Program


Program of the event

Program at a Glance

Conferences
CIT 17th International IEEE Conference on Computer and Information Technology
ICA3PP 17th International Conference on Algorithms and Architectures for Parallel Processing
NSS International Conference on Network and Systems Security
Workshops
DACSC International Workshop on Distributed Autonomous Computing in Smart City
DTWSM 4th International Workshop on Data, Text, Web and Social Network Mining
IW5GS 3rd International Workshop on 5G Security and Machine Learning
Pbio 5th International Workshop on Parallelism in Bioinformatics
RACIT International Symposium on Recent Advances of Computer and Information Technologies
SECIOE 2nd International Workshop on Security of Internet of Everything
SecureEdge International Workshop on Secure and Resource-Efficient Edge Computing
SMCN International Workshop on Security Measurements in Cyber Networks
UCER 2nd International Workshop on Ultra-scale Computing for Early Researchers
Tutorials
CES Tutorial on Customer Edge Switching
HPmPP Tutorial on High Performance Multithreaded Packet Processing


Monday, August 21st

Room 1 3 4 5 10 11 12
8:30-9:00 Opening of the Conference
9:00-9:45 Keynote: Professor Elisa Bertino, IEEE Fellow
9:45-10:15 Morning Coffee
10:15-11:00 Keynote: Professor Francisco Herrera
11:00-12:00 Panel: Big Data and Analytics
12:00-13:20 Lunch
13:20-15:05 CIT 1 NSS 1 ICA3PP 1 UCER 1 CES p1 SMCN 1 CIT 2
15:05-15:35 Afternoon Coffee
15:35-17:20 CIT 3 NSS 2 ICA3PP 2 UCER 2 CES p2 SMCN 2 CIT 4
18:30-20:30 Welcome Reception City Hall


Tuesday, August 22nd

Room 1 3 4 5 10 11 12
8:15-9:00 Keynote 3: Lauri Oksanen, VP, Nokia Bellabs
9:00-9:45 Keynote 4: Tatu Ylönen, CEO of SSH Communications Security, Finland/USA
9:45-10:15 Morning Coffee
10:15-12:00 CIT 5 NSS 3 ICA3PP 3 SECIOE 1 IW5GS 1 SMCN 3 Pbio 1
12:00-13:20 Lunch
13:20-15:10 CIT 6 NSS 4 ICA3PP 4 SECIOE 2 IW5GS 2 HPmPP Pbio 2
15:10-15:40 Afternoon Coffee
15:40-17:30 CIT 7 NSS 5 ICA3PP 5 SECIOE 3 IW5GS 3 DACSC 1 Pbio 3
19:00-22:30 Gala Dinner (Kalastajatorppa)


Wednesday, August 23rd

Room 1 3 4 5 10 11 12
8:00-8:45 Keynote 5: Jinjun Chen, Professor, Swinburne University of Technology, Australia
8:45-9:30 Keynote 6: Anand Prasad, Dr., NEC Corporation
9:30-9:55 Morning Coffee
9:55-10:40 Keynote 7: Shiwen Mao, Professor, Auburn University, USA
10:45-12:30 CIT 8 NSS 6 ICA3PP 6 SecureEdge 1 RACIT 1 DACSC 2 DTWSM 1
12:30-13:45 Lunch
13:45-15:25 CIT 9 HPmPP ICA3PP 7 SecureEdge 2 RACIT 2 DACSC 3 DTWSM 2
15:30-15:50 Closing of the Conference
15:50-16:20 Afternoon Coffee


Keynote Speakers: Details of keynote speakers can be found here


Technical Symposia

Monday, August 21st

13:20 – 15:05 R1.1 – CIT 1: Machine Learning, Data Mining and Big Data Analytics

Chair: Rafael Valero Fernandez, Keele University, UK

Learning from Big Data: A Survey and Evaluation of Approximation Technologies for Large-scale Reinforcement Learning
Cheng Wu and Yiming Wang

