Invited Speaker 1: Prof. Xuejia Lai, Shanghai Jiao Tong University, China
Title: Information security and blockchain
Invited Speaker 2: Prof. Haojin Zhu, Shanghai Jiao Tong University, China
Title: Smoke Screener or Straight Shooter: Detecting Elite Sybil Attacks in User-Review Social Networks
Invited Speaker 3: Prof. Shui Yu, University of Technology Sydney, Australia
Title: Big Data Privacy: from Networking and Artificial Intelligence Perspectives
Invited Speaker 4: Prof. Yong Yu, Shanxi Normal University, China
Title: Identity-based/Attributed-based Remote Data Integrity Checking
Invited Speaker 5: Prof. Sancheng Peng, Guangdong University of Foreign Studies, China
Title: Social Computing Based on Big Data: Opportunities and Challenges
Invited Speaker 6: Dr. Haroon Elahi, Guangzhou University, China
Title: Smartphone Bloatware: An over-looked privacy problem
Detailed Information about Invited Talks
| |
Title: Information security and blockchain
Invited Speaker 1: Prof. Xuejia Lai
Shanghai Jiao Tong University, China
|
Abstract. The ISO defined 5 security services, but in reality, security is provided by other tools such as anti-virus,firewall, intrusion prevention etc.
we try to give reasons to explain such situation. Then we point out that the real contribution of blockchain to the IT-security (cryptography) is that,
blockchain technique provides a practical solution to the problem of non-repudiation, which is not well sovled with thetraditional crypto-tools.
Finally, we comment on terminoligies like "decentralization", "consense", etc.
Biography. Xuejia Lai received Ph.D. of sc. techn in 1992 from the Swiss Federal Institute of Technology, Zurich. In 1994, he joined r3 security engineering ag which became Entrust Technologies in 1998. He is a professor of Shanghai Jiao Tong University since 2004. His work has been concentrated in cryptography during the past 34 years.
He is co-inventor (together with J. L. Massey) of the IDEA cipher, proposed the concept of differential, Markov cipher, higher-order differentials, free-start attacks on hash functions; developed DNA algorithm for computing discrete logarithm and proposed public-key system using DNA-chip.
He has published a book "On the Design and Security of Block Ciphers" (Hartung-Gorre Verlag, 1992) and more than 100 papers.
He is IACR member since 1988 and is the chair of Asiacrypt steering committee. He has served as general chair of Asiacrypt 2012, PC chair of Asiacrypt 2006, ISC 2011 and AsiaCCS 2012, and PC-member for about 100 conferences, and editor for 3 ISO standards. He is editor of journals JCST,JISE.
Top↑
| |
Title: Smoke Screener or Straight Shooter: Detecting Elite Sybil Attacks in User-Review Social Networks
Invited Speaker 2: Prof. Haojin Zhu
Shanghai Jiao Tong University, China
|
Abstract. Popular User-Review Social Networks (URSNs)— such as Dianping, Yelp, and Amazon—are often the targets of reputation attacks in which fake reviews are posted in order to boost or diminish the ratings of listed products and services. These attacks often emanate from a collection of accounts, called Sybils, which are collectively managed by a group of real users. A new advanced scheme, which we term elite Sybil attacks, recruits organically highly-rated accounts to generate seemingly trustworthy and realistic-looking reviews. These elite Sybil accounts taken together form a large-scale sparsely-knit Sybil network for which existing Sybil fake-review defense systems are unlikely to succeed.
In this work, we present the first study to define, characterize, and detect elite Sybil attacks. We show that contemporary elite Sybil attacks have a hybrid architecture, with the first tier recruiting elite Sybil workers and distributing tasks by Sybil organizers, and with the second tier posting fake reviews for profit by elite Sybil workers. We design ELSIEDET, a three-stage Sybil detection scheme, which first separates out suspicious groups of users, then identifies the campaign windows, and finally identifies elite Sybil users participating in the campaigns. We perform a large-scale empirical study on ten million reviews from Dianping, by far the most popular URSN service in China. Our results show that reviews from elite Sybil users are more spread out temporally, craft more convincing reviews, and have higher filter bypass rates. We also measure the impact of Sybil campaigns on various industries (such as cinemas, hotels, restaurants) as well as chain stores, and demonstrate that monitoring elite Sybil users over time can provide valuable early alerts against Sybil campaigns.
