 in Melbourne, Australia and SocialSec 2018 in Santa Clara, CA, USA. The aim of the symposium is to provide a leading edge forum to foster interactions between researchers and developers with the security and privacy communities in Social Networks and Big Data, and to give attendees an opportunity to interact with experts in academia, industry, and governments.
SocialSec 2019 will be part of the DTU Security Conference Week, co-located with the 13th IFIP WG 11.11 International Conference on Trust Management (IFIPTM 2019). IFIPTM 2019 Website
UPDATE The proceedings of SocialSec 2019 are now available online.
Paper Submission Due | Extended to 10 April 2019 (Firm Deadline) |
Author Notification | Extended to 15 May 2019 |
Camera-ready Paper Due | 30 June 2019 |
Paper Registration Due | 30 June 2019 |
Symposium Date | 14-17 July 2019 |
14 July 2019 | |
---|---|
Arrival and SocialSec Committee Meeting |
15 July 2019 | |
---|---|
08:30-09:00 | Registration Room S01 |
08:45-09:00 | Conference Opening Room S01 |
09:00-10:00 | Keynote I (Chair: Weizhi Meng) Room S01 Internet of Things: Applications and Security Challenges Speaker: Prof. Manu Malek |
10:00-10:30 | Coffee Break |
10:30-11:50 | Parallel Paper Session (Session Chair: Jiachen Shen) Room S01 Web Scanner Detection Based on Behavioral Differences Lin Li, Jianming Fu, Jianwei Huang, Yingjun Wang and Guojun Peng DMU-ABSE: Dynamic Multi-User Attribute-based Searchable Encryption With File Deletion And User Revocation Jiming Liu, Zhenfu Cao, Xiaolei Dong and Jiachen Shen A Novel Lattice-based Ciphertext-Policy Attribute-Based Proxy Re-Encryption for Cloud Sharing Juyan Li, Chunguang Ma and Kejia Zhang Blockchain-based Asymmetric Group Key Agreement Protocol for Mobile Ad Hoc Network Qikun Zhang, Yongjiao Li, Bingli Wang, Jianyong Li, Yong Gan, Yanhua Zhang and Jingjing Hu |
Parallel Paper Session (Session Chair: Zhe Xia) Room S04 Development of an Early Warning System for Network Intrusion Detection using Benford’s Law Features Liuying Sun, Anthony Ho, Zhe Xia, Jiageng Chen and Mingwu Zhang Synthetical Network Intrusion Detection Model Based on Deep Learning Hongyu Yang, Geng Qin and Li Ye An RTP Extension for Reliable User-data Transmission over VoIP Traffic Jinbao Gao, Yuanzhang Li, Hongwei Jiang, Lu Liu and Xiaosong Zhang A Hybrid Covert Channel with Feedback over Mobile Networks Xiaosong Zhang, Linhong Guo, Yuan Xue, Hongwei Jiang, Lu Liu and Quanxin Zhang | |
11:50-14:00 | Lunch 101 Canteen |
14:00-15:00 | Keynote II (Chair: Anthony TS Ho) Room S01 Privacy-preserving Analytics in the Big Data Environment Speaker: Jaideep Vaidya |
15:00-15:30 | Coffee Break |
15:30-16:30 | Parallel Paper Session (Session Chair: Chunpeng Ge) Room S01 Cloud-Aided Privacy Preserving User Authentication and Key Agreement Protocol for Internet of Things Chenyu Wang, Ding Wang, Haowei Wang, Guoai Xu, Jing Sun and Huaxiong Wang Integer Version of Ring-LWE and its Applications Chunsheng Gu Correlate the Advanced Persistent Threat Alerts and Logs for Cyber Situation Comprehension Xiang Cheng, Jiale Zhang and Bing Chen |
Parallel Paper Session (Session Chair: Yu Wang) Room S04 A Secure Fine-Grained Micro-Video Subscribing System in Cloud Computing Chunpeng Ge, Lu Zhou, Jinyue Xia, Pawel Szalachowski and Chunhua Su Exploit in smart devices: A case study Zian Liu, Chao Chen, Shigang Liu, Dongxi Liu and Yu Wang Retrieve the Hidden Leaves in the Forest: Prevent Voting Spamming in Zhihu Jun Zhang and Houda Labiod | |
17:30-20:00 | Banquet Meyers Spisehus Link |
16 July 2019 | |
---|---|
09:00-09:30 | Registration Room S01 |
09:30-10:30 | Invited Talk I (Chair: Weizhi Meng) Room S01 Speaker: Prof. Anthony TS Ho |
10:30-11:00 | Coffee Break |
11:00-12:00 | Invited Talk II (Chair: Weizhi Meng) Room S01 Speaker: Dr. Chunhua Su |
12:00-14:00 | Lunch 101 Canteen |