Predicting the Popularity of Online News Based on Multivariate Analysis
Caiyun Liu, Wenjie Wang, Yuqing Zhang, Ying Dong, Fannv He and Chensi Wu

Efficient Strip-Mode Microwave Correlated Imaging Method with Data Fusion
Yuanyue Guo and Jie Deng

Sentiment classification: Feature selection based approaches versus deep learning
Alper Kursat Uysal and Yi Lu Murphey
13:20 – 15:05 R3.1 – NSS 1: Platform and Hardware Security

Chair: Roberto Saia, Ph.D, University of Cagliari, Italy

A Practical Method to Confine Sensitive API Invocations on Commodity Hardware
Donghai Tian, Dingjun Qi, Li Zhan, Yuhang Yin, Changzhen Hu and Jingfeng Xue

Hardware and Software Support for Transposition of Bit Matrices in High-Speed Encryption
Patrick Eitschberger, Jörg Keller and Simon Holmbacka

An Android Vulnerability Detection System
Jiayuan Zhang and Yao Yao

DNA-Droid: A Real-time Android Ransomware Detection Framework
Amirhossein Gharib and Ali Ghorbani

Exploring Energy Consumption of Juice Filming Charging Attack on Smartphones: A Pilot Study
Lijun Jiang, Weizhi Meng, Yu Wang and Chunhua Su
13:20 – 15:05 R4.1 – ICA3PP 1: Parallel and Distributed Architectures

Chair: Prof Valtteri Niemi, University of Helsinki, Finland

Workload Type-Aware Scheduling on big.LITTLE Platforms
Simon Holmbacka and Jörg Keller

Pipelining Computation and Data Reuse Strategies for Scaling GROMACS on the Sunway Many-core Processor
Yu Yang, Hong An, Junshi Chen, Weihao Liang, Qingqing Xu and Yong Chen

Exploring FPGA-GPU Heterogeneous Architecture for ADAS: Towards Performance and Energy
Xiebing Wang, Linlin Liu, Kai Huang and Alois Knoll
13:20 – 15:05 R12.1 – CIT 2: Social Networks and Optimization

Chair: Hao Wang, Norwegian University of Science & Technology, Norway

A Core Theory based Algorithm for Influence Maximization in Social Networks
Kan Zhang, Zichao Zhang and Yanlei Wu

A design towards personally identifiable information control and awareness in OpenID Connect identity providers
Rafael Weingärtner and Carla Merkle Westphall

ROBOMO: Effects of a Motivational Intervention to Address the Barriers During Science Learning
Khaoula Youssef, Walid Boukadida and Michio Okada

A multi-objective metaheuristic approach to search-based stress testing
Francisco Nauber Gois, Pedro PorfÍrio Muniz Farias and AndrÉ Coelho
15:35 – 17:20 R1.2 – CIT 3: Wireless Networks and Communications I

Chair: Madhusanka Liyanage, University of Oulu, Finland

Robust Optimal Spectrum Patrolling for Passive Monitoring in Cognitive Radio Networks
Jiachen Li, Jing Xu, Wei Liu, Shimin Gong and Kai Zeng

Cooperative Multi-Relay Assisted Multicast Beamforming in Wirelessly Power Communications
Jiachen Li, Yue Mi, Shimin Gong, Jing Xu, Xiaoxia Huang and Yanyan Shen

Improved Presence detection for Occupancy Control in Multisensory Environments
Charikleia Papatsimpa and Jean Paul Linnartz

Subspace Decomposition Channel Estimation for Multiple Virtual MIMO SC-FDMA Systems
Ashraf Tahat, Claude D'Amours and Benoit Champagne

Dynamic MAC protocol for Tactical Data Links
Zhe Guo and Zheng Yan
15:35 – 17:20 R3.2 – NSS 2: Network Security I

Chair: Dr. Weizhi Meng, Technical University of Denmark, Denmark

Mixed Wavelet-based Neural Network Model for Cyber Security Situation Prediction using MODWT and Hurst Exponent Analysis
Fannv He, Yuqing Zhang, Donghang Liu, Ying Dong, Caiyun Liu and Chensi Wu

