Program for Third International Conference on Applied Soft computing and Communication Networks (ACN'18)
Wednesday, September 19
Wednesday, September 19 8:30 - 13:00
Registration, Breakfast and tea
Wednesday, September 19 9:20 - 10:15
Inaugural Session
Wednesday, September 19 10:15 - 11:00
Keynote: Intent based networking
Abstract: The intuitive network starts with intent-based infrastructure that is secure - essentially all IP infrastructure, including switches, routers, wireless access points, that provides the connectivity and routes traffic from devices (PCs, tablets, phones, video screens, IoT) within the enterprise and to the internet.IP networking started small 30 years ago, connecting two departments in a lab. Now, enterprises have networks with tens of thousands of boxes. Most of them still have relatively primitive tools to manage this complexity. It's an expensive process and can slow down the business. The wireless network is separate from the wired network, which is separate from the Wide Area Network. And they're all managed and configured separately, and they can all have different interfaces, commands, and configuration models. Even worse, this is all usually done one box at a time. With the intuitive network, we fundamentally changed the approach, removing a lot of the complexity accumulated over the past 30 years. Now we have one unified system that spans the entire enterprise access network, covering all type of devices. It acts as a single platform, driven by intent. This intent-based infrastructure is programmable and integrated so that it can be automated. Also, security is built-in with the ability to find threats and automate responses to keep enterprises protected from advanced threats. This unified system includes our networking software operating system, IOS. Over the past two years, we've completely rebuilt IOS for the digital age. IOS is now API driven, open, programmable, and modular - all capabilities that are required from a modern software stack.
Wednesday, September 19 11:00 - 12:00
Keynote 1: Engineering the Fabric of IoT, People, and Systems
Abstract: In this talk I will explore the integration of people, software services, and things with their data, into a novel resilient ecosystem, which can be modeled, programmed, and deployed on a large scale in an elastic way. This novel paradigm has major consequences on how we view, build, design, and deploy ultra-large scale distributed systems and establishes a novel foundation for an "architecture of value" driven Smart City. In particular, this talk addresses three novel paradigms for designing the service-oriented information systems of the future: Elastic Computing, Social Compute Units, and Osmotic Computing. These three paradigms serve as a foundation for future large-scale distributed systems. Furthermore, we will discuss our responsibilities as computer scientists, technologists, and researchers for creating technologies, which benefit society in a positive way, thereby strengthening the new fabric of interconnected people, software services, and things into a novel resilient ecosystem.
Wednesday, September 19 12:00 - 13:00
Keynote 2: The Power of Memory (Tom Coughlin)
Abstract: Advances in computing, communications, networking and electronics have enabled the generation of enormous amounts of data. This is due to higher resolution data, captured more frequently, and the growing use of connected sensor data in IoT applications. This data must be captured, processed and then stored. Some data must be kept for a short time and processed quickly to be useful, e.g. in autonomous vehicles as well as robotics and automation. The results of this processing and data generated having economic value (e.g. commercial video) may be kept for a long time. This talk will examine the latest developments in the digital memory and storage hierarchy and how they will enable developments in AI, cloud computing, VR/AR, Smart Cities, robotics and automation and the preservation of culture, technology and history.
Wednesday, September 19 13:00 - 13:45
Lunch Break
Wednesday, September 19 14:00 - 18:30
ISTA-01: ISTA-01: Intelligent Image Processing /Artificial Vision/Speech Processing
- ISTA-01.1 14:00 Effect of Denoising on Hyperspectral Image Classification using Deep Networks and Kernel Methods
- ISTA-01.2 14:18 Transfer Learning for Video Anomaly Detection
- ISTA-01.3 14:36 Precision centric framework for activity recognition using Dempster Shaffer Theory and Information fusion algorithm in smart environment
- ISTA-01.4 14:54 Spectacle problem removal from facial images based on detail preserving filtering schemes
- ISTA-01.5 15:12 Domain Independent Static Video Summarization using Sparse Autoencoders and K-means Clustering
- ISTA-01.6 15:30 Deep Rectified System for High-speed Tracking in Images
- ISTA-01.7 15:48 Identification and Exploration of Facial Expression in Children with ASD in a Contact less Environment