14:00-15:40 | Parallel Paper Session (Session Chair: Wei Wang) Room S01 Online Event Detection in Social Media with Bursty Event Recognition Wanlun Ma, Zhuo Liu and Xiangyu Hu Predicting Users' Emotional Intelligence with Social Networking Data Xiangyu Wei, Jin Li, Zhen Han and Wei Wang Design and Implementation of Medical Dispute Governance Based on Blockchain Xiaofeng Wang, Qilin Zhang, Zhenni Shi and Zhiyuan Ye Greedily Remove k links to hide important individuals in social network Jie Ji, Guohua Wu, Chenjian Duan, Yizhi Ren and Zhen Wang Man-in-the-Middle Attacks on Electrical Power Grid SCADA System Norziana Jamil and Mohd Ezanee Rusli |
Parallel Paper Session (Session Chair: Rongmao Chen) Room S04 Blockchain-based Threshold Electronic Voting System Borui Gong, Xingye Lu, Lau Wang Fat and Man Ho Au A Global and Patient-acknowledged Healthcare Record Sharing Architecture via Blockchain Toqeer Ali Syed, M. A. R. Abdeen and Mustapha C.E. Yagoub PassGrid: Towards Graph-Supplemented Textual Shoulder Surfing Resistant Authentication Teng Zhou, Liang Liu, Wenjuan Li, Haifeng Wang and Chong Jiang Learning from Imbalanced Data: A Comparative Study Yu Sui, Mengze Yu, Haifeng Hong and Xianxian Pan | |
15:40-16:10 | Coffee Break |
16:10-17:00 | Conference Closing & SocialSec 2020 |
17 July 2019 | |
---|---|
Participant Leaving |
Note: The order of speakers is sorted according to the alphabetical order of surname.
Internet of Things: Applications and Security Challenges
Abstract: The Internet is used daily for many online services, e.g., to communicate, find information, do transactions, and be entertained. And this is possible independent of location due to its openness and distributed nature. But this very openness poses vulnerabilities which allow attacks such as ID theft, denial of service, industrial espionage, and extortion. The Internet of Things (IoT) anticipates connecting billions of objects to the Internet in the next few years, thus potentially creating additional challenging security and privacy issues. The objective of this talk is to describe some trends affecting Internet security and discuss the sources of security problems, as well as provide an overview of IoT and its related security issues. Typical IoT applications are presented with focus on autonomous cars. Also, some potential solutions, safeguards, and defenses are offered.
Biography: Prof. Manu Malek is the Editor-in-Chief of Elsevier's International Journal of Computers and Electrical Engineering. He earned his Ph.D. in EE/CS from the University of California, Berkeley. He has extensive experience in teaching, practicing, and research in communications and computer networking; is the author, co-author, or editor of seven books, and many published technical papers in these areas. He has held various academic positions in the USA and overseas, as well as technical leadership positions at Telcordia Technologies and AT&T/Lucent Bell Labs. He was a Distinguished Member of Technical Staff at Bell Labs before joining Stevens Institute of Technology as an Industry Professor of Computer Science, from which he retired a few years ago. Dr. Malek is a Life Fellow of the IEEE, and an IEEE Millennium medalist for his contributions. He was Editor for Network Management for the IEEE Transactions on Communications (1989-92), and an IEEE ComSoc Distinguished Lecturer (1999-2007). He founded and was the Editor-in-Chief of Springer’s Journal of Network and Systems Management (1993-2010). He has been Editor-in-Chief of Computers and Electrical Engineering since 2010.
Privacy-preserving Analytics in the Big Data Environment
Abstract: In the current digital age, data is continually being collected by organizations and governments alike. While the goal is to use this data to derive insight and improve services, the ubiquitous collection and analysis of data creates a threat to privacy. Furthermore, the digitization and centralization of data creates attractive targets for cyber criminals, with security breaches harming both individuals and organizations. In this talk, we present a vision for how privacy-preserving analytics can be done in the big data environment which will require a combination of technological advances to ensure both process and output privacy as well as socio-cognitive approaches to ensure the widespread use and deployment of such work.