Biography. Haojin Zhu (zhu-hj@cs.sjtu.edu.cn) received his B.Sc. degree (2002) from Wuhan University (China), his M.Sc.(2005) degree from Shanghai Jiao Tong University (China), both in computer science and the Ph.D. in Electrical and Computer Engineering from the University of Waterloo (Canada), in 2009. Since 2017, he has been a full professor with Computer Science department in Shanghai Jiao Tong University. His current research interests include network security and privacy enhancing technologies. He published more than 40 international journal papers, including JSAC, TDSC, TPDS, TMC, TWC, TVT, and 60 international conference papers, including IEEE S&P, ACM CCS, NDSS, ACM MOBICOM, ACM MOBIHOC, IEEE INFOCOM, IEEE ICDCS. He received a number of awards including: IEEE ComSoc Asia-Pacific Outstanding Young Researcher Award (2014), Top 100 Most Cited Chinese Papers Published in International Journals (2014), Supervisor of Shanghai Excellent Master Thesis Award (2014), Distinguished Member of the IEEE INFOCOM Technical Program Committee (2015), Outstanding Youth Post Expert Award for Shanghai Jiao Tong University (2014), SMC Young Research Award of Shanghai Jiao Tong University (2011). He was a co-recipient of best paper awards of IEEE ICC (2007) and Chinacom (2008), IEEE GLOBECOM Best Paper Nomination (2014), WASA Best Paper Runner-up Award (2017). He received Young Scholar Award of Changjiang Scholar Program by Ministry of Education of P.R. China in 2016.
Top↑
| |
Title: Big Data Privacy: from Networking and Artificial Intelligence Perspectives
Invited Speaker 3: Prof. Shui Yu
University of Technology Sydney, Australia
|
Abstract. Big data is revolution for our society. However, it also introduces a significant threat to our privacy. In this talk, we firstly present the essential issues of privacy preserving in the big data setting, then we review the current work of the field from two perspectives: networking and artificial intelligence. Then we discuss the challenges in the domain and possible promising directions. We humbly hope this talk will shed light for forthcoming researchers to explore the uncharted part of this promising land.
Biography. Shui Yu is currently a Professor of School of Software, University of Technology Sydney, Australia. Dr Yu’s research interest includes Security and Privacy, Networking, Big Data, and Mathematical Modelling. He has published two monographs and edited two books, more than 200 technical papers, including top journals and top conferences, such as IEEE TPDS, TC, TIFS, TMC, TKDE, TETC, ToN, and INFOCOM. Dr Yu initiated the research field of networking for big data in 2013. His h-index is 35. Dr Yu actively serves his research communities in various roles. He is currently serving a number of prestigious editorial boards, including IEEE Communications Surveys and Tutorials (Area Editor), IEEE Communications Magazine (Series Editor). He has served many international conferences as a member of organizing committee, such as publication chair for IEEE Globecom 2015, IEEE INFOCOM 2016 and 2017, and general chair for ACSW 2017. He is a Senior Member of IEEE, a member of AAAS and ACM, and a Distinguished Lecturer of IEEE Communication Society.
Top↑
| |
Title: Identity-based/Attributed-based Remote Data Integrity Checking
Invited Speaker 4: Prof. Yong Yu
Shanxi Normal University, China
|
Abstract. Remote data integrity checking (RDIC) enables a data storage server, say a cloud server, to prove to a verifier that it is actually storing a data owner’s data honestly. To date, a number of RDIC protocols have been proposed in the literature, but most of the constructions suffer from the issue of a complex key management, that is, they rely on the expensive public key infrastructure, which might hinder the deployment of RDIC in practice. In this talk, we present a few new constructions of RDIC protocols called Identity-based/Attributed-based Remote Data Integrity Checking, which provide a potential solution to the key management issue in RDIC protocols.
Biography. Yong Yu is currently a Professor with Shaanxi Normal University, Xi’an. He holds the prestigious One Hundred Talent Professorship of Shaanxi Province as well. He has authored more than 70 refereed journal and conference papers. His research interests include cryptography and its applications, especially public encryption, digital signature, and secure cloud computing. He is an Associate Editor for Soft Computing.
Top↑
| |
Title: Social Computing Based on Big Data: Opportunities and Challenges
Invited Speaker 5: Prof. Sancheng Peng
Guangdong University of Foreign Studies, China
|
Abstract. With the rapid development of information technology, especially growing progress in the artificial intelligence, internet of things, cloud computing, social networks, and social media, the era of big data is coming. As a new computing paradigm, social computing provides a new interdisciplinary research and application field. It is attracting an increasing large amount of research ranging from popular topics extraction to social computing. To conduct a broad comprehension of major topics involved in social computing, we provide a brief overview of the various research fields in social computing, and present key concepts and analyze state-of-the-art of the field. In addition, we discuss our recent research work in social computing. Finally, research challenges relevant to real-world issues in social computing are summarized.
Biography. Sancheng Peng received his Ph.D. degree in Computer Science, from Central South University, China, in 2010. He is a Provincial Training Objects of “Thousand-Hundred-Ten” Talent Training Project. He is Professor of Guangdong University of Foreign Studies, China. He was a Research Associate of City University of Hong Kong from 2008 to 2009. His research interests include network cyberspace security, social computing, trusted computing, and mobile computing. He has published more than 50 technical papers, such as IEEE Communications Surveys and Tutorials, IEEE Transactions on Dependable and Secure Computing, IEEE Network, Information Sciences, Computer & Security, Computer Networks, Future Generation Computer Systems, and Journal of Network and Computer Applications. His research is supported by the National Natural Science Foundation of China, the Guangdong Provincial Natural Science Foundation, the Postdoctoral Science Foundation of China, and the Science and Technology Plan Project of Guangzhou. He has served as guest editor-in-chief for international journals--Future Generation Computer Systems (FGCS). He is an executive member of the council of Guangzhou Association of Computers (2016-), and a senior member of CCF.
Top↑
| |
Title: Smartphone Bloatware: An over-looked privacy problem
Invited Speaker 6: Dr. Haroon Elahi
Guangzhou University, China
|
Abstract. Smartphone bloatware or pre-installed applications are included in smartphones by the Original Equipment Manufacturers and the telecom carriers partly to remain ahead of competitors and partly to subsidize the costs of smartphones through app developers. Such applications are also known to be used for maintaining device control and for collecting user data. There are a number of other privacy and security costs associated with these freely available apps. However, costs and benefits of these apps for the smartphone users have not been assessed. This talk, presents findings of a user-study that was conducted to investigate the practical utility of bloatware in personal and professional lives of users. Furthermore, the privacy and security implications of such apps shall be discussed to assess whether these are such valuable assets that users should surrender control of their personal data and privacy, in exchange. Some new concepts of ‘dormant profiles’, and ‘on-demand and flexible’ apps are also part of this talk.
Biography. Haroon Elahi is a doctoral student in the School of Computer Science and Educational Software, Guangzhou University, China. He graduated from Blekinge Institute of Technology, Sweden in Computer Science. Prior to that he studied Ubiquitous Computing at the same institution. He also earned degrees in IT and Commerce from Pakistan. The focus of his current research is the state of personal data privacy in changing threat landscape. He is investigating the data over-collection practice in Android smartphones and its impacts on personal data privacy.
He has vast work experience in both academia and industry. Prior to beginning his PhD studies in China, he was working as an Assistant Professor in a private sector university in Pakistan. Moreover, he has worked with professional trainings, project design, product design, and software development. He believes that both the human and the technical aspects of computing technologies need to be incorporated into computing solutions for effective privacy and security.
Top↑