Detecting DNS Tunneling Using Ensemble Learning
Saeed Shafieian, Daniel Smith and Mohammad Zulkernine

CookiesWall: Preventing Session Hijacking Attacks Using Client Side Proxy
Somanath Tripathy and Praveen Kumar
15:35 – 17:20 R4.2 – ICA3PP 2: Software Systems and Programming Models

Chair: Stephan Sigg

Hzmem: New Huge Page Allocator with Main Memory Compression
Guoxi Li, Wenzhi Chen, Kui Su, Zonghui Wang and Zhongyong Lu

An FPGA-Based Real-Time Moving Object Tracking Approach
Wenjie Chen, Yangyang Ma, Zhilei Chai, Mingsong Chen and Daojing He

Automatic Acceleration of Stencil Codes in Android
Sergio Afonso, Alejandro Acosta and Francisco Almeida
15:35 – 17:20 R12.2 – CIT 4: Video and Audio Transmission

Chair: Kimmo Järvinen, University of Helsinki

Fast Coding-Unit Mode Decision for HEVC Transrating
Shih-Hsuan Yang and Chong-Cheng Zhong

Multidimensional QoE Assessment of a Simultaneous Transmission Method in Multi-View Video and Audio Transmission with MPEG-DASH
Yuki Maehara and Toshiro Nunome

Energy Efficient Event Driven Video Streaming Surveillance Using sleepyCAM
Tenager Mekonnen, Erkki Harjula, Arto Heikkinen, Timo Koskela and Mika Ylianttila

Fuzzy Analogy based Effort Estimation: An Empirical Comparative Study
Ali Idri and Ibtissam Abnane



Tuesday, August 22nd

10:15 – 12:00 R1.3 – CIT 5: Wireless Networks and Communications II

Chair: Ashraf A. Tahat, Princess Sumaya University for Technology, Jordan

A Simplified Massive MIMO Approach using Precoding
Mário Marques Da Silva and Rui Dinis

Indoor localization using ambient FM radio fingerprinting: A 9-month study
Andrei Popleteev

Assessment of TCP parameters for mobile devices concerning performance and energy consumption
Jonas Pontes, Demetrio Borges, Eric Borba, Victor Lira and Eduardo Tavares

Antenna Array Based Localization Scheme for Vehicular Networks
Marco Antonio Marques Marinho, Alexey Vinel, Felix Antreich, Joao Paulo Carvalho Lustosa Da Costa and Edison Pignaton de Freitas

A New Method of Error Reduction for Affine Projection Algorithm
Shin'Ichi Koike
10:15 – 12:00 R3.3 – NSS 3: Cloud and IoT Security

Chair: Catalin Leordeanu, Lecturer, University Politehnica of Bucharest, Romania

A Generic Construction of Secure-Channel Free Searchable Encryption with Multiple Keywords
Keita Emura

Experiences in Trusted Cloud Computing
Silke Holtmanns, Ian Oliver, Yoan Miche, Aapo Kalliola, Shankar Lal, Leo Hippeläinen and Sowmya Ravidas

Private Membership Test Protocol with Low Communication Complexity
Sara Ramezanian, Tommi Meskanen, Masoud Naderpour and Valtteri Niemi

Risk Modelling of Blockchain Ecosystem
Igor Kabashkin

Adaptively Secure Hierarchical Identity-based Encryption over Lattice
Leyou Zhang and Qing Wu
10:15 – 12:00 R4.3 – ICA3PP 3: Distributed and Network Based Computing

Chair: Llorente Santos Jesus, Aalto University

Optimizing Concurrent Evacuation Transfers for Geo-Distributed Datacenters in SDN
Xiaole Li, Hua Wang, Shanwen Yi, Xibo Yao, Fangjin Zhu and Linbo Zhai