Biography: Prof. Jaideep Vaidya is a Full Professor in the MSIS Department at Rutgers University. He received the B.E. degree in Computer Engineering from the University of Mumbai, the M.S. and Ph.D. degree in Computer Science from Purdue University. His general area of research is in data mining, data management, security, and privacy. He has published over 130 technical papers in peer-reviewed journals and conference proceedings, and has received several best paper awards from the premier conferences in data mining, databases, digital government, security, and informatics. He has also received the NSF Career Award, the Rutgers Board of Trustees Research Fellowship for Scholarly Excellence, and the Junior Faculty Research Award from Rutgers Business School. He is a senior member of the IEEE and ACM and has been recognized as an ACM Distinguished Scientist.
The symposium seeks submissions from academia, industry, and government presenting novel research on all theoretical and practical aspects of security and privacy in Social Networks and Big Data. Papers describing case studies, implementation experiences, and lessons learned are also encouraged. Topics of interest include but are not limited to the following themes in the Social Networks and/or Big Data contexts:
Submitted papers must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or a conference with proceedings. Papers will be selected based on their originality, timeliness, significance, relevance, and clarity of presentation.
Please click the below button to submit your paper through SocialSec 2019 Easychair submission system:
It is planned to publish the proceedings with Springer in their Lecture Notes in Computer Science series (final approval pending). The papers have to be written in standard, scientific English language. The page limit is 10 to 15 pages including all tables, figures, references and appendices in the LNCS one-column page format. Detailed author instructions and LaTeX/Word templates for LNCS publications can be found via the following link.
Springer LNCS Author Information
SocialSec 2019 welcomes Work-in-Progress (WiP) papers from both academia and industry, presenting original research, or ongoing research in the areas of cyber security. The WiP session will provide a practical platform for various researchers and professionals to discuss new ideas and emerging results, and brain-storm research questions and directions.
Selected papers presented at the SocialSec 2019 will be invited to consider submission (after significant extension) for the special issue in the following SCI-Indexed Journals:
Sensors Impact Factor: 2.475 Special Issue on Threat Identification and Defence for Internet-of-Things Learn more | |
Concurrency and Computation: Practice and Experience (CCPE) Impact Factor: 1.114 Special Issue on Recent Advance in Security and Privacy for Smart Society RASPSS19 Learn more | |
Computers & Electrical Engineering Impact Factor: 1.747 Special Issue on Blockchain Techniques for the Internet of Vehicles Security Learn more | |
IEEE Access Impact Factor: 3.557 Learn more | |
Journal of Information Security and Applications Impact Factor: Pending Learn more | |
Symmetry Impact Factor: 1.256 Special Issue on Symmetry and Asymmetry Applications for Internet of Things Security and Privacy Learn more | |
International Journal of Network Management Impact Factor: 1.34 Special Issue on Trust and Privacy in Internet of Things: Challenges and Solutions Learn more | |
Yang Xiang, Swinburne University of Technology, Australia
Anthony TS Ho, University of Surrey, UK
Weizhi Meng, Technical University of Denmark, Denmark
Steve Furnell, University of Plymouth, UK
Jinguang Han, Queen's University Belfast, UK
Zhe Liu, Nanjing University of Aeronautics and Astronautics, China
Chunhua Su, University of Aizu, Japan
Ding Wang, Peking University, China
Yu Wang, Guangzhou University, China
Man Ho Au, The Hong Kong Polytechnic University, Hong Kong
Patricia Arias Cabarcos, University Carlos III of Madrid, Spain
Joonsang Baek, University of Wollongong, Australia
Fei Chen, Shenzhen University, China
Rongmao Chen, National University of Defense Technology, China
Jiageng Chen, Central China Normal University, China
Xiaofeng Chen, Xidian University, China
Shaoying Cai, Hunan University, China
Aniello Castiglione, University of Salerno, Italy
Jintai Ding, University of Cincinnati, USA
Liming Fang, Nanjing University of Aeronautics and Astronautics, China
Jianming Fu, Wuhan University, China
Zhangjie Fu, Nanjing University of Information Science and Technology, China
Fuchun Guo, University of Wollongong, Australia
Muhammad Khurram Khan, King Saud University, Saudi Arabia
Jinguang Han, University of Surrey, UK
Gerhard Hancke, City University of Hong Kong, Hong Kong
Debiao He, Wuhan University, China
Xinyi Huang, Fujian Normal University, China