- ISTA-01.8 16:06 Computer-Aided Grading of Prostate Cancer from MRI images using Convolutional Neural Networks
- ISTA-01.9 16:24 An improved Local Binary Pattern based Edge Detection Algorithm for Noisy Images
- ISTA-01.10 16:42 Pair wise training for stacked convolutional autoencoders using small scale images
SIRS-01: SIRS-01: Intelligent Recognition Techniques and Applications
- SIRS-01.1 14:00 Pre-processed Hyperspectral Image Analysis Using Tensor Decomposition Techniques
- SIRS-01.2 14:18 Intelligent Systems Applied to the Classification of Multiple Faults in Inverter Fed Induction Motors
- SIRS-01.3 14:36 Wemotion: A system to detect emotion using wristbands and smartphones
- SIRS-01.4 14:54 Recovery of a failed antenna element using Genetic Algorithm and Particle Swarm Optimization for MELISSA
- SIRS-01.5 15:12 Deep Learning Locally Trained Wildlife Sensing in Real Acoustic Wetland Environment
- SIRS-01.6 15:30 Clickbait Detection Using Swarm Intelligence
- SIRS-01.7 15:48 A Novel Method for Stroke Prediction from Retinal Images using HoG Approach
- SIRS-01.8 16:06 Digital Display Control Using Automation
SSCC-01: SSCC-01: Security and Privacy in Networked Systems
- SSCC-01.1 14:00 Workload Distribution for Supporting Anonymous Communications in Automotive Network
- SSCC-01.2 14:18 Diversity and Progress Controlled Gravitational Search Algorithm for balancing load in cloud
- SSCC-01.3 14:36 Survey on Prevention, Mitigation and Containment of Ransomware Attacks
- SSCC-01.4 14:54 Managing Network Functions in Stateful Application Aware SDN
- SSCC-01.5 15:12 Trust-Neighbors-Based to mitigate the cooperative black hole attack in OLSR protocol
- SSCC-01.6 15:30 Policy-based network and security management in federated service infrastructures with permissioned blockchains
- SSCC-01.7 15:48 Statistical Comparison of Opinion Spam Detectors in Social Media with Imbalanced Datasets
- SSCC-01.8 16:06 A Participatory Privacy Protection Framework for Smart-Phone Application Default Settings
- SSCC-01.9 16:24 Designing a User-Experience-First, Privacy-Respectful, high-security mutual-multifactor authentication solution
- SSCC-01.10 16:42 Security Threats Against LTE Networks: A Survey
- SSCC-01.11 17:00 On Minimality Attack for Privacy-Preserving Data Publishing
Wednesday, September 19 16:30 - 17:30
Tea Break
Thursday, September 20
Thursday, September 20 8:30 - 13:00
Registration
Thursday, September 20 10:00 - 11:00
Keynote 3: Advanced Signal Processing and Machine Learning Techniques for Neurological Disorder Detection and Prediction Approach
Talk description: EEG is used as a noninvasive tool for analyzing brain activity. The talk will summarize recent techniques used for detecting neurological disorders such as epilepsy and dementia. Epilepsy affects about 70 million people worldwide. Epilepsy is characterized by repeated seizures. EEG is used as a tool for auto diagnosis, localization, and prediction of seizure. Various features, features variation between pre-seizure, seizure and inter-seizure EEG signals and classifier used for the auto-detection will be discussed in the talk. Dementia is one of the largest neurological disorders affecting developing and poor countries. Pre-diagnosis of dementia will help to take steps for reducing the effect of dementia. Present need of the hour is to tackle dementia in India, estimate disease burden in the community and steps to increase awareness among people regarding dementia. The talk will focus on EEG signal processing techniques for pre-dementia diagnosis.
Thursday, September 20 11:00 - 11:15
Tea Break
Thursday, September 20 11:15 - 12:10
Keynote 4: Medical Image Diagnostics: A case study of spine pathology
Talk description: With growing digital medical data and meteoric success of machine learning it is now feasible to aid the medical practitioner in better diagnosing pathology and in some cases, outperform them. Lower back pain (LBP) is widely prevalent in people all over the world and negatively affects the quality of life due to chronic pain and change in posture. According to the American Academy of Orthopedic Surgeons (AAOS) four out of five adults experience low back pain at some point during their lives. I will discuss results from our work in automating the diagnosis of spine pathology. Clinical datasets are generally limited to pathological findings such as arthritis, fracture, infection, dislocation or tumor, but in the absence of gross pathology there is very poor correlation to nonspecific spine pain clinical symptoms. Since the majority of spine pain patients do not have any correlative pathological findings, it is important to look at the mechanics of the spine from a clinical standpoint. I will end this talk with some results in automating the process of suggesting changes to biomechanics of the spine thus taking the automation from diagnosis to cure.