Energy-Balanced and Depth-Controlled Routing Protocol for Underwater Wireless Sensor Networks
Hao Qin, Zhiyong Zhang, Rui Wang,Xiaojun Cai and Zhiping Jia

On the Energy Efficiency of Sleeping and Rate Adaptation for Network Devices
Timothée Haudebourg and Anne-Cécile Orgerie
13:20 – 15:10 R1.4 – CIT 6: Machine Learning, Data Mining and Big Data Analytics II

Chair: Kazuhiko Takahashi, Doshisha University, Japan

Remarks on Adaptive-type Hypercomplex-valued Neural Network-based Feedforward Feedback Controller
Kazuhiko Takahashi

Towards Accurate Predictions of Customer Purchasing Patterns
K-P Lam, Rafael Valero-Fernandez, David Collins, Collin Rigby and James Bailey

Improving Performance for Geo-Distributed Data Process in Wide –Area
Ge Zhang, Zhongzhi Luan and Weiguo Wu

Predicting Student Performance in an ITS using Task-driven Features
Ritu Chaturvedi and Christie Ezeife

An adaptive visualization tool for high order discontinuous galerkin method with quadratic elements
Liyang Xu, Xiaoguang Ren, Xinhai Xu, Hao Li, Yuhua Tang and Yongquan Feng
13:20 – 15:10 R3.4 – NSS 4: Crypto and other topics

Chair: Leyou Zhang, Prof., Xidian University, China

A Generic yet Efficient Method for Secure Inner Product
Lihua Wang, Takuya Hayashi, Yoshinori Aono and Le Trieu Phong

Randomization can't stop BPF JIT spray
Elena Reshetova, Filippo Bonazzi and N. Asokan

EEG-based Random Number Generators
Dang Nguyen, Dat Tran, Wanli Ma and Dharmendra Sharma

Safety of ABAC_\alpha is Decidable
Tahmina Ahmed and Ravi Sandhu

Implementation of Bitsliced AES Encryption on CUDA-Enabled GPU
Naoki Nishikawa, Hideharu Amano and Keisuke Iwai
13:20 – 14:20 R4.4 – ICA3PP 4: Big Data and its Applications

Chair: Dr. Yu Xiao, Aalto University, Finland

Private and Efficient Set Intersection Protocol for Big Data Analytics
Zakaria Gheid and Yacine Challal

A Topology-aware Framework for Graph Traversals
Jia Meng, Liang Cao and Huashan Yu

Adaptive Traffic Signal Control with Network-wide Coordination
Yong Chen, Juncheng Yao, Chunjiang He, Hanhua Chen and Hai Jin
14:20 – 15:10 ICA3PP 5: Parallel and Distributed Algorithms

Chair: Shadi Ibrahim, Inria, France

A Novel Parallel Dual-Character String Matching Algorithm on Graphical Processing Units
Chung-Yu Liao and Cheng-Hung Lin

Distributed Nonnegative Matrix Factorization with HALS Algorithm on MapReduce
Rafal Zdunek and Krzysztof Fonal
15:40 – 17:30 R1.5 – CIT 7: Network Security and Privacy

Chair: Raimo Kantola

A Software-Hardware Co-Designed Methodology for Efficient Thread Level Speculation
Qiong Wang, Jialong Wang, Li Shen and Zhiying Wang

Fast Transmission Mechanism for Secure VPLS Architectures
Madhusanka Liyanage, Andrei Gurtov and Mika Ylianttila

"You have a potential hacker's infection": A study on technical support scams
Sampsa Rauti and Ville Leppänen

A New Approach to Utility-based Privacy Preserving in Data Publishing
Yilmaz Vural and Murat Aydos

Best random codes construction for syndrome coding scheme
Ke Zhang, Martin Tomlinson and Mohammed Zaki Ahmed
15:40 – 17:30 R3.5 – NSS 5: Authentication and Key Management

Chair: Prof. Jayaprakash Kar, The LNM Institute of Information Technology, India

Cryptanalysis and Improvement of an Identity-based Proxy Multi-signature scheme
Jayaprakash Kar

