(11) CISS - Communication and Information Systems Security Symposium
Time | ICC Capital Hall 2 | ICC Capital Hall Interactive 4 | ICC Capital Suite 5 |
Tuesday, June 9 |
|||
09:00-10:30 | CISS-01: Big Data Security and Privacy | ||
14:30-16:00 | CISS-02: Firewall, Intrusion Detection and Other Topics | ||
16:30-17:15 | CISS-I01: Operating Systems and Application Security | ||
17:15-18:00 | CISS-I02: Network Security Metrics and their Performance Evaluation | ||
Wednesday, June 10 |
|||
09:00-10:30 | CISS-03: Security of Cyber-physical Systems | ||
14:30-16:00 | CISS-04: Mobile and Wireless Network Security | ||
16:30-18:00 | CISS-05: Security and Privacy of VANETs and Sensor Networks | ||
Thursday, June 11 |
|||
09:00-10:30 | CISS-I03: Physical Layer Security | CISS-06: Privacy and Privacy Enhancing Technologies | |
14:30-16:00 | CISS-07: Cryptography and Evaluation | ||
16:30-18:00 | CISS-08: Cloud and Large-scale System Security |
Tuesday, June 9
CISS-01: Big Data Security and Privacy
Room: ICC Capital Hall 2
Chairs: Maria Luisa Merani (University of Modena and Reggio Emilia, Italy), Chao Chen (Deakin University, Australia)
- 6 Million Spam Tweets: A Large Ground Truth for Timely Twitter Spam Detection
- pp. 8683-8688
- Game Theoretic Data Privacy Preservation: Equilibrium and Pricing
- pp. 8689-8694
- Limited Dictionary Builder: An Approach to Select Representative Tokens for Malicious URLs Detection
- pp. 8695-8700
- On Binary Decomposition based Privacy-preserving Aggregation Schemes in Real-time Monitoring Systems
- pp. 8701-8706
- SPLWAH: a bitmap index compression scheme for searching in archival Internet traffic
- pp. 8707-8712
- Multi-Cloud Privacy Preserving Schemes for Linear Data Mining
- pp. 8713-8719
CISS-02: Firewall, Intrusion Detection and Other Topics
Room: ICC Capital Hall 2
Chairs: Otto Carlos M. B. Duarte (Universidade Federal do Rio de Janeiro, Brazil), Xiaodong Lin (University of Ontario Institute of Technology, Canada)
- Hide-and-Seek: Face Recognition in Private
- pp. 8720-8725
- Blurred License Plate Recognition based on Single Snapshot from Drive Recorder
- pp. 8726-8731
- Matrix-based parallel pattern matching method
- pp. 8732-8737
- Providing Elasticity to Intrusion Detection Systems in Virtualized Software Defined Networks
- pp. 8738-8743
- StegoP2P: Oblivious User-driven Unobservable Communications
- pp. 8744-8749
- InterSec: An Interaction System for Network Security Applications
- pp. 8750-8756
CISS-I01: Operating Systems and Application Security
Room: ICC Capital Hall Interactive 4
Chairs: Yogachandran Rahulamathavan (City University London, United Kingdom), Yang Xiao (The University of Alabama, USA)
- TapLock: Exploit Finger Tap Events for Enhancing Attack Resilience of Smartphone Password
- pp. 8757-8762
- AppTrace: Dynamic Trace on Android Devices
- pp. 8763-8768
- Dump and Analysis of Android Volatile Memory on Wechat
- pp. 8769-8774
- Secure Mobile Crowdsensing Game
- pp. 8775-8780
- Accountable Logging in Operating Systems
- pp. 8781-8785
- Linux Auditing: Overhead and Adaptation
- pp. 8786-8791
CISS-I02: Network Security Metrics and their Performance Evaluation
Room: ICC Capital Hall Interactive 4
Chairs: Eduard Jorswieck (TU Dresden, Germany), Pin-Hsun Lin (TU Dresden, Germany)
- A Unified Framework for Wireless Connectivity Study subject to General Interference Attack
- pp. 8792-8797
- Bayesian Mechanisms and Learning for Wireless Networks Security with QoS Requirements
- pp. 8798-8803
- Towards a Multiobjective Framework for Evaluating Network Security under Exploit Attacks
- pp. 8804-8809
- Towards real-time route leak events detection
- pp. 8810-8815
- A Novel High-Speed IP-Timing Covert Channel: Design and Evaluation
- pp. 8816-8821
- Detection of DoS Attacks through Fourier Transform and Mutual Information
- pp. 8822-8827
Wednesday, June 10
CISS-03: Security of Cyber-physical Systems
Room: ICC Capital Hall 2
Chairs: Rongxing Lu (Nanyang Technological University, Singapore), Xiang Lu (Institute of Information Engineering, CAS, P.R. China)
- A Two-Stage Attacking Scheme for Low-Sparsity Unobservable False Data Injection in Smart Grid
- pp. 8828-8833
- Smart Meter Privacy with an Energy Harvesting Device and Instantaneous Power Constraints
- pp. 8834-8839
- On False Data Injection Attacks against the Dynamic Microgrid Partition in the Smart Grid
- pp. 8840-8845
- BCGI: A Fast Approach to Detect Malicious Meters in Neighborhood Area Smart Grid
- pp. 8846-8851
- Cryptanalysis and Improvement of two RFID-OT Protocols Based on Quadratic Residues
- pp. 8852-8857
- DDPFT: Secure Data Aggregation Scheme with Differential Privacy and Fault Tolerance
- pp. 8858-8863
CISS-04: Mobile and Wireless Network Security
Room: ICC Capital Hall 2
Chairs: Yue Gao (Queen Mary University of London, United Kingdom), Qingqi Pei (Xidian University, P.R. China)
- UGHA:Uniform Group-based Handover Authentication for MTC within E-UTRAN in LTE-A Networks
- pp. 8864-8869
- Uncoordinated Frequency Hopping for Secrecy with Broadband Jammers and Eavesdroppers
- pp. 8870-8874
- Online Learning for Unreliable Passive Monitoring in Multi-Channel Wireless Networks
- pp. 8875-8880
- Jammer Assisted Sum Rate and Fairness Improvement in Secure OFDMA
- pp. 8881-8886
- Reputation-based Coalitional Games for Spectrum Allocation in Distributed Cognitive Radio Networks
- pp. 8887-8892
- Secrecy-oriented Partner Selection Based on Social Trust in Device-to-Device Communications
- pp. 8893-8897
CISS-05: Security and Privacy of VANETs and Sensor Networks
Room: ICC Capital Hall 2
Chair: Mohamed M E A Mahmoud (Tennessee Tech University, USA)
- A Secure and Privacy-Preserving Payment System for Electric Vehicles
- pp. 8898-8903
- Privacy-Preserving Route Reporting Scheme for Traffic Management in VANETs
- pp. 8904-8909
- Pseudonym Changes Scheme based on Candidate-Location-List in Vehicular Networks
- pp. 8910-8915
- Cross-Layer Scheme for Detecting Large-scale Colluding Sybil Attack in VANETs
- pp. 8916-8921
- Network Steganography based on Traffic Behavior in Wireless Sensor Networks
- pp. 8922-8927
- A Systematic Key Management Mechanism for Practical Body Sensor Networks
- pp. 8928-8933
Thursday, June 11
CISS-06: Privacy and Privacy Enhancing Technologies
Room: ICC Capital Suite 5
Chairs: Ben Niu (State Key Laboratory of Information Security, Institute of Information Engineering, CAS, P.R. China), Jian Ren (Michigan State University, USA)
- Privacy-Preserving Distributed Cooperative Spectrum Sensing in Multi-Channel Cognitive Radio MANETs
- pp. 8934-8939
- Lightweight and Privacy-Preserving Agent Data Transmission for Mobile Healthcare
- pp. 8940-8945
- Privacy-Preserving Strategies in Service Quality Aware Location-Based Services
- pp. 8946-8952
- R-STaR Destination-Location Privacy Schemes in Wireless Sensor Networks
- pp. 8953-8958
- An Evolutionary Game-Theoretic Framework for Cyber-threat Information Sharing
- pp. 8959-8964
- PAPERS: Private and Precise Range Search for Location Based Services
- pp. 8965-8970
CISS-I03: Physical Layer Security
Room: ICC Capital Hall Interactive 4
Chairs: Nan Yang (Australian National University, Australia), Xin Ge (The University of British Columbia, Canada)
- Performance Analysis of Secrecy Capacity for Two Hop AF Relay Networks with Zero Forcing
- pp. 8971-8976
- Physical Layer Security in Cognitive Relay Networks with Multiple Antennas
- pp. 8977-8982
- Secrecy Capacity Enhancement in Two-hop DF Relaying Systems in the Presence of Eavesdropper
- pp. 8983-8987
- Secrecy Analysis of Multiuser Downlink Wiretap Networks with Opportunistic Scheduling
- pp. 8988-8993
- Confidential Broadcasting via Coordinated Beamforming in Two-Cell Networks
- pp. 8994-9000
- Secure MIMO Transmission via Compressive Sensing
- pp. 9001-9005
CISS-07: Cryptography and Evaluation
Room: ICC Capital Suite 5
Chairs: Mort Naraghi-Pour (Louisiana State University, USA), Richard Bassous (Oakland University, USA)
- A Low Complexity Cryptosystem Based on Nonsystematic Turbo Codes
- pp. 9006-9011
- Ambiguous Multi-Symmetric Cryptography
- pp. 9012-9017
- AuthPaper: Protecting Paper-based Documents and Credentials using Authenticated 2D Barcodes
- pp. 9018-9024
- Sum-Capacity Optimal Spread-Spectrum Data Hiding in Video Streams
- pp. 9025-9030
- Quantum Key Distribution over Combined Atmospheric Fading Channels
- pp. 9031-9037
- Arbitrated Secure Authentication realized by using quantum principles
- pp. 9038-9043
CISS-08: Cloud and Large-scale System Security
Room: ICC Capital Hall 2
Chairs: Zhigang Zhou (Harbin Institute of Technology, P.R. China), Wenjuan Li (City University of Hong Kong, Hong Kong)
- Large-Scale Active Measurements of DNS Entries Related to E-Mail System Security
- pp. 9044-9050
- M-NOTE: A Multi-part Ballot based E-voting System with Clash Attack Protection
- pp. 9051-9055
- An Empirical Study on Email Classification Using Supervised Machine Learning in Real Environments
- pp. 9056-9061
- EVOC: More Efficient Verifiable Outsourced Computation from Any One-way Trapdoor Function
- pp. 9062-9067
- Achieving Authorized and Ranked Multi-keyword Search over Encrypted Cloud Data
- pp. 9068-9073
- Audit Meets Game Theory: Verifying Reliable Execution of SLA for Compute-Intensive Program in Cloud
- pp. 9074-9079