Thursday, September 20 12:10 - 13:00
Keynote 5: Blockchain and its Applications on Edge Computing, Industry 4.0, IOT and Smart Cities
Abstract: Blockchain is the technology behind bitcoin, ether and most of the other cryptocurrencies. Blockchain is essentially a form of record keeping and can be used in almost any product that uses some form of record keeping or database management. Blockchain is ideal for protecting any data that needs to be unalterable and indestructible. Traditionally, data are kept on a server that is owned and operated by a third-party company. This approach has some disadvantages. In this way, if a third party has access to your data, they could be destroyed, they could be altered, and it could leak. Through Blockchain, data are encrypted and then propagated over a distributed network of computers. In this way, data are nobody's properties, data cannot be destroyed and altered. Data block are sets of permanently recorded data e.g. financial transactions. The information is first hash which is a way to represent the data in a compact format where data can be easily compared for any change. Any small change in the data completely changes the hash version which makes the comparison very easy. The hash data are then encrypted. One private key allows the producer of the data to encrypt the data and serves as a digital signature. Also, one public key allows everyone else with the key to decrypt it. Finally, the data blocks are connected to each other (chained). Bitcoin is simply an application of Blockchain but there are many other applications where this technology has a lot to say. The application of this technology is endless in all fields but with respect to industry there are fields in which use is more and more common e.g. Supply Chain Management, Health Care and medical record sharing, Media Distribution, E-commerce with no middleman, Sharing economy with no central authority, Authenticated News Sharing/Data Sharing, Data Sharing Between companies.
Edge Computing, Industry 4.0, IOT and Smart Cities are areas in which Blockchain has high impact. The IoT refers to the ever-growing network of physical objects that feature an IP address for internet connectivity, and the communication that occurs between these objects and other Internet-enabled devices and systems. The risk of connecting a machine to Internet is obvious and Blockchain may help to eliminate or at least reduce some of these risks. The industry is updating its processes to be more efficient. Industry 4.0 is a transformation that makes it possible to gather and analyze data across machines, enabling faster, more flexible, and more efficient processes to produce higher-quality goods at reduced costs, that's the reason why a technology such us Blockchain if also of great interest to guaranty security and data reliability. The main aim of this tutorial is to introduce Blockchain technology and represents its practical application in security of Industry 4.0, Smart cities, Smart homes, and Internet of Thing.
Thursday, September 20 12:50 - 14:00
Lunch Break
Thursday, September 20 14:00 - 17:30
ISTA-02: ISTA-02: Intelligent Tools and Techniques
- ISTA-02.1 14:00 Stroke Diagnosis from Retinal Fundus Images using Multi texture Analysis
- ISTA-02.2 14:18 A Novel Bagged Naïve Bayes-Decision Tree Approach for Multi-class Classification Problems
- ISTA-02.3 14:36 State of art fractional order controller for power system stabilizer
- ISTA-02.4 14:54 Trajectory tracking of Maryland manipulator using linguistic lyapunov fuzzy controller
- ISTA-02.5 15:12 An Innovative application for code generation of mathematical equations and problem solving
- ISTA-02.6 15:30 Design and Implementation of In-situ Human-Elephant Conflict Management System
- ISTA-02.7 15:48 Complementing the DTW based speaker verification systems with knowledge of specific regions of interest
- ISTA-02.8 16:06 A hybrid framework for optimal feature subset selection
- ISTA-02.9 16:24 A Multi-Matching Approximation Algorithm for Symmetric Traveling Salesman Problem
- ISTA-02.10 16:42 Hybrid feature selection using micro genetic al-gorithm on microarray gene expression data
- ISTA-02.11 17:00 Multiset Filters Of Residuated Lattices And Its Application In Medical Diagnosis
- ISTA-02.12 17:18 Application of lattice ordered multi-fuzzy soft set in forecasting process
- ISTA-02.13 17:36 Deep Residual Networks for Pre-classification based Indian Language Identification
- ISTA-02.14 17:54 Optimal drug scheduling for cancer chemotherapy using two degree of freedom fractional order PID scheme
- ISTA-02.15 18:12 Distributed e-health wide-world accounting ledger via blockchain
- ISTA-02.16 18:30 Adaptive neuro-fuzzy behavioral learning strategy for effective decision making in the fuzzy-based cloud service negotiation framework
SIRS-02: SIRS-02: Intelligent Recognition Techniques and Applications
- SIRS-02.1 14:00 A v-Hog Tensor based Discriminant Analysis for small size Face Recognition
- SIRS-02.2 14:18 Real-time poultry health identification using IoT test setup, optimization and results
- SIRS-02.3 14:36 Classification of the plants using score level fusion of GIST and LBP features
- SIRS-02.4 14:54 STCKF Algorithm based SOC Estimation of Li-Ion Battery by Dynamic Parameter Modeling
- SIRS-02.5 15:12 Obstacle Detection in Drones using Computer Vision Algorithm
- SIRS-02.6 15:30 Addressing Relay Attacks without Distance-bounding in RFID tag Inclusion/Exclusion Scenarios
- SIRS-02.7 15:48 Machine Learning and Data Mining Methods in Testing and Diagnostics of Analog and Mixed-Signal Integrated Circuits: Case Study
- SIRS-02.8 16:06 Probability-Based Approach for Epileptic Seizure Detection Using Hidden Markov Model
- SIRS-02.9 16:24 Quality and Complexity measurement of 2D-DCT archietecture using loeffler algorithm along with CSD and CSE
- SIRS-02.10 16:42 HSV Based Histogram Thresholding Technique for MRI Brain Tissue Segmentation
- SIRS-02.11 17:00 Significance of Epoch Identification Accuracy in Prosody Modification for Effective Emotion Conversion
- SIRS-02.12 17:18 IoT-Enabled Distributed Detection of a Nuclear Radioactive Source via Generalized Score Tests
- SIRS-02.13 17:36 Investigation of SAR exposure assessment in Vital Human tissues at GSM Frequency
SSCC-02: SSCC-02: Workshop on Detecting Malicious Domain names (DMD 2018)
Title of talk: Role of security in the cyber-physical system
Talk description: IoT Security is becoming more challenging because of the diverse set of devices with limited resources, long lifecycles, and proprietary protocols. Also, IoT products are often sold with old and unpatched embedded operating systems and software. Hence, focusing security only at the edge (IoT) is not feasible. There is a need to shift the focus of IoT security from IoT devices to centralized/distributed deep learning models for the overall security of the network. Contents of Session would include understanding general terms and background of deep learning, quick introduction to Sony's NNABLA framework and discuss various application's of deep learning in cyber-security in general with special focus on IoT security.
About the Speaker: Rajshekhar Biradar is a Software Application Engineer working in the area of deep learning and cybersecurity with Extreme Networks. He is currently working on building Deep Learning based IoT security solution. His research interests include Networking, Machine Learning, Computer Vision and Natural Language Processing
- SSCC-02.1 14:00 Domain name detection and classification using deep neural networks
- SSCC-02.2 14:18 Transfer Learning Approach for Identification of Malicious Domain Names
- SSCC-02.3 14:36 Detecting DGA using deep neural networks(DNNs)
- SSCC-02.4 14:54 Algorithmically Generated Domain Detection and Malware Family Classification
- SSCC-02.5 15:12 Bidirectional LSTM models for DGA classification
- SSCC-02.6 15:30 Behavioral Biometrics and Machine Learning to secure Website Logins
SSCC-03: SSCC-03: System and Application Security/Cryptosystems, Algorithms
- SSCC-03.1 14:00 FinSec 3.0: Theory and Practices in Financial Enterprise
- SSCC-03.2 14:18 A TCB Minimizing Model of Computation
- SSCC-03.3 14:36 SPIC - SRAM PUF Intergrated Chip based Software Licensing Model
- SSCC-03.4 14:54 Security Improvement of Common-Key Cryptographic Communication by Mixture of Fake Plain-Texts
- SSCC-03.5 15:12 Group Key Management Schemes under Strong Active Adversary Model: A Security Analysis
- SSCC-03.6 15:30 Detection of Suspicious Transactions with Database Forensics and Theory of Evidence
- SSCC-03.7 15:48 Key Retrieval From AES Architecture Through Hardware Trojan Horse
- SSCC-03.8 16:06 KarmaNet: SDN solution to DNS-based Denial-of-Service
- SSCC-03.9 16:24 Overinfection In Ransomware
- SSCC-03.10 16:42 DeepMal4J: Java Malware Detection Employing Deep Learning
- SSCC-03.11 17:00 MedCop: Verifiable Computation for Mobile Healthcare System
- SSCC-03.12 17:18 Identification of Bugs and Vulnerabilities in TLS Implementation for Windows Operating System Using State Machine Learning
- SSCC-03.13 17:36 Extensive Simulation Analysis of TCP Variants for Wireless Communication
Thursday, September 20 16:30 - 17:30
Tea Break
Thursday, September 20 18:00 - 20:30
Cultural Events followed by Banquet Dinner
Friday, September 21
Friday, September 21 8:30 - 13:00
Registration
Friday, September 21 9:10 - 11:00
Tutorial: Embedded platforms for AI and Blockchain
Embedded platforms for AI and Blockchain
This tutorial provides an overview of the most relevant approaches to next Generation computing. AI, ML, IOT, and Cloud Infrastructure create an enormous amount of data and the amount of data generated daily by an individual can go up to 1TB and similarly by an industry can go up to 500TB by 2022. In order to process this huge amount of data, it needs very high computing and storage infrastructure and low latency network. Cloud infrastructure is being built across the world to process this data. Generation, transportation, and processing of these data at Cloud securely when the amount of data explode exponentially is a major challenge. This challenge involves many factors such as security in handling these data, network bandwidth required to move this data across the cloud, latency in which transferring the data across the computing nodes and huge computing power required in a data centre. Isolated high power data centers are not a viable option to address above challenges. Edge computing, Automation, Artificial Intelligence, and block-chain are some of the solutions which address the above challenges. Using these solutions simultaneously is the key to solving these challenges which industry is going to face in near future.
Outline of the presentation (Duration 1 hr 50 Min): • Motivation and Introduction (5 Min) • 4th Industrial revolution -AI (5 Min) • Type of AI (5 Min) • Need for AI and Blockchain (5 Min) • Need for Automation (5 Min) • Evolution of edge computing (5 Min) • API computing and economy (5 Min) • Heterogeneous Computing (5 min) • Low latency Computing (5 Min) • Blockchain basics (10 Minutes) • Hardware accelerated and Managed Blockchain (10 Minutes) • Heterogeneous Computing for AI and ML (5 Min) • Acceleron MDC accelerate AI and Blockchain (30 Minutes). • Discussion (10 Min)
Friday, September 21 10:45 - 11:10
Tea Break
Friday, September 21 11:10 - 12:00
Keynote 6: From Gutenberg to Smartphones: Inferring Keypress from Side Channels
Abstract: Typing is still one of the main methods of interaction with computing devices: we do it regularly on our laptops, smartphones and other devices, like ATM machines. Oftentimes, we want to keep the typed text confidential (emails, password, pin codes...). To protect our text, we use all kinds of access control and encryption mechanisms, but we might forget to leave some other doors open to the adversary. In this talk, we will review recent results on typing inference from side channels exploitable by both local and remote adversaries (e.g., through a VoIP conversation).
SHORT BIO: Mauro Conti is Full Professor at the University of Padua, Italy, and Affiliate Professor at the University of Washington, Seattle, USA. He obtained his Ph.D. from Sapienza University of Rome, Italy, in 2009. After his Ph.D., he was a Post-Doc Researcher at Vrije Universiteit Amsterdam, The Netherlands. In 2011 he joined as Assistant Professor the University of Padua, where he became Associate Professor in 2015, and Full Professor in 2018. He has been Visiting Researcher at GMU (2008, 2016), UCLA (2010), UCI (2012, 2013, 2014, 2017), TU Darmstadt (2013), UF (2015), and FIU (2015, 2016). He has been awarded with a Marie Curie Fellowship (2012) by the European Commission, and with a Fellowship by the German DAAD (2013). His research is also funded by companies, including Cisco and Intel. His main research interest is in the area of security and privacy. In this area, he published more than 200 papers in topmost international peer-reviewed journals and conference. He is Area Editor-in-Chief for IEEE Communications Surveys & Tutorials, and Associate Editor for several journals, including IEEE Communications Surveys & Tutorials, IEEE Transactions on Information Forensics and Security, and IEEE Transactions on Network and Service Management. He was Program Chair for TRUST 2015, ICISS 2016, WiSec 2017, and General Chair for SecureComm 2012 and ACM SACMAT 2013. He is Senior Member of the IEEE.
Friday, September 21 12:00 - 12:50
Keynote 7: Physical Layer Security for MIMO-NOMA Based Cognitive Radio Networks
Abstract: The talk will be on designing physical-layer security for both primary user (PU) and secondary user (SU) in the underlay multiple-input multiple-output cognitive-radio network (MIMO-CRN) by using a bi-directional zero-forcing beamformer. The proposed method enables the PU to communicate along with the SU through a relay node without sacrificing their individual secrecy capacity, i.e., without causing interference to each other even in the presence of eavesdropper(s). In the first phase, a transmit beamforming at the PU/SU transmitters and a receive beamforming at the relay have been adopted to separate PU and SU data. In the second phase, a bi-directional beamformer has been applied to eradicate the necessity of involving artificial noise for preventing the active eavesdropper(s). To maximize the total secrecy capacity, a generalized non-linear optimization problem has been formulated and converted to a simplified constrained optimization problem by utilizing the beamformer and the subspace restriction. Then this problem is solved by the Lagrangian method. Both theoretical and numerical analyses of the total and individual ergodic secrecy rates are provided to demonstrate the effectiveness of our proposed method. The secrecy outage probability is also derived to evaluate the performance variations of our proposed scheme when the channel-estimation error occurs. The physical layer security issue has been extended for non-orthogonal multiple access (NOMA)-CRN where multi-cluster and multi-cell have been considered. A cascaded beamforming technique with alignment vector has been proposed to remove the restriction on number antennae at the transmitter.
Biography: Dr. SUDHAN MAJHI is currently an Associate Professor in the Department of Electrical Engineering and Mathematics, Indian Institute of Technology, Patna, India. Currently, he is Fellow of Sir Visvesvaraya Young Faculty Research awarded by Meity. He is also An Editor of IEEE Transactions on Vehicular Technology. He received M.Tech degree in Computer Science and Data Processing from Indian Institute of Technology, Kharagpur, India in 2004 and the Ph.D. degree from Nanyang Technological University, Singapore in 2008. He has postdoctoral experience with University of Michigan- Dearborn, MI, USA, Institute of Electronics and Telecommunications, Rennes, France and Nanyang Technological University, Singapore. He has received best academic award in NI ASEAN Graphical System Design Achievement Awards 2012. He has received young scientist start-up grand from DST. Currently he is Associate editor of Circuits, Systems and Signal Processing - Springer. His research interest includes signal processing for wireless communication which includes blind synchronization and parameter estimation, cooperative communications, physical layer security for cognitive radio, sequence design, OFDM, MIMO, SC-FDMA, and MIMO-OFDM. For more details please visit https://www.iitp.ac.in/spwicom/ .
Friday, September 21 12:50 - 14:00
Lunch Break
Friday, September 21 14:00 - 18:30
ISTA-03: ISTA-03: Applications using Intelligent Techniques
- ISTA-03.1 14:00 Morphisms on Lattice Ordered Interval-Valued Hesitant Fuzzy Soft Sets
- ISTA-03.2 14:18 Performance analysis of DWT and FMH in Classifying Hand Motions using sEMG Signals
- ISTA-03.3 14:36 Refined Stop-Words and Morphological Variants Solutions Applied to Hindi-English Cross-Lingual Information Retrieval
- ISTA-03.4 14:54 A Hybrid Approach to Generate Visually Seamless Aerial Mosaicks from Unmanned Aerial Vehicles
- ISTA-03.5 15:12 A machine learning approach for fast mode decision in HEVC intra prediction based on statistical features
- ISTA-03.6 15:30 Real Time Detection System of Driver Drowsiness based on Representation learning using Deep Neural Networks
- ISTA-03.7 15:48 Affective State Recognition using Audio Cues
- ISTA-03.8 16:06 A Multi Verse Optimization based MPPT Controller for Drift Avoidance in Solar System
- ISTA-03.9 16:24 Behavior of 3-axis conformal proximity sensor arrays for restraint-free, in-vehicle, deployable safety assistance
- ISTA-03.10 16:42 A decision making approach based on L-IVHFSS setting
- ISTA-03.11 17:00 Intelligent Refrigerator
ISTA-04: ISTA-04: Intelligent Techniques for Ad-hoc and Wireless Sensor Networks/Intelligent Distributed Computing
- ISTA-04.1 14:00 Advanced Credit Score Calculation using Social Media and Machine Learning
- ISTA-04.2 14:18 Impact of Trimet Graph Optimization Topology on Scalable Networks
- ISTA-04.3 14:36 Roll Forward Validation based Decision Tree Classification for Detecting Data Integrity Attacks in Industrial Internet of Things
- ISTA-04.4 14:54 Information Criteria Based Optimal Structure Identification of RF Power Amplifier Models
- ISTA-04.5 15:12 A Lightweight Inter-Zonal Authentication Protocol for Moving Objects in Low Powered RF Systems
- ISTA-04.6 15:30 A Secure and Optimized Location Update for Next Generation Proxy Mobility based Internet Protocol Networks
- ISTA-04.7 15:48 An Intelligent Energy Efficient Clustering Technique for Multiple Base Stations Positioning in a Wireless Sensor Network
- ISTA-04.8 16:06 Fuzzy Clustering using Salp Swarm Algorithm for Automobile Insurance Fraud Detection
- ISTA-04.9 16:24 Swarm intelligence based optimization of energy consumption in cognitive radio network
- ISTA-04.10 16:42 Grefenstette Bias based Genetic Algorithm for Multi-Site Offloading using Docker Container in Edge computing
- ISTA-04.11 17:00 A Review on VANET Routing Protocols and Proposing a Parallelized Genetic Algorithm based heuristic modification to mobicast routing for real time message passing
SIRS-03: SIRS-03: Intelligent Recognition Techniques/Signal Processing(Short Papers)
Title of Talk: RFID-based Relay Attacks [14:00-14:50]
Biography: Selwyn Piramuthu is Professor of Information Systems at the University of Florida, where he has taught since Fall 1991. Trained in machine learning, his research interests also include cryptography with applications related to IoT/RFID, privacy/security, supply chain management, among others. Co-authored with Wei Zhou, his book titled, "RFID and Sensor Network Automation in the Food Industry" was published by Wiley in 2016. He received his B.Tech., M.S., and Ph.D. respectively from IIT-Madras, University of Arizona, and the University of Illinois at Urbana-Champaign.
- SIRS-03.1 14:00 Survey on Virtual Assistant: Google Assistant, Siri, Cortana, Alexa
- SIRS-03.2 14:15 Contemporary Approaches in Image Segmentation - A Quantitative Approach
- SIRS-03.3 14:30 IoT based Food Inventory Tracking System
- SIRS-03.4 14:45 Design of a Compact high gain wide band Ψ shaped Patch antenna on slotted circular ground plane
- SIRS-03.5 15:00 On acoustic monitoring of farm environments
- SIRS-03.6 15:15 Investigation of Fractality and Stationarity Behaviour on Earthquake
- SIRS-03.7 15:30 Technologies and Methods for 3D Reconstruction in Archaeology
- SIRS-03.8 15:45 Fuzzy Based Energy Efficient Protocol for Monitoring of Nuclear Radiation using Wireless Sensor Network
- SIRS-03.9 16:00 Geometrically uniform differential signalling for MISO/MIMO channels using optimized PM codebook
- SIRS-03.10 16:15 A Comprehensive Review on Automatic Diagnosis of Diabetic Maculopathy in Retinal Fundus Image
- SIRS-03.11 16:30 Multi-Image Enhancement Technique using Max-Plus Algebra-Based Morphological Wavelet Transform
- SIRS-03.12 16:45 Dimensionality Reduction by Dynamic Mode Decomposition for Hyperspectral Image Classification Using Deep Learning and Kernel Methods
Friday, September 21 14:00 - 18:00
SSCC-04: SSCC-04: Security and Privacy in Networked Systems
Title of the Talk: IoT and Network Security: Should I care about network security? (14:00-14:50)
Talk description: Network security is becoming more and more challenging as new communication paradigms and architectures (e.g., IoT, SDN) are deployed all over the world. Indeed, the need for self-configuring devices, which do not necessarily require an operator for their management and are usually designed without taking security and privacy into account, makes security more challenging than ever before. In a such a context, the talk will first investigate some of the most recent attacks to the IoT world (e.g., the Mirai botnet) and some of the most critical threats (e.g., Advanced Persistent Threats) highlighting how "standard" approaches to security are not efficient any-longer. Then it will focus on the analysis of some of the most recent and promising approach to attack detection and reaction. The main objective of the talk is to show that even the "standard" Internet users must take care of the security of their devices, as well as of their own privacy.
- SSCC-04.1 14:00 Cost Based Model for Secure Health Care Data Retrieval
- SSCC-04.2 14:15 Inter-Path Diversity Metrics for Increasing Network Robustness Against Zero-Day Attacks
- SSCC-04.3 14:30 Privacy-preserving Searchable Encryption Scheme over Encrypted Data Supporting Dynamic Update
- SSCC-04.4 14:45 HGKA:Hierarchical Dynamic Group Key Agreement Protocol for Machine Type Communication in LTE Networks
- SSCC-04.5 15:00 Network Anomaly Detection using Artificial Neural Networks Optimised with PSO-DE Hybrid
- SSCC-04.6 15:15 A Blockchain based Vehicle Database System
- SSCC-04.7 15:30 Proof of Stack Consensus for Blockchain Networks
- SSCC-04.8 15:45 Effective Hardware Trojan Detection using Front-End Compressive Sensing
- SSCC-04.9 16:00 Probabilistic real-time intrusion detection system for Docker container
- SSCC-04.10 16:15 Wearable Device Forensic: Probable Case studies and Proposed Methodology
- SSCC-04.11 16:30 Enhanced Session Initiation Protocols for Emergency Healthcare Applications
- SSCC-04.12 16:45 Accessing Data in Healthcare application
- SSCC-04.13 17:00 Investigating Deep Learning for Collective Anomaly Detection - An Experimental Study
- SSCC-04.14 17:16 Mitigation of Cross-Site Scripting Attacks in Mobile Cloud Environments
- SSCC-04.15 17:31 A Graph-Based Decision Support Model for Vulnerability Analysis in IoT Networks
Friday, September 21 16:30 - 17:30
Tea Break
Saturday, September 22
Saturday, September 22 9:00 - 11:00
Registration
Saturday, September 22 9:30 - 13:30
ISTA-05: ISTA-05: Applications using Intelligent Techniques(Short Papers)
- ISTA-05.1 9:30 A Study on Plant Recognition Using Conventional Image Processing and Deep Learning Approaches
- ISTA-05.2 9:42 Impact analysis of LFM Jammer Signals on Stepped Frequency PAM4 RADAR Waveforms
- ISTA-05.3 9:54 Online Knowledge-Based System for CAD modeling and Manufacturing: An Approach
- ISTA-05.4 10:06 Hepatoprotective activity of the Bi-Herbal Extract in Carbon tetra chloride (CCl4) induced hepatoxicity - A study of Histopathological Image Analysis
- ISTA-05.5 10:18 Battery Assisted, PSO - BFOA based Solar powered single stage power conditioning unit based Five Phase Induction Motor Drive for Green Boat Applications
- ISTA-05.6 10:30 Intrinsic Evaluation for English-Tamil Bilingual Word Embeddings
- ISTA-05.7 10:42 A Novel Approach of Augmenting Training Data for Legal Text Segmentation by Leveraging Domain Knowledge
- ISTA-05.8 10:54 IoT enabled Air Monitoring System
- ISTA-05.9 11:06 Evaluation of water body extraction from satellite images using open source tools
- ISTA-05.10 11:18 Phase-Modulated, Stepped Frequency Waveform Design for Low Probability of Detection RADAR Signals
- ISTA-05.11 11:30 Effect of waveform coding on stepped frequency modulated, pulsed radar transmit signals
- ISTA-05.12 11:42 Sarcasm Detection on Twitter: User Behavior Approach
- ISTA-05.13 11:54 Personalized Recommender Agent for E-Commerce Products Based on Data Mining Techniques
ISTA/SIRS-ICPM'18: ISTA/SIRS-ICPM'18: Workshop on Advances in Image Processing, Computer Vision, Pattern Recognition and Machine Intelligence (ICPM'18)
- ISTA/SIRS-ICPM'18.1 9:30 Bit-plane Specific Measures and its Applications in Analysis of Image Ciphers
- ISTA/SIRS-ICPM'18.2 9:45 A Framework for Lane Prediction on Unstructured Roads
- ISTA/SIRS-ICPM'18.3 10:00 Classification of colposcopic cervigrams using EMD in R
- ISTA/SIRS-ICPM'18.4 10:15 Curvelet Based Thinning Algorithm
- ISTA/SIRS-ICPM'18.5 10:30 Dynamic Mode based Feature with Random Mapping for Sentiment Analysis
- ISTA/SIRS-ICPM'18.6 10:45 A Modification to the Nguyen-Widrow Weight Initialization Method
- ISTA/SIRS-ICPM'18.7 11:00 Variant of Nearest neighborhood fingerprint storage system by reducing redundancies
- ISTA/SIRS-ICPM'18.8 11:15 Modelling, Analysis and Control of an Eddy Current Braking System using Intelligent Controllers
- ISTA/SIRS-ICPM'18.9 11:30 Pep- Personalized Educational Platform
- ISTA/SIRS-ICPM'18.10 11:45 Efficient Pre-processing and Feature Selection for Clustering of Cancer Tweets
- ISTA/SIRS-ICPM'18.11 12:00 Maneuvering Black hole attack using different traffic generators in MANETs
- ISTA/SIRS-ICPM'18.12 12:15 User Graph Topic Model
- ISTA/SIRS-ICPM'18.13 12:30 Automated Analytical Model for Content Based Selection of Web Services
SSCC-05: SSCC-05: Workshop on Multidisciplinary Perspectives in Cryptology and Information Security (CIS-2018)
- SSCC-05.1 9:30 A Comparative Analysis of Different Soft Computing Techniques For Intrusion Detection System
- SSCC-05.2 9:45 A Novel Secret Key Exchange Mechanism for Secure Communication and Data Transfer in Symmetric Cryptosystems
- SSCC-05.3 10:00 Attunement of Trickle Algorithm for Optimum Reliability of RPL over IoT
- SSCC-05.4 10:15 Survey of security threats in IoT and emerging countermeasures
- SSCC-05.5 10:30 Holistic Credit Rating System for Online Microlending Platforms with Blockchain Technology
- SSCC-05.6 10:45 Analysis of Execution Time for Encryption during Data Integrity Check in Cloud Environment
- SSCC-05.7 11:00 Inverted Index based Ranked Keyword Search in Multi-user Searchable Encryption
- SSCC-05.8 11:15 Power and Area Efficient FSM with Comparison-Free Sorting Algorithm for Write-Evaluate Phase and Read-Sort Phase
- SSCC-05.9 11:30 A New Chaotic Map Based Secure and Efficient Pseudo-random Bit Sequence generation
- SSCC-05.10 11:45 Hiding in Plain Sight - Symmetric Key Chaotic Image Encryption by Sequential Pixel Shuffling
- SSCC-05.11 12:00 Analysis of circuits for security using Logic Encryption
Saturday, September 22 10:45 - 11:10
Tea Break
Saturday, September 22 13:00 - 14:00
Lunch Break
Saturday, September 22 15:30 - 16:00
Valedictory Function
Saturday, September 22 16:00 - 16:15
Tea
Program last updated on no date/time given