Qiong Huang, South China Agricultural University, China
Julian Jang-Jaccard, Massey University, New Zealand
Zoe L. Jiang, Harbin Institute of Technology, China
Georgios Kambourakis, University of the Aegean, Greece
Sokratis Katsikas, Norwegian University of Science and Technology, Norway
Romain Laborde, IRIT/SIERA, France
Kwok Yan Lam, Nanyang Technological University, Singapore
Yan Li, Singapore Management University, Singapore
Wenjuan Li, City University of Hong Kong, Hong Kong
Joseph Liu, Monash University, Australia
Zhiqiang Liu, Shanghai Jiao Tong University, China
Zheli Liu, Nankai University, China
Yang Liu, Nanyang Technological University, Singapore
Kaitai Liang, University of Surrey, UK
Bo Luo, The University of Kansas, USA
Entao Luo, Central South University, China
Xiapu Luo, The Hong Kong Polytechnic University, Hong Kong
Rongxing Lu, University of New Brunswick, Canada
Jiqiang Lu, Beihang University, China
Xiaobo Ma, Xi'an Jiaotong University, China
Felix Gomez Marmol, University of Murcia, Spain
Stefanos Gritzalis, University of the Aegean, Greece
Javier Parra-Arnau, Universitat Rovira i Virgili, Spain
Gerardo Pelosi, Politecnico di Milano, Italy
Rishikesh Sahay, Technical University of Denmark, Denmark
Zhiyuan Tan, Edinburgh Napier University, UK
Yizhi Ren, Hangzhou Dianzi University, China
Yu-An Tan, Beijing Institute of Technology, China
Jun Shao, Zhejiang Gongshang University, China
Seonghan Shin, National Institute of Advanced Industrial Science and Technology, Japan
Chunhua Su, University of Aizu, Japan
Hung-Min Sun, National Tsing Hua University, Taiwan
Guozi Sun, Nanjing University of Posts and Telecommunications, China
Willy Susilo, University of Wollongong, Australia
Jianfeng Wang, Xidian University, China
Wei Wang, Beijing Jiaotong University, China
Lei Wang, Shanghai Jiao Tong University, China
Hao Wang, Shandong Univercity, China
Ding Wang, Peking University, China
Qianhong Wu, Beihang University, China
Zhe Xia, Wuhan University of Technology, China
Liang Xiao, Xiamen University, China
Bin Xiao, The Hong Kong Polytechnic University, Hong Kong
Lei Xue, The Hong Kong Polytechnic University, Hong Kong
Wun-She Yap, Universiti Tunku Abdul Rahman, Malaysia
Guomin Yang, University of Wollongong, Australia
Kuo-Hui Yeh, National Dong Hwa University, Taiwan
Yong Yu, Shaanxi Normal University, China
Xun Yi, RMIT University, Australia
Lei Zhang, East China Normal University, China
Jun Zhang, Swinburne University of Technology, Australia
Fangguo Zhang, Sun Yat-sen University, China
Haibo Zhang, University of Otago, New Zealand
Cliff Zou, University of Central Florida, USA
We welcome all conference participants who are interested in SocialSec 2019. Full registration payment is required for EACH accepted paper. Failure to pay the registration fee will result in the exclusion of the papers from the Conference Proceedings.
Registration Type | Registration Fee (in Danish Krone) |
---|---|
Full Registration | DKK 5800 |
Both paper authors and general participants should make a full registration, which includes full attendance of the conference, conference proceedings, conference banquet, morning teas, afternoon teas and lunches.
SocialSec 2019 will take place at Lyngby campus of Technical University of Denmark, and is hosted by the Cyber Security section. The venue for the conference is the DTU Meeting Centre in Building 101A, Anker Engelundsvej 1, Kgs. Lyngby, Denmark. DTU Map
Copenhagen is the cultural, economic and governmental centre of Denmark. Since the completion of the Øresund Bridge, Copenhagen has become increasingly integrated with the Swedish province of Scania and its largest city, Malmö, forming the Øresund Region. With a number of bridges connecting the various districts, the cityscape is characterized by parks, promenades and waterfronts. Copenhagen's landmarks, such as Tivoli Gardens, The Little Mermaid statue, the Amalienborg and Christiansborg palaces, Rosenborg Castle Gardens, Frederik's Church, and many museums, restaurants and nightclubs are significant tourist attractions.
For the visa, there is visa‐free entry for citizens of all EU countries, and most non‐EU European countries, Australia, Canada and the United States. Denmark is a member of the European Union's Schengen zone.
Metro & Train- M1 or M2 to Norepport station and then either train A or E to Lyngby station. From the Lyngby station, you can take bus 180, 190 or 300S to Anker Engelunds Vej at DTU campus.
We strongly recommend that you use the planner to manage your trip: https://www.rejseplanen.dk.
Due to the summer vacation in July, SocialSec 2019 did not make any deals with hotels, but the following ones may be an option (there are many alternatives nearby). Participants should plan their own trip and book the hotel as early as possible.
For further information regarding to SocialSec 2019, please contact Dr Weizhi Meng via socialsec2019@easychair.org.