The Time Will Tell on You: Exploring Information Leaks in SSH Public Key Authentication
Joona Kannisto and Jarmo Harju

Lightweight Deterministic Non Interactive (ni) Hierarchical Key Agreement Scheme (KAS)
Pinaki Sarkar
15:40 – 17:30 R4.5 – ICA3PP 6: Applications of Parallel and Distributed Computing

Chair: Anne-Cécile Orgerie, CNRS, France

GPU-Accelerated Block-Max Query Processing
Haibing Huang, Mingming Ren, Yue Zhao, Rebecca J. Stones, Rui Zhang, Gang Wang and Xiaoguang Liu

KD-tree and HEALPix-Based Distributed Cone Search Indexing System for Multi-Band Astronomical Catalogs
Chen Li, Ce Yu, Jian Xiao, Xiaoteng Hu, Hao Fu, Kun Li and Yanyan Huang

An Out-of-Core Branch and Bound Method for Solving the 0-1 Knapsack Problem on a GPU
Jingcheng Shen, Kentaro Shigeoka, Fumihiko Ino and Kenichi Hagihara

The Curve Boundary Design and Performance Analysis for DGM Based on OpenFOAM
Yongquan Feng, Xinhai Xu, Yuhua Tang, Liyang Xu and Yongjun Zhang



Wednesday, August 23rd

10:45 – 12:30 R1.6 – CIT 8: Cloud Computing and Data Centre Networks

Chair: KP Lam, Keele University, UK

A Sensitivity Approach to Energy-Efficient Mapping of Dependable Virtual Networks
Victor Lira, Eduardo Tavares, Meuse Oliveira Jr, Dennys Azevedo and Jonas Pontes

CDController: A Cloud Data Access Control System based on Reputation
Huaqing Lin, Zheng Yan and Raimo Kantola

Cloud IEC 61850: DDS Performance in Virtualized Environment with OpenDDS
Roger D. F. Ferreira and Rômulo S. Oliveira

Using Game Theory To Solve the Fault Diagnosis Problem Under Symmetric Comparison Rules
Mourad Elhadef
10:45 – 12:30 R3.6 – NSS 6: Network Security II

Chair: Llorente Santos Jesus, Aalto University

Exploiting AUTOSAR Safety Mechanisms to Launch Security Attacks
Ahmad Nasser, Di Ma and Sam Lauzon

CookiesWall: Preventing Session Hijacking Attacks Using Client Side Proxy
Somanath Tripathy and Praveen Kumar

A State Recovery Attack on ACORN-v1 and ACORN-v2
Deepak Kumar Dalai and Dibyendu Roy
10:45 – 12:30 R4.6 – ICA3PP 7: Service Dependability and Security in Distributed and Parallel Systems

Chair: Zheng Yan, Xidian/Aalto University

Leakage-Resilient Password-Based Authenticated Key Exchange
Ou Ruan, Mingwu Zhang and Jing Chen

Secure Encrypted Data Deduplication with Ownership Proof and User Revocation
Wenxiu Ding, Zheng Yan and Robert H. Deng

Optimally Selecting the Timing of Zero-Day Attack via Spatial Evolutionary Game
Yanwei Sun, Lihua Yin, Yunchuan Guo, Fenghua Li and Binxing Fang
13:45 – 15:25 R1.7 – CIT 9: Machine Learning, Data Mining and Big Data Analytics III

Chair: Ali Idri, Mohamed V University, Morocco

A data mining-based approach for cardiovascular dysautonomias diagnosis and treatment
Ali Idri and Ilham Kadi

Investigating the Agility Bias in DNS Graph Mining
Jukka Ruohonen and Ville Leppänen

The Enumeration of Flippable Edges in Maximal Planar Graphs
Dongyang Zhao, Yangyang Zhou and Jin Xu

Accurate Localization using LTE Signaling Data
Lei Ni, Yanming Shen, Yuxin Wang, Haoyang Tang and Zhao Yin

A Novel Model for Cybersecurity Economics and Analysis
Paresh Rathod, Timo Hämäläinen
13:45 – 15:25 R4.7 – ICA3PP 8: Performance Modeling and Evaluation

Chair: KP Lam, Keele University, UK

Performance Analysis of a Ternary Optical Computer Based on M/M/1 Queueing System
Xianchao Wang, Sulan Zhang, Mian Zhang, Jia Zhao and Xiangyang Niu

Efficient Computation Offloading for Various Tasks of Multiple Users in Mobile Edge Clouds
Weiyu Liu, Xiangming Wen, Zhaoming Lu, Luning Liu and Xin Chen

A CNN-Based Supermarket Auto-Counting System
Zhonghong Ou, Changwei Lin, Meina Song and Haihong E

Research and Implementation of Question Classification Model in Q & A System
Haihong E, Yingxi Hu, Meina Song, Zhonghong Ou and Xinrui Wang

Workshops

Monday, August 21st

13:20 – 15:05 R5.1 – UCER 1:

Chair: Dr. Jiri Dokulil, University of Vienna, Austria

Probabilistic-based selection of alternate implementations for heterogeneous platforms
Javier Fernández, Jesús Sánchez Cuadrado, David del Rio Astorga, Manuel F. Dolz, and J. Daniel García

Accelerating processing of scale-free graphs on massively-parallel architectures
Mikhail Chernoskutov

A Hybrid Parallel Search Algorithm for Solving Combinatorial Optimization Problems on Multicore Clusters
Victoria Sanz, Armando De Giusti, and Marcelo Naiouf
13:20 – 15:05 R11.1 – SMCN 1:

Chair: Wenxiu Ding, Xidian University

A Quantitative method for evaluating Network Security based on Attack Graph
Lv Kun, Zheng Yukun and Hu Changzhen

SulleyEX: A Fuzzer for Stateful Network Protocol
Rui Ma, Tianbao Zhu, Changzhen Hu, Chun Shan and Xiaolin Zhao

A detecting method of array bounds defects based on symbolic execution
Chun Shan, Shiyou Sun, Jingfeng Xue, Changzhen Hu and Hongjin Zhu

Machine learning for Analyzing Malware
Dong Yajie, Liu Zhenyan, Yan Yida, Wang Yong, Xue Jingfeng and Zhang Ji

Optimal Attack Path Generation Based on Supervised Kohonen Neural Network
Yun Chen, Kun Lv and Changzhen Hu
15:35 – 17:20 R5.2 – UCER 2

Chair: Dr. Javier Fernández Muñoz, University Carlos III of Madrid, Spain

Concurrent Treaps
Praveen Alapati, Swamy Saranam, Madhu Mutyam

Survey on Energy-saving Technologies for Disk-based Storage Systems
Ce Yu, Jianmei Wang, Chao Sun, Xiaoxiao Lu, Jian Xiao and Jizhou Sun

The Open Community Runtime on the Intel Knights Landing Architecture
Jiri Dokulil, Siegfried Benkner and Jakub Yaghob

High-Performance Graphics in Racket with DirectX
Antoine Bossard
15:35 – 17:20 R11.2 – SMCN 2

Chair: Foukia Noria, HES, Switzerland

Defenses against Wormhole Attacks in Wireless Sensor Networks
Rui Ma, Siyu Chen, Ke Ma, Changzhen Hu and Xiajing Wang

A systematic analysis of random forest based social media spam classification
Mohammed Al-Janabi and Peter Andras

Application Research on Network Attack and Defense with Zachman Framework
Chensi Wu, Yuqing Zhang and Ying Dong

A Novel Approach to Network Security Situation Assessment Based on Attack Confidence
Donghang Liu, Lihua Dong, Shaoqing Lv, Ying Dong, Fannv He, Chensi Wu and Yuqing Zhang

A Discrete Wavelet Transform Approach to Fraud Detection
Roberto Saia

Tuesday, August 22nd

10:15 – 12:00 R5.3 – SECIOE 1

Chair: Dr. Somanath Tripathy, Associate Professor, IIT Patna, India

Improving Alert Accuracy for Smart Vehicles
Chia-Mei Chen, Gu-Hsin Lai and Tan-Ho Chang

Hardware Secured, Password-based Authentication for Smart Sensors for the Industrial Internet of Things
Thomas Wolfgang Pieber, Thomas Ulz, Christian Steger and Rainer Matischek

Towards Dependably Detecting Geolocation of Cloud Servers
Leo Hippeläinen, Ian Oliver and Shankar Lal

Tor de-anonymisation techniques
Juha Nurmi and Mikko Niemelä
10:15 – 12:00 R10.3 – IW5GS 1: Interconnection Security

Chair: Yoan Miche
10:15 -10:45 Jaakko Wallenius (CSO Elisa)
10:45 – 11:10 Stealthy SS7 Attacks
Sergey Puzankov (Positive Technologies)
11:10 – 11:35 Diameter Security: An Auditor's Viewpoint
Sergey Mashukov (Positive Technologies)
11:35 – 12:00 Subscriber Profile Extraction and Modification via Diameter Interconnection
Silke Holtmanns, Ian Oliver, Yoan Miche (Nokia Bell Labs)
10:15 – 12:00 R11.3 – SMCN 3

Session Chair: Tu Peng, Beijing Institute of Technology

An Automatic Vulnerabilities Classification Method based on their Relevance
Hao Zhang, Kun Lv and Changzhen Hu

A Novel Threat-Driven Data Collection Method for Resource-Constrained Networks
Jing Li, Lihua Yin, Yunchuan Guo, Chao Li, Fenghua Li, Lihua Chen

OE-CP-ABE: Over-Encryption based CP-ABE Scheme for Efficient Policy Updating
Jialu Hao, Jian Liu, Hong Rong, Huimei Wang and Ming Xian

Privacy-Preserving Stochastic Gradient Descent with Multiple Distributed Trainers
Le Trieu Phong
10:15 – 12:00 R12.3 – PBio 1: Multicore and cluster computing in Bioinformatics

Session Chair: José M. Granado-Criado

A Resource Manager for Maximizing the Performance of Bioinformatics Workflows in Shared Clusters.
Ferran Badosa, Cesar Acevedo, Antonio Espinosa, Gonzalo Vera and Ana Ripoll.

Massively Parallel Sequence Alignment with BLAST through Work Distribution Implemented using PCJ Library.
Marek Nowicki, Davit Bzhalava and Piotr Bala

On the Use of Binary Trees for DNA Hydroxymethylation Analysis.
César González, Mariano Pérez, Juan M. Orduña, Javier Chaves and Ana-Bárbara García.

Parallel Multi-Objective Optimization for High-Order Epistasis Detection.
Daniel Gallego-Sánchez, José M. Granado-Criado, Sergio Santander-Jiménez, Álvaro Rubio-Largo and Miguel A. Vega-Rodríguez.
13:20 – 15:10 R5.4 – SECIOE 2

Chair: Todor Ginchev, Aalto University

Coincer: Decentralised Trustless Platform for Exchanging Decentralised Cryptocurrencies
Michal Zima

Enhancing Resilience of KPS Using Bidirectional Hash Chains and Application on Sensornet
Deepak Kumar Dalai and Pinaki Sarkar

μShield: Configurable Code-Reuse Attacks Mitigation For Embedded Systems
Ali Abbasi, Jos Wetzels, Wouter Bokslag, Emmanuele Zambon and Sandro Etalle

A Role-based Access Control System for Intelligent Buildings
Nian Xue, Xin Huang and Liu Dawei
13:20 – 15:10 R10.4 – IW5GS 2: Virtualized and Software-Defined Network Security

Chair: Ian Oliver
13:20 – 13:50 Bengt Sahlin (Ericsson)
13:50 – 14:10 5G Slicing as a Tool to test User Equipment against Advanced Persