CSP 2021 ICMIP 2021 2021 IEEE 5th International Conference on Cryptography, Security and Privacy 2021 6th International Conference on Multimedia ...

Page created by April Pierce
 
CONTINUE READING
CSP 2021 ICMIP 2021 2021 IEEE 5th International Conference on Cryptography, Security and Privacy 2021 6th International Conference on Multimedia ...
CSP 2021
                                         ICMIP 2021

                                     January 8-10, 2021
                                          Zhuhai, China

      2021 IEEE 5th International Conference on

                 Cryptography, Security and Privacy

               2021 6th International Conference on

                   Multimedia and Image Processing

Sponsored by              Supported by

                Patrons

                   11
CSP 2021 ICMIP 2021 2021 IEEE 5th International Conference on Cryptography, Security and Privacy 2021 6th International Conference on Multimedia ...
CSP 2021
                                                                                   ICMIP 2021

                                                                              January 8-10, 2021
                                                                                   Zhuhai, China

Onsite Registration Guide:
Arrive at the conference venue→Show your ID→Inform the conference staff of your paper ID→Sign your
name on the participants list→Check your conference materials.

Devices Provided by the Conference Organizer:
Laptops (with MS-Office & Adobe Reader); Projectors & Screen; Laser Sticks

Materials Provided by the Presenters:
PowerPoint or PDF files

Duration of Each Presentation:
Regular Oral Session: 15 Minutes of Presentation including 2-3 Minutes of Q&A

Notice:
*Certificates of listener can be collected in the registration counter.

*Certificates of presentation can be collected from the session chair after each session.

*The organizer will not provide accommodation, so we suggest you make an early reservation.

*One best presentation will be selected from each session. The best one will be announced when each
session ends, and will be awarded by the session chair after each session in the meeting room.

Attention:
*Do not forget to wear a mask due to situation of COVID-19.

*Wear your delegate badge (name tag) for all conference activities.

*Take good care of your valuables at any time during the conference.

Contacts:

CSP 2021                                                    ICMIP 2021
Ms. Ching Cao                                               Ms. Sukie Yao
Email: iccsp_conf@126.com                                   Email: icmip2016@vip.163.com
Tel: +86-137-3111-1131                                      Tel: +86-130-9633-3337

                                                       22
CSP 2021 ICMIP 2021 2021 IEEE 5th International Conference on Cryptography, Security and Privacy 2021 6th International Conference on Multimedia ...
VENUE

                                                                           January 8-10, 2021
                                                                                Zhuhai, China

                     Grand Nest Hotel Zhuhai (珠海旭日湾巢酒店)

                     Address: No.11 Tangqi Road, Tangjia Wan, Zhuhai, Guangdong
                                 地址: 广东省珠海市唐家湾唐淇路 11 号
                                       www.grandnesthotel.com

Grand Nest Hotel Zhuhai is located in the beautiful surroundings of the Tangjia Bay in Zhuhai. The hotel
has 217 individual rooms and high-end business club facilities. It is a themed boutique hotel in Zhuhai.
The famous designer has designed 11 kinds of scenario rooms with ingenuity and ingenuity. The hotel is
full of personality, fashion, warmth, comfort, romance and elegant design elements, creating a unique
value-for-money stay experience.

                                                   3
                                                   3
CSP 2021 ICMIP 2021 2021 IEEE 5th International Conference on Cryptography, Security and Privacy 2021 6th International Conference on Multimedia ...
Zoom Guidance

                                                               Zoom Guidance

                                Zoom Performance Chart

                           KEYNOTE & PARALLEL SESSIONS
ROOM                      Meeting ID                 Meeting Link
A3                        678 1262 6226              https://zoom.com.cn/j/67812626226
A6                        687 1789 1504              https://zoom.com.cn/j/68717891504
B3                        619 5144 3949              https://zoom.com.cn/j/61951443949

◆Pre-Test Guidance
January 8: All online attendees are required to join the pre-test via Zoom.
Duration: 5 minutes for each one.
Test for: Zoom operation, please get PPT or PDF slides prepared beforehand.

◆Naming Rule:                                    ◆ Official Service WeChat Account
Keynote Speaker: Keynote-Name
Committee Member: Position-Name
Author: Paper ID-Name
Listener: Listener-Name

                                          4
                                          4
CSP 2021 ICMIP 2021 2021 IEEE 5th International Conference on Cryptography, Security and Privacy 2021 6th International Conference on Multimedia ...
TABLE of CONTENTS

                                                                        January 8-10, 2021
                                                                             Zhuhai, China

Welcome Message                                                                              6

Conference Committees                                                                        7

Agenda Overview                                                                              9

Pre-test Timetable                                                                       12

Introduction of Speakers                                                                 13

Parallel Sessions
  Onsite Session: Data and Information Security                                          20
  Virtual Session 1: Data security and Information Management                            25
  Virtual Session 2: Computer and Intelligent Computing                                  30
  Virtual Session 3: Communication Network and Information Technology                    36
  Virtual Session 4: Image Processing Technology and Methods                             42
One-day Tour                                                                             48

Note                                                                                     49

                                                  5
                                                  5
CSP 2021 ICMIP 2021 2021 IEEE 5th International Conference on Cryptography, Security and Privacy 2021 6th International Conference on Multimedia ...
WELCOME MESSAGE

                                                                     January 8-10, 2021
                                                                          Zhuhai, China

Welcome to 2021 IEEE 5th International Conference on Cryptography, Security and Privacy
(CSP 2021), 2021 6th International Conference on Multimedia and Image Processing (ICMIP
2021).

As you have been aware, COVID-19 is still out of control for many countries, and the safety and
well-being of our participants is of paramount importance to us. Therefore, after serious
consideration, the committee has made the difficult decision to have CSP 2021 and ICMIP 2021
as an onsite conference combined with virtual mode.

The objective of the conferences is to provide a premium platform to bring together
researchers, scientists, engineers, academics and graduate students to share up-to-date
research results. We are confident that during this time you will get the theoretical grounding,
practical knowledge, and personal contacts that will help you build a long term, profitable and
sustainable communication among researchers and practitioners in the related scientific areas.

We would like to express our gratitude to our distinguished speakers, IEEE and IET Fellow, Prof.
Ce Zhu, University of Electronic Science and Technology of China, China; IEEE and AAAS Fellow,
Prof. Jie Wu, Temple University, USA; IEEE Fellow, Prof. Guoliang XING, The Chinese University
of Hong Kong, Hong Kong; Prof. Yong Guan, Iowa State University, USA; Prof. Hiroyuki Kudo,
University of Tsukuba, Japan; Dr. Chau Kien Tsong, Universiti Sains Malaysia, Malaysia; Dr. Yang
Liu, Harbin Institute of Technology (Shenzhen), China and other distinguished scholars for
sharing their deep insights on future challenges and trends in the conferences.

Special thanks go to our committee members, all the reviewers, researchers and students who
participate in the conferences. Hope you will enjoy the conferences and have an unforgettable
experience!

                                                                    Conference Committees

                                   CONFERENCE COMMITTEES

                                               6
                                               6
CSP 2021 ICMIP 2021 2021 IEEE 5th International Conference on Cryptography, Security and Privacy 2021 6th International Conference on Multimedia ...
Conference Committees

                                                                            January 8-10, 2021
                                                                                 Zhuhai, China

Advisory Committees
Ce Zhu (IEEE and IET Fellow), University of Electronic Science and Technology of China, China
Jie Wu (IEEE and AAAS Fellow), Temple University, USA
Guoliang XING (IEEE Fellow), The Chinese University of Hong Kong, Hong Kong

Conference Chairs
Zhiwen Zhao (Dean), Beijing Normal University, Zhuahai, China
Wanyang Dai, Nanjing University, China

Conference Co-Chair
Shuangbao Wang, Morgan State University, USA

Steering Chair
Yulin Wang, Wuhan University, China

Program Chairs
Shahram Latifi (IEEE Fellow), University of Nevada, USA
Jaouhar Fattahi, Laval University, Canada
Eric Sakk, Morgan State University, USA
Rose Shumba, Bowie State University, USA
Jalel Ben-Othman, Université de Paris, France
Hiroyuki Kudo, University of Tsukuba, Japan
Fehmi Jaafar, The Computer Research Institute of Montreal and Concordia University, Canada

Publication Chair
Jing Wang, Wuhan University, China

Publicity Chairs

Rongfang Bie, Beijing Normal University, China
Xiangyang Hao, Information Engineering University, China

                                                   7
                                                   7
CSP 2021 ICMIP 2021 2021 IEEE 5th International Conference on Cryptography, Security and Privacy 2021 6th International Conference on Multimedia ...
Conference Committees

                                                                               January 8-10, 2021
                                                                                    Zhuhai, China

Technical Committees
Sherali Zeadally, University of Kentucky, USA
Hung-Yu Chien, National Chi Nan University, Taiwan
Pljonkin Anton Pavlovich, Southern Federal University, Russia
Paulo Batista, Cultures and Societies of the University of Évora, Portugal
Daniel B. da Costa, Federal University of Ceará, Brazil
Mohammad Motiur Rahman, Mawlana Bhashani Science and Technology University, Bangladesh
Ashraf Darwish, Helwan University, Russia
Priteshkumar Prajapati, Chandubhai S. Patel Institute of Technology, India
Nagendra Swamy Siddappa Handarakally, University of Mysore, India
Ivan Izonin, Lviv Polytechnic National University, Ukraine
Abdelkrim Mebarki, Université des sciences et de technologie d’Oran, Algeria
Jian Dong, Tianjin University of Technology and Education, China
Maleerat Maliyaem, King Mongkut's University of Technology North Bangkok, Thailand
Lili Nurliyana Abdullah, Universiti Putra Malaysia, Malaysia
Anyong Qing, Tsinghua University, China
Xiaofeng Wang, Xi'an University of Technology, China
Shixiang Cao, Beijing Institute of Space Mechanics & Electricity, China
Min Li, Nanjing University of Science and Technology, China
Malka N.Halgamuge, Melbourne School of Engineering, Australia
Chau Kien Tsong, Universiti Sains Malaysia, Malaysia
Por Fei Ping, Wawasan Open University, Malaysia
Asmaa Shaker Ashoor, University of Babylon, Iraq
Saju Subramanian, Dr. Mahalingam College of Engineering and Technology, India

                                                       8
                                                       8
CSP 2021 ICMIP 2021 2021 IEEE 5th International Conference on Cryptography, Security and Privacy 2021 6th International Conference on Multimedia ...
AGENDA OVERVIEW

                                                                         January 8-10, 2021
                                                                              Zhuhai, China

                                  January 8-Friday (GMT+8)
 14:00-17:30    Participants Check-in & Materials Collection                                   Lobby

 10:00-17:00    Pre-test for Online Participants
                    January 9 -Saturday (GMT+8)        Keynote Session
                       Venue for onsite: 海鸥厅 Seagull Seminar Room, 2F
                                        Online Room: B3
                  Link: https://zoom.com.cn/j/61951443949 ID: 619 5144 3949
Host: Shuangbao Wang, Morgan State University, USA
                Opening Remarks
 09:00-09:05
                Prof. Zhiwen Zhao, (Dean) Beijing Normal University, Zhuahai, China
                Speaker I
                Prof. Jie Wu, Temple University, USA (IEEE and AAAS Fellow)
 09:05-09:45
                Speech Title: Cyber Security Defense: From Moving Target Defense to Cyber Deception
 09:45-09:50    Q&A
                Speaker II
                Prof. Yong Guan, Iowa State University, USA
 09:50-10:30    Speech Title: An Algebraic Quality-Time-Advantage-Based Key Establishment Paradigm
                for Securing Wireless Networks
 10:30-10:35    Q&A
 10:35-10:50    Coffee Break & Group Photo                                                     Foyer
                Speaker III
                Prof. Ce Zhu, University of Electronic Science and Technology of China, China
 10:50-11:30    (IEEE and IET Fellow)
                Speech Title: Substitute Training for Adversarial Attacks - Is Real Training Data Really
                Necessary?
 11:30-11:35    Q&A
                Speaker IV
                Prof. Guoliang XING, the Chinese University of Hong Kong, Hong Kong (IEEE
 11:35-12:15
                Fellow)
                Speech Title: Tackling the Challenges of Machine Learning for Mobile Health Systems
 12:15-12:20    Q&A

 12:20-13:30    Lunch & Break                                                 Restaurant: 中餐厅, 1F

                                                9
                                                9
CSP 2021 ICMIP 2021 2021 IEEE 5th International Conference on Cryptography, Security and Privacy 2021 6th International Conference on Multimedia ...
AGENDA OVERVIEW

                                                                            January 8-10, 2021
                                                                                 Zhuhai, China

                       Speaker V
 13:30-14:00           Prof. Hiroyuki Kudo, University of Tsukuba, Japan
Online Room: B3        Speech Title: Image Reconstruction for Sparse-View CT and Interior CT
                       Link: https://zoom.com.cn/j/61951443949   ID: 619 5144 3949
                       Speaker VI
  14:00-14:25          Dr. Yang Liu, Harbin Institute of Technology (Shenzhen), China
Venue: 海鸥厅, 2F         Speech Title: On the Trade-off between Privacy and Utility in Mobile Services: A
Seagull Seminar Room   Qualitative Study
                       Link: https://zoom.com.cn/j/68717891504   ID: 687 1789 1504
                       Speaker VII
                       Dr. Chau Kien Tsong, Universiti Sains Malaysia, Malaysia
 14:00-14:25
                       Speech Title: The Perception of University Learners on Multimedia and Image
Online Room: B3
                       Processing Courses in Malaysia
                       Link: https://zoom.com.cn/j/61951443949   ID: 619 5144 3949

                                            Parallel Sessions
  14:30-16:30
                       Onsite Session: Data and Information Security
Venue: 海鸥厅, 2F
                       Presentation Papers: P008 P009 P014 P1004 P016 P0007 P033
Seagull Seminar Room
                       Link: https://zoom.com.cn/j/68717891504 ID: 687 1789 1504
Online Room: A6
  16:30-17:00          Coffee Break-Foyer

                       Virtual Session 1: Data Security and Information Management
 14:30-16:45
                       Presentation Papers: P011 P022 P027 P028 P035 P037 P036
Online Room: B3
                       P013 P034
                       Link: https://zoom.com.cn/j/61951443949 ID: 619 5144 3949

                       Virtual Session 2: Computer and Intelligent Computing
 14:30-17:15
                       Presentation Papers: P023 P001 P0012 P007 P025                     P0010   P2003
Online Room: A3
                       P021 P2004 P038 P0019
                       Link: https://zoom.com.cn/j/67812626226 ID: 678 1262 6226

  18:00-20:00          Dinner                                                     Restaurant: 中餐厅, 1F

                                                    10
                                                    10
AGENDA OVERVIEW

                                                                January 8-10, 2021
                                                                     Zhuhai, China

                                    January 10-Sunday

                  Virtual Session 3: Communication Network and Information Technology
  9:30-12:00      Presentation Papers: P019 P030 P017 P024 P032 P020 P015               P004
Online Room: B3   P031 P029
                  Link: https://zoom.com.cn/j/61951443949 ID: 619 5144 3949

                  Virtual Session 4: Image Processing Technology and Methods
  9:30-12:00
                  Presentation Papers: P0009 P010 P0013 P0014 P0015            P0016    P0017
Online Room: A3
                  P0001 P0011 P2001 P2005
                  Link: https://zoom.com.cn/j/67812626226 ID: 678 1262 6226

                                  One Day Tour in Zhuhai

                                                CONFERENCE VENUE

                                           11
                                           11
Pre-test Timetable

January 8-Friday (GMT+8)
Online Room: B3 Link: https://zoom.com.cn/j/61951443949 ID: 619 5144 3949

    Time                  Paper ID                 Time                 Paper ID

                                        Morning
                            P019                                           P034
                            P017                                           P001
                       P015 & P030                                        P0012
                            P031                                           P007
                            P032                                           P025
10:00-10:50                                      11:00-11:50
                            P023                                          P0010
                            P011                                     P2003 & P2004
                            P022                                           P024
                            P013                                           P020
                            P004                                           P029
                                       Afternoon
                           P0009                                           P027
                            P010                                           P028
                           P0013                                           P035
                           P0014                 15:00-15:50               P037
                           P0015                                           P036
14:00-14:50
                           P0016                                           P021
                           P0017                                           P038
                           P0001
                           P0011
                           P2001

Note: 16:00-17:00 alternative time for participants who are unavailable at allocated time.

                                            12
                                            12
Introduction of Speakers
       Jie Wu

                         Speech Title: Cyber Security Defense: From Moving Target
                         Defense to Cyber Deception

                         Abstract: Deception technology is an emerging field of cyber security defense.
                         Products from deception technology can detect, analyze, and defend against
                         zero-day and advanced attacks. The talk starts with the discussion of some
                         unique challenges with cyber deception, as compared with some other
                         deception technology such as in the military. We then focus on moving target
                         defense with a couple of examples and some recent results. Finally, we
                         discuss several future directions of cyber deception research with a focus on
Temple University, USA   game and theoretical models.

                         Biography: Jie Wu is the Director of the Center for Networked Computing and
                         Laura H. Carnell professor at Temple University. He also serves as the
                         Director of International Affairs at College of Science and Technology. He
                         served as Chair of Department of Computer and Information Sciences from
                         the summer of 2009 to the summer of 2016 and Associate Vice Provost for
                         International Affairs from the fall of 2015 to the summer of 2017. Prior to
                         joining Temple University, he was a program director at the National Science
                         Foundation and was a distinguished professor at Florida Atlantic University.
                         His current research interests include mobile computing and wireless
                         networks, routing protocols, cloud and green computing, network trust and
                         security, and social network applications. Dr. Wu regularly publishes in
                         scholarly journals, conference proceedings, and books. He serves on several
                         editorial boards, including IEEE Transactions on Mobile Computing, IEEE
                         Transactions on Service Computing, Journal of Parallel and Distributed
                         Computing, and Journal of Computer Science and Technology. Dr. Wu was
                         general co-chair for IEEE MASS 2006, IEEE IPDPS 2008, IEEE ICDCS 2013,
                         ACM MobiHoc 2014, ICPP 2016, and IEEE CNS 2016, as well as program co-
                         chair for IEEE INFOCOM 2011 and CCF CNCC 2013.

                         He was an IEEE Computer Society Distinguished Visitor, ACM Distinguished
                         Speaker, and chair for the IEEE Technical Committee on Distributed
                         Processing (TCDP). Dr. Wu is a Fellow of the AAAS and a Fellow of the IEEE. He
                         is the recipient of the 2011 China Computer Federation (CCF) Overseas
                         Outstanding Achievement Award.

                                      13
                                      13
Introduction of Speakers
    Yong Guan
                             Speech Title: An Algebraic Quality-Time-Advantage-Based Key
                             Establishment Paradigm for Securing Wireless Networks

                             Abstract: The essence of information assurance resides in the ability to
                             establish secret keys between the legitimate communicating parties.
                             Common approaches to key establishment include public-key infrastructure,
                             key-distribution centers, physical-layer security, or key extraction from
                             common randomness. Of these, the latter two are based on specific natural
                             advantages that the legitimate parties hold over their adversaries – most
                             often, such advantages rely on superior or privileged communication
                             channels. Our efforts in this work tackle a key-establishment protocol that
                             relies on a completely different type of advantage: time. The protocol builds
Iowa State University, USA
                             on the idea that when two devices are able to spend a pre-determined,
                             mostly uninterrupted, interval of time in the company of each other, and
                             when such a feat is outside the capability of any realistic attacker, then the
                             legitimate parties should be able to establish a secret key without any prior
                             common information. In this talk, we will present a basic efficient
                             time-based key establishment protocol, and demonstrate how it can be
                             extended to follow customized information transfer functions and deal with
                             predictable fluctuations of wireless interference. This line of research
                             starting from our Adopted-Pet protocol, has created a full set of research
                             opportunities and new paradigm in securing the next-generation wireless
                             networks such as various IoT and 5G systems.

                             Biography: Dr. Yong Guan is a professor of Electrical and Computer
                             Engineering, the Associate Director for Research of Information Assurance
                             Center at Iowa State University, and Cyber Forensics Coordinator of the NIST
                             Center of Excellence in Forensic Sciences – CSAFE. He received his Ph.D.
                             degree in Computer Science from Texas A&M University in 2002, MS and BS
                             degrees in Computer Science from Peking University in 1996 and 1990,
                             respectively. With the support of NSF, IARPA, NIST, and ARO, his research
                             focuses on security and privacy issues, including digital forensics, network
                             security, and privacy-enhancing technologies for the Internet. The resulted
                             solutions have addressed issues in attack attribution, secure network
                             coding, key management, localization, computer forensics, anonymity, and
                             online frauds detection. He served as the general chair of 2008 IEEE
                             Symposium on Security and Privacy (Oakland 2008, the top conference in
                             security), co-organizer for ARO Workshop on Digital Forensics, and the
                             co-coordinator of Digital Forensics Working Group at NSA/DHS CAE
                             Principals Meetings. Dr. Guan has been recognized by awards including NSF
                             Career Award, ISU Award for Early Achievement in Research, the Litton
                             Industries Professorship, and the Outstanding Community Service Award of
                             IEEE Technical Committee on Security and Privacy.

                                         14
                                         14
Introduction of Speakers
           Ce Zhu

                                   Speech Title: Substitute Training for Adversarial Attacks - Is Real
                                   Training Data Really Necessary?

                                   Abstract: Recent study shows machine learning models are extremely
                                   vulnerable to adversarial attacks. Substitute attacks, typically black-box
                                   ones, employ pre-trained models to generate adversarial examples. It is
                                   generally accepted that substitute attacks need to acquire a large amount of
                                   real training data combined with model-stealing methods to obtain a
University of Electronic Science   substitute model. However, the real training data may be difficult (if not
and Technology of China, China     impossible) to be obtained for some practical tasks, e.g., in medical or
                                   financial sectors. As the first trial study, the talk will present our recently
                                   developed data-free model-stealing method for substitute training that does
                                   not require any real training data. The experimental results demonstrate
                                   that the substitute models produced by the proposed method without any
                                   real training data can achieve competitive performance against the baseline
                                   models trained by the same training set as in attacked models.

                                   Biography: Ce ZHU is currently with the School of Information and
                                   Communication     Engineering,    University   of   Electronic   Science   and
                                   Technology of China (UESTC), China, as a Changjiang Professor and the
                                   founding Director of Lab of Advanced Visual Communication & Computing.
                                   He was with the School of Electrical & Electronic Engineering, Nanyang
                                   Technological University (NTU), Singapore, for 14 years from 1998 to 2012,
                                   where he was a Research Fellow, a Program Manager, an Assistant Professor
                                   and then promoted to an Associate Professor in 2005. He also held visiting
                                   positions at Queen Mary, University of London (UK) in 2008, and Nagoya
                                   University (Japan) in 2011. Before that, he pursued postdoctoral research at
                                   the Chinese University of Hong Kong, Hong Kong, in 1995, City University of
                                   Hong Kong, Hong Kong, and the University of Melbourne, Australia, from
                                   1996 to 1998. He received the B.S. degree from Sichuan University, Chengdu,
                                   China, in 1989, and the M.Eng and Ph.D. degrees from Southeast University,
                                   Nanjing, China, in 1992 and 1994, respectively, all in electronic and
                                   information engineering.

                                   He is a Fellow of the IEEE (2017, "for contributions to video coding and
                                   communications"), and a Fellow of the IET (2014). He is an IEEE
                                   Distinguished Lecturer of CASS (2019-2020) and of BTS (2012- ). More
                                   details...

                                                15
                                                15
Introduction of Speakers

  Guoliang XING
                            Speech Title: Tackling the Challenges of Machine Learning for
                            Mobile Health Systems

                            Abstract: The prominence of mobile devices and recent breakthroughs in
                            machine learning have enabled an emerging class of new mobile health
                            systems which hold the promise of transforming today’s reactive healthcare
                            practice to proactive, individualized care and wellbeing. However, the
                            current mainstream machine learning approaches are largely supervised
                            and must be trained by a large amount of labelled high-quality data.
                            Moreover, personal health data collected by on-device sensors cannot be
The Chinese University of   uploaded or shared with other devices due to privacy concerns. These
Hong Kong, Hong Kong        challenges have significantly hindered the performance and utility of mobile
                            health systems in real-world settings. In this talk, I will first discuss new
                            mobile systems that exploit human physiological models and innovative use
                            of sensing modalities to achieve highly robust sensing performance without
                            requiring extensive training. I will describe RunBuddy - the first
                            smartphone-based system for monitoring continuous running rhythm and
                            improving exercise efficiency. Based on this result, we also develop
                            BreathCoach, a smart and unobtrusive system using smartwatch and
                            smartphone-based VR for in-home RSA-BT (Respiratory Sinus Arrhythmia
                            biofeedback-based      Breathing      Training),   which   is   a   common
                            cardiorespiratory intervention to diseases such as asthma and an effective
                            exercise to reduce anxiety. More details...

                            Biography: Prof. Guoliang Xing received the B.S. and M.S degrees from Xi’an
                            Jiao Tong University, China, in 1998 and 2001, and the D.Sc. degree from
                            Washington University in St. Louis, in 2006. He is currently a Professor in
                            the Department of Information Engineering, the Chinese University of Hong
                            Kong. Previously, he was a faculty member at City University of Hong Kong
                            and Michigan State University, U.S.

                            Professor Xing’s research lies at the intersection between systems,
                            embedded AI, data/information processing algorithms, and domain
                            sciences, with a focus on interdisciplinary applications in health,
                            environment, and energy. His research group develops new technologies at
                            the frontier of mobile health, Cyber-Physical Systems (CPS), Internet of
                            Things (IoT), wireless networks, security and privacy. Several mobile health

                                         16
                                        16
Introduction of Speakers
     Hiroyuki Kudo

                               Speech Title: Image Reconstruction for Sparse-View CT and
                               Interior CT

                               Abstract: Since 2000, it has been widely recognized that radiation dose in
                               CT examinations increases cancer risk. To overcome this drawback, new
                               designs of CT scanners such as sparse-view CT and interior CT have been
                               actively investigated in CT community. The sparse-view CT refers to CT in
                               which the number of projection data is reduced to decrease patient dose as
                               well as to accelerate data acquisition. The interior CT refers to CT in which
                               x-rays are radiated only to a small region of interest (ROI) to decrease
University of Tsukuba, Japan   patient dose. A key in these scanners is how to reconstruct images with
                               sufficient quality from the limited projection data. This talk mainly consists
                               of two parts. The first part is concerned with image reconstruction for the
                               sparse-view CT using Compressed Sensing (CS) and Deep Learning (DL). CS
                               is a promising technique appeared around 2005, which is able to reconstruct
                               high-quality images even from the limited number of projection data.
                               Furthermore, since 2018, DL has also been investigated for the sparse-view
                               CT image reconstruction. The explanation will be constructed as follows.
                               First, we explain basic knowledge on this subject, which includes the
                               principle of sparse-view CT, as well as the principle of CS and DL image
                               reconstruction. Second, we introduce our recent research activities on this
                               topic, as well as showing application examples to medical xray CT, x-ray
                               phase CT, and electron tomography. The second part is concerned with
                               image reconstruction for interior CT. More details...

                               Biography: In March 1990. Hiroyuki Kudo received his doctoral degree in
                               electrical and communication engineering from the Tohoku University,
                               Japan. Since then, he has worked at the Tohoku University for 2 years, and
                               then at the University of Tsukuba for 28 years. Currently, he is a Professor at
                               Faculty of Engineering, Information and Systems, the University of Tsukuba,
                               Japan. His scientific interests include medical image analysis, image
                               reconstruction for medical tomography devices such as Computed
                               Tomography (CT) and Positron Emission Tomography (PET), and
                               computer-aided-diagnosis. In particular, he spent a long time of his research
                               career to develop advanced image reconstruction methods in tomography.
                               Most of his research results have been published in top journals in this
                               research field such as Physics in Medicine and Biology and IEEE
                               Transactions on Medical Imaging. Furthermore, his papers have been cited
                               4,000 times in Google Scholar and 2,000 times in Web of Science, in total.
                               and worked as a Guest Editor for IEEE Transactions on Medical Imaging.
                               More details...

                                            17
                                            17
Introduction of Speakers
        Yang Liu

                                 Speech Title: On the Trade-off between Privacy and Utility in
                                 Mobile Services: A Qualitative Study

                                 Abstract: While the widespread use of mobile services offers a variety of
                                 benefits to mobile users, it also raises serious privacy concerns. We report
                                 the results of a user study that investigated the factors that influence the
                                 decision-making process pertaining to the trade-off between privacy and
                                 utility in mobile services. Through two focus groups, 16 individual
                                 interviews and a questionnaire survey involving 60 participants, the study
Harbin Institute of Technology
                                 identified awareness and knowledge of privacy risks, trust in service
(Shenzhen), China
                                 providers, desire for mobile services, and belief of cyber privacy as four
                                 factors that contribute to the perceived trade-off. The results also suggest
                                 that, with appropriate adoption, privacy-preserving tools can positively
                                 influence the privacy trade-off. In addition, our findings explore the cultural
                                 differences regarding privacy between participants from western countries
                                 (with the UK as the main representative) and China. In particular, the results
                                 suggest that participants from China are more likely to be comfortable with
                                 a government department protecting their individual privacy, while
                                 participants from western countries are more likely to wish to see such
                                 responsibility   reside   with    some    combination     of    individuals   and
                                 non-governmental organisations.

                                 Biography: Yang Liu received his D.Phil (PhD) degree in Computer Science
                                 from University of Oxford in July 2018. Prior to joining Oxford, He received
                                 an MSc from Peking University and a B.Eng from Ocean University of China.
                                 He is currently an Assistant Professor and an Associate Research Fellow in
                                 School of Computer Science and Technology, Harbin Institute of Technology
                                 (Shenzhen), China. He is also a dual-employed research scholar in Cyber
                                 Security Research Center, Peng Cheng Laboratory (Provincial Laboratory of
                                 Cyberspace Science and Technology of Guangdong). He is interested in
                                 security and privacy problems and, in particular, the privacy issues on
                                 mobile devices and Internet of Things (IoT). He has received research grants
                                 for more than 4 million RMB during the past two years. He is currently
                                 undertaking several national, provincial and municipal scientific research
                                 projects directly related to the topic of privacy protection.

                                             18
                                             18
Introduction of Speakers
 Chau Kien Tsong
                             Speech Title: The Perception of University Learners on
                             Multimedia and Image Processing Courses in Malaysia

                             Abstract: Multimedia and Image Processing Courses are always presumed
                             as difficult and hard subjects for students in the Universities. These are
                             attributed to their technical algorithms and abstract concepts in the two
                             courses. In this talk, Dr Chau will present the research outcomes on his
                             students on why and what makes this two courses difficult from the
                             perspectives of the students. Knowledge and understanding in these respect
                             would facilitate effective teaching and learning, thereby allow the students
Universiti Sains Malaysia,
                             to attain better learning performance for these two subjects in University.
Malaysia
                             Discussion on these two courses are of significance because Multimedia and
                             Image Processing are foundational courses for higher end courses such as
                             Artificial Intelligence courses.

                             Biography: Dr. Chau Kien Tsong is Deputy Director (Postgraduate, Network
                             & Alumni) at the Centre for Instructional Technology and Multimedia,
                             Universiti Sains Malaysia (USM), Penang, Malaysia. Dr. Chau received his
                             undergraduate degree from the National University of Malaysia (UKM). He
                             has Master of Science (IT) from Prince University of Malaysia (UPM). His
                             PhD. degree is from USM. His academic background is image processing,
                             multimedia authoring, 2D and 3D animations, and educational technology.
                             He has been recognised for excellence in teaching and research, earning 2
                             gold medals in two international innovation competitions held in 2018 in
                             Malaysia and best paper award for research paper on motivated sensing
                             multimedia system for preschoolers in “International Conference on
                             Education, Teaching, and E-Learning” in 2017. Prior to his career at the USM,
                             Dr. Chau was a research fellow in USM. Dr. Chau is currently editorial board
                             members of three international journals, academic consultant and external
                             examiner of private institutions of higher learning in Malaysia, META and
                             IEEE member, and has been judge, session chair, and program committee for
                             several conferences. Dr. Chau has over 25 publications, which include
                             SCOPUS and ERA indexed journals.

                                         19
                                         19
Parallel Sessions

                                                                          Time Zone: GMT+8

 Tips:
  Please arrive at conference room/join in online meeting room 15 minutes earlier.
  There will be a session group photo part at the end of each session.

Onsite Session: Data and Information Security
Chair: Dr. Yang Liu, Harbin Institute of Technology (Shenzhen), China
Time: 14:30-16:30, January 9
Venue: 海鸥厅 Seagull Seminar Room, 2F
Online Room: A6        Link: https://zoom.com.cn/j/68717891504 ID: 687 1789 1504
    P002        A Partial-Lifting-Based Compiling Concolic Execution Approach
 14:30-14:45 Haotian Zhang
                State Key Laboratory of Mathematical Engineering and Advanced Computing,
                China

               Abstract-It has been a common phenomenon that embedded devices are used
               ubiquitously while the security of proprietary software running on devices has
               become more and more significant. These softwares are often presented to
               researchers in binary forms. Due to the lack of program semantics and
               meta-information, it is very difficult to analyze manually in large-scale binary
               programs. Therefore, automatic binary program analysis has become a critical
               research direction. Symbolic execution is an important method of automatic
               analysis, due to the problem of path explosion in traditional symbolic execution, it
               is sometimes complecated to explore the deep-level path of the program, and the
               most of current execution engines using IR translation execution, resulting in
               symbolic execution velocity has been exceedingly restrained, comparing to native
               execution. To this end, we propose a binary program oriented
               partial-lifting-based compile concolic execution approach, which is combined
               with static analysis to dissect the binary parts that researchers are intrigued in.
               The program is simultaneously combined with semantic lifting, dynamic memory
               monitoring, and symbolic compiler to reconstruct it into a symbolic binary
               program. Users can perform concolic execution on this program repeatly, so as to
               explore the part of the original binary program at a rate close to nativeexecution.

                                               20
                                               20
CSP 2021
                                                                         ICMIP 2021

   P008       A Blockchain-based Privacy-Preserving Recommendation Mechanism
14:45-15:00   Liangjie Lin
              Harbin Institute of Technology (Shenzhen), China

              Abstract-System is widely used to predict users’ interests and provide targeted
              products for them, which effectively facilitates users in the era of big data where
              information overload problem is prevalent. Unfortunately, massive data closely
              related to users’ privacy is in high demand to produce more accurate predictions.
              In this case, the collection and transmission of such data is communication costly;
              to process and analyze such data is of high possibility to compromise users’
              privacy. In this paper, we propose a privacy-preserving recommendation
              mechanism based on blockchain, which well addresses these problems.
              Leveraging the inherent advantages of blockchain, we establish a completely
              distributed model mitigating the risk of privacy disclosure caused by central data
              storage. Moreover, we combine Inter-Planetary File System with blockchain to
              greatly improve the communication efficiency. We also introduce local sensitive
              hashing and local differential privacy into proposed mechanism to reduce the
              computation load and provide a strong privacy guarantee. The experimental
              results demonstrate that the proposed mechanism shows better performance on
              privacy preservation while maintaining desirable recommendation accuracy
              when compared with the baseline.

   P009       A Novel Edge Computing Offloading and Privacy-preserving Scheme for Energy
15:00-15:15   Internet
              Kunchang Li
              North China Electric Power University, China

              Abstract-With the rapid development of Internet of things technology, "massive"
              data generated by Internet of things terminals ,which leads to the problem of
              excessive cloud computing pressure and network delay. Therefore, edge
              computing emerges as the time requires. At the same time, the privacy security of
              edge computing is particularly important. In this paper, ZSS short signature
              algorithm and Paillier homomorphic cryptosystem are used to propose a secure
              and efficient edge computing privacy-preserving in energy Internet. The scheme
              can achieve data confidentiality and privacy-preserving. Finally, the model of
              unloading is established to solve the problem quickly. Experimental results show
              that our scheme has less computation and communication overhead.

                                         21
                                         21
CSP 2021
                                                                         ICMIP 2021

   P014       Dimensionality-reduced Secure Outlier Detection on Union of Subspaces
15:15-15:30   Kunzan Liu
              Tsinghua University, China

              Abstract-In the problem of outlier detection (OD) on a union of subspaces (UoS),
              inliers are assumed to lie around a union of low-dimensional subspaces, and the
              goal is to detect the outliers that are not close to any of these subspaces. Among
              various algorithms, sparse self-representation-based ones have attracted much
              attention because of their theoretical performance guarantee. However, these
              algorithms need direct access to all raw data, and thus have poor data security
              and privacy protection capability. To solve this problem, in this paper we propose
              a new algorithm called dimensionalityreduced secure outlier detection (DrSOD),
              which uses random projection as a preprocessing step to avoid direct access to
              the raw data. We theoretically prove that DrSOD can correctly detect outliers with
              overwhelming probability under connectivity assumptions. In addition, the
              random projection step improves the computational efficiency of the algorithm.
              Experiments on synthetic and real-world datasets also demonstrate the
              effectiveness and efficiency of DrSOD.

   P1004      Research on Malware Variant Detection Method Based on Deep Neural Network
15:30-15:45   XING Jianhua
              Beijing Jinghang Computation and Communication Research Institute, China

              Abstract-To deal with the increasingly serious threat of industrial information
              malicious code, the simulations and characteristics of the domestic security and
              controllable operating system and office software were implemented in the
              virtual sandbox environment based on virtualization technology in this study.
              Firstly, the serialization detection scheme based on the convolution neural
              network algorithm was improved. Then, the API sequence was modeled and
              analyzed by the improved convolution neural network algorithm to excavate
              more local related information of variant sequences. Finally the variant detection
              of malicious code was realized.Results showed that this improved method had
              higher efficiency and accuracy for a large number of malicious code detection,
              and could be applied to the malicious code detection in security and controllable
              operating system.

                                         22
                                         22
CSP 2021
                                                                          ICMIP 2021

   P016       A LSTM-Based Channel Fingerprinting Method for Intrusion Detection
15:45-16:00   Ma Ting
              Southwest Petroleum University, China

              Abstract-Intrusion detection is a crucial issue for 5th generation (5G) access
              networks to securely support various services. Traditional cryptographic
              key-based solutions are not suitable for severe resources-constrained networks,
              such as the Internet of Things (IoT). In this paper, we propose a lightweight
              intrusion detection mechanism by exploring physical layer attributes that are
              unique and difficult to impersonate. Specifically, a long-short memory network
              (LSTM) is employed as an intelligent classifier to distinguish different
              transmitters based on channel state information (CSI) features. Then we develop
              a comprehensive 5G NR channel detection model based on LSTM under dynamic
              channel conditions to identify malicious attacks by intelligently analyzing CSI. The
              simulation results demonstrate that the proposed solution improves detection
              accuracy and successfully prevent systems from spoofing attacks.

   P0007      Nonlinear Filtered Compressed Sensing Applied on Image De-noising
16:00-16:15   Jian Dong
              Tianjin University of Technology and Education, China

              Abstract-In the present era, the need for studies on noise removal by image
              processing is still considerable. In this paper, we developed a compressed sensing
              (CS) based algorithm for image de-nosing. Optimization theory was utilized. A
              cost function consisting of data fidelity term and penalty term was proposed. The
              minimization of cost function was achieved by proximal minimization method.
              The advantage of the algorithm is two-fold. First, we embedded the filtering
              procedure into a CS framework. It enhanced the effectiveness of filtering strategy.
              As known, repetitive post filters make images blurred, but CS in the proposed
              algorithm could keep the image clarity while achieving noise depression. Second,
              selectivity of filter type, especially nonlinear filters, strengthened the
              effectiveness and practicability of CS. With increasing number of literatures
              revealing the failure of total variation (TV) method in processing images with rich
              details, the new algorithm could preserve image textures and object boundaries
              accurately. Convergence property of the novel algorithm was also proved by the
              de-nosing instance. Among the nonlinear filters, nonlocal weighted median filter
              based CS presented the best de-noising effectiveness. The algorithm is considered
              to have a potential application value in other image processing issues, such as
              image restoration and reconstruction.

                                          23
                                          23
CSP 2021
                                                                        ICMIP 2021

   P033       DECH: A novel attack pattern of cloud environment and its countermeasures
16:15-16:30   Haoyu Gao
              College of Data Science and Application, Inner Mongolia University of Technology,
              China

              Abstract-Cloud computing has become more and more vital in digital world as a
              basic technique of many services. As the foundation of cloud computing, the cloud
              platform hosts various cloud services running on it and providing interfaces to
              cloud users. Thus, it becomes a high-value target in attacker’s eyes. This paper
              proposes a novel attack pattern named DECH for intruding and controlling a
              cloud platform standing on the side of attackers. From the defenders’ perspective,
              this paper points out the key measures to enforce cloud service security are to
              restrict the Trust Computing Base (TCB) size and strengthen the isolation
              between cloud components. Then we provide countermeasures against “Detect
              Escape Control and Harvest” (DECH) based on the combination of Software Guard
              Extensions (SGX) and Trust Domain Extensions (TDE). This research provisions
              references for building secure cloud services.

                                         24
                                        24
CSP 2021
                                                                           ICMIP 2021

Virtual Session 1: Data Security and Information Management
Chair: Prof. Martin Butler, Stellenbosch University, South Africa
Time: 14:30-16:45, January 9
Online Room: B3        Link: https://zoom.com.cn/j/61951443949 ID: 619 5144 3949
    P011        ECDSA-Compatible Privacy Preserving Signature with Designated Verifier
 14:30-14:45 Sam Ng
                Crypto.com, Hong Kong

               Abstract-We present the first ECDSA compatible privacy preserving signature
               scheme, which is based on the work of nominative signature, with a designated
               verifier. The use case for this signature scheme is to sign personal information.
               For example, a user can prove to an insurance company that they are diagnosed
               with a certain disease and is eligible for an insurance claim. The insurance
               company will be convinced the doctor’s signature is genuine but it cannot leak the
               information with a convincing proof (i.e. the signature verification proof is not
               transferable, but leaking information without a proof is still possible). As in our
               example, the signature generation has to be initiated by the patient, with the help
               of the doctor, and the signature can only be verified by interacting with the
               patient directly.

    P022       PRADroid: Privacy Risk Assessment for Android Applications
 14:45-15:00   Yang Yang
               Henan Province Key Laboratory of Information Security, China

               Abstract-Android has become the most popular mobile operating system all over
               the world. Due to its openness, users can install applications freely. At the same
               time, users are increasingly storing personal privacy information in their mobile
               phones, which has led to Android becoming the main target of malicious
               applications, and privacy leaks have occurred from time to time. Although the
               Android operating system provides the permissions to restrict the ability of
               applications to access sensitive resources, users do not pay much attention to the
               granting of permissions, which makes malicious applications available. Therefore,
               it is of great significance to make risk assessments for applications before
               installation. In this paper we propose a privacy risk assessment framework called
               PRADroid for Android applications. Through likelihood assessment based on
               permissions and severity assessment based on information flow analysis, a risk
               matrix is finally generated to score the application privacy risk. We evaluate
               PRADroid on 2000 Android applications, and the experimental results show that
               PRADroid can score reasonably and effectively.

                                            25
                                            25
CSP 2021
                                                                          ICMIP 2021

   P027       DOSing Distributed Ledger Technology: IOTA
15:00-15:15   Mark A. Brady
              University of Twente, Netherlands

              Abstract-With advancements in connected technology, the number of ambitious
              applications involving Internet of Things (IoT) are drastically growing. This
              increases concerns related to security, scalability, and interoperability of IoT. As
              the network of connected devices grows, decentralized technologies become
              inevitable. Within this trend towards decentralization, distributed ledger
              technology (for instance IOTA) will be a significant driving force. IOTA is an
              innovative distributed ledger technology targeted towards low power devices,
              where energy efficiency is a high priority. Public research regarding security
              threats against IOTA especially denial-of-service (DoS) is essentially non-existent.
              In this paper we focus on exploring a DoS attack against IOTA. The proposed
              attack methodology takes advantage of the lack of fees along with the ability to
              transfer minuscule amounts. By sending many conflicting transactions as it
              results in a high number of re-attachments. The high number of re-attachments
              threatens IOTA’s suitability for the IoT sphere. The implications of such attack, as
              well as the future of this issue in terms of the planned removal of the centralized
              coordinator are discussed.

   P028       The Influence of Mobile Operation Systems on Mobile User Security Behavior
15:15-15:30   Martin J Butler
              Stellenbosch University, South Africa

              Abstract-Mobile security remains a concern for multiple stakeholders. Safe user
              behavior is crucial key to avoid and mitigate mobile threats. The research used a
              survey design to capture key constructs of mobile user threat avoidance behavior.
              Analysis revealed that there is no significant difference between the two key
              drivers of secure behavior, threat appraisal and coping appraisal, for Android and
              iOS users. However, statistically significant differences in avoidance motivation
              and avoidance behavior of users of the two operating systems were displayed.
              This indicates that existing threat avoidance models may be insufficient to
              comprehensively deal with factors that affect mobile user behavior. A newly
              introduced variable, perceived security, shows a difference in the perceptions of
              their level of protection among the users of the two operating systems, providing
              a new direction for research into mobile security. these methods. Finally, the
              developed models are reliable for not only the conceptual phase of future rural
              road projects but also the related construction fields can be recovered about the
              cost model creation.

                                          26
                                          26
CSP 2021
                                                                           ICMIP 2021

              for track utilization charges. In this study, the costs of infrastructure construction
              and maintenance on 5 route sections representing different traffic characteristics
              were studied by using records from 5 years. It was found that the maintenance
              cost of the telecommunication and signalling system ranges from 1.3 to 1.7
              million baht per year per station. The average annual maintenance cost of the
              railway track was 280,000 to 310,000 baht per track per kilometre. The traffic
              density was found to be the main factor that influenced the maintenance cost.
   P035       velink - A Blockchain-based Shared Mobility Platform for Private and Commercial
15:30-15:45   Vehicles utilizing ERC-721 Tokens
              Dominic Pirker
              Graz University of Technology, Austria

              Abstract-Transportation of people and goods is important and crucial in the
              context of smart cities. The trend in regard of people’s mobility is moving from
              privately owned vehicles towards shared mobility. This trend is even stronger in
              urban areas, where space for parking is limited, and the mobility is supported by
              the public transport system, which lowers the need for private vehicles. Several
              challenges and barriers of currently available solutions retard a massive growth
              of this mobility option, such as the trust problem, data monopolism, or
              intermediary costs. Decentralizing mobility management is a promising approach
              to solve the current problems of the mobility market, allowing to move towards a
              more usable internet of mobility and smart transportation. Leveraging blockchain
              technology allows to cut intermediary costs, by utilizing smart contracts.
              Important in this ecosystem is the proof of identity of participants in the
              blockchain network. To proof the possession of the claimed identity, the private
              key corresponding to the wallet address is utilized, and therefore essential to
              protect. In this paper, a blockchain-based shared mobility platform is proposed
              and a proof-of-concept is shown. First, current problems and stateof- the-art
              systems are analyzed. Then, a decentralized concept is built based on ERC-721
              tokens, implemented in a smart contract, and augmented with a Hardware
              Security Module (HSM) to protect the confidential key material. Finally, the
              system is evaluated and compared against state-of-the-art solutions.

   P037       Lightweight Blockchain-based Platform for GDPR-Compliant Personal Data
15:45-16:00   Management
              Cristòfol Daudén-Esmel
              Universitat Rovira i Virgili, Spain

              Abstract-New digital technologies generate large amounts of information. This
              data is processed by Service Providers in order to improve and develop new
              services or products, but also to fund themselves. However, processing these
              personal data can result in the extraction of sensitive information.

                                          27
                                          27
CSP 2021
                                                                       ICMIP 2021

              In consequence, it can lead to users’ privacy risk. To mitigate this risk, the EU
              elaborated the GDPR. It forces Service Providers to have Data Subjects’ explicit
              consent for collecting and processing their personal data. The problem is that
              legislative text does not define how to transparently demonstrate that they
              already have this consent. Also, most users do not know the rights they have
              over their personal data, neither this regulation provides techniques for them
              to be aware about what happens with it. In this paper, we propose a lightweight
              blockchain-based GDPRcompliant personal data management platform. It
              provides public access to immutable evidences that show the agreements
              between the Data Subjects and Service Providers. The Service Providers can
              demonstrate that they are fulfilling the regulation, and Data Subjects are aware
              about what happens with their personal data and can manage it according to
              their rights.
   P036       Assessment of Remote Biometric Authentication Systems: Another Take on the
16:00-16:15   Quest to Replace Passwords
              Daniel Köhler
              Hasso Plattner Institure, Germany

              Abstract—Passwords are often criticized due to being prone to misuses such as
              bad password creation and management practices. Experts usually advise using
              other forms of authentication. While there are plenty of alternative
              authentication methods available, an overall assessment often proves to be
              challenging. This is because of aspects such as differences in security
              techniques, different applicability of the system, or varying difficulties of
              implementation. To tackle the issue of comparing different authentication
              systems, unified criteria are needed. Bonneau et al. proposed a framework for
              comparing authentication schemes in their ”The Quest to Replace Passwords”.
              We contribute to the quest by providing information and assessment on the
              previously unassessed Remote Biometric Authentication Systems, thus
              increasing the variety of analyzed systems. We achieve this by analyzing six
              exemplary implementations. To enable proper evaluation of the details of that
              new category of authentication schemes, this work furthermore expands the
              framework by the two aspects Resilient-to-Biometric-Loss and
              No-Trusted-Execution-Environments.

                                       28
                                       28
CSP 2021
                                                                      ICMIP 2021

   P013       Detecting Android Malware Based on Dynamic Feature Sequence and Attention
16:15-16:30   Mechanism
              Hanlin Long
              Harbin Institute of Technology (Shenzhen), China

              Abstract-The mechanism of running software on virtual machines partly
              ensures the security of Android system. However, with all kinds of malicious
              codes being developed, there has been a huge number of massive security
              incidents caused by malware on Android. Malware has various code patterns,
              but their behaviors are measurable. In this paper, a new method of detecting
              Android malware by analyzing malware’s behaviors is proposed. The method is
              characterized by the ability to mine the contextual relationships between
              system calls and network activities. Besides, the method requires only a small
              data set to achieve good classification performance.
              We propose a set of methods for automatically collecting and organizing
              dynamic features from Android application Based on the collected features,
              deep neural network is used to classify software samples. We validate the
              effectiveness of the proposed method on a set of 2210 applications obtained
              from Androzoo. The experimental results demonstrate that the proposed
              method has high detection accuracy against wild malware as compared with
              other methods.
   P034       A Study on Privacy Issues in Internet of Things (IoT)
16:30-16:45   Mayasarah Maslizan
              Cybersecurity Malaysia, Malaysia

              Abstract-Internet of Things (IoT) is an interconnected wireless network where
              smart nodes (IoT devices) interact with each other in order to exchange data
              through the communicating medium. Internet of Things (IoT) have rapidly
              increased in popularity, demand and commercial availability within the past
              several years. Various IoT applications generate a huge amount of data from
              different types of resources, including smart cities, manufacturing industries,
              health institutions, and governments. Due to the pervasive nature of IoT and
              the limitless opportunities that this technology provides, security and privacy
              becomes two key concerns for the users of these smart offerings. Most of the
              privacy threats disclosing the private information to unwanted party and gives
              rise to serious implications in various IoT application. Thus, this paper will
              analyse existing literature related to various privacy threats in IoT, privacy
              issues in different applications of IoT and present summary of the study.

                                       29

                                       29
CSP 2021
                                                                             ICMIP 2021

Virtual Session 2: Computer and Intelligent Computing
Chair: Dr. Chau Kien Tsong, Universiti Sains Malaysia, Malaysia
Time: 14:30-17:15, January 9
Online Room: A3       Link: https://zoom.com.cn/j/67812626226 ID: 678 1262 6226
    P023        Forensic Analysis of Binary Structures of Video Files
 14:30-14:45 Md Abir Hasan
                University of Alaska Fairbanks, USA

                Abstract-As technology advances, multimedia files such as videos are susceptible
                to manipulation. This has led to serious concerns that images and videos are not
                trustworthy evidence as the files can be manipulated easily. As a result, forensic
                analysis of electronic multimedia files plays an important role in verifying the
                authenticity of video files. This paper provides comprehensive details of a binary
                file forensic analysis technique for different media file containers, mostly focused
                on AVI and MP4/MOV container format. We also provide a considerable number
                of details to identify a forgery among video files. We present pivotal parameters
                which need to be tested to authenticate a video file. By analyzing the binary data
                structures and metadata, we can detect the use of editing tools, verify the
                purported source of a video file, and identify the true acquisition device model.

    P001        Trend Analysis and Countermeasure Research of DDoS Attack under 5G Network
 14:45-15:00    Haiou Huang
                College of Computer Science and Technology, Jilin University, China

                Abstract-DDoS has been terrorizing network operators since its birth in the late
                20th century, and people are constantly researching new methods and techniques
                to mitigate or solve DDoS attacks. However, with the network technology update
                iteration, DDoS attacks also emerge in endlessly. When we exclaims the high
                speed experience brought by 5G, we should not forget that the network is a
                double-edged sword, and the security problem of 5G network is also not to be
                underestimated. As traditional DDoS defenses continue to fail, researchers who
                have grown more aggressive in recent years have seen some promising, low-cost
                technologies emerge. This paper first analyzes the trend of DDoS attacks in the
                past two years, then analyzes some DDoS defense mitigation schemes based on
                SDN, NFV and MTD, and points out some challenges faced by using new
                technologies to defend DDoS attacks.

                                             30

                                             30
CSP 2021
                                                                            ICMIP 2021

   P0012      Vehicle Flow Detection Based on Improved Deep Structure and Deep Sort
15:00-15:15   Haobin Li
              Sichuan University, China

              Abstract-Real-time vehicle detection based traffic monitoring is a hot research
              topic within the area of computer vision. In view of the problem of low detection
              accuracy and low processing speed, a vehicle detection method based on
              Improved Deep Structure is proposed in this study. Due to the characteristics of
              highway vehicles with a fixed aspect ratio, k-means ++ clustering method is used
              to select new anchor boxes to eliminate false targets at an early stage followed by
              improved depth structure with deep sort. Experimental results demonstrated
              that our proposed method on standard data set KITTI-UA achieved higher
              precision and faster speed than the existing algorithms.

   P007       A Scheme of Key Distribution in Smart Grid
15:15-15:30   Youwu Zhou
              State Grid JiangXi Electric Power Research Institute, China

              Abstract-Group communication for Smart Grid, because of its special
              characteristics of large-scale nodes, open communication channel and high
              packets loss rate, making secure group communication of Smart Grid face many
              security threatens, so how to realize secure communication between groups and
              how to establish secure session keys shared between nodes has been the focus of
              Smart Grid. Aimed at the problem mentioned above, a group key distribution
              scheme based on three hash chains is proposed for Smart Grid. This scheme
              introduces a self-healing hash chain based on two-way hash chain, when a node is
              revoked, the corresponding self-healing hash value will be replaced by a new
              random value, so that revoked nodes can’t realize collusion attack with the newly
              added node; This scheme also takes into account the problem of high packet loss
              rate in Smart Grid, and realizes self-healing property. The security and
              performance analysis shows that the scheme can meet the security requirements
              of group communication for Smart Grid, and it has the characteristics of dynamic
              revocation and resisting collusion. The scheme also reduces the storage overhead
              and the communication load of node to a large extent, and can meet the
              performance requirements of group communication for Smart Grid.

                                                                              CSP 2021
                                                                            ICMIP 2021

                                          31

                                          31
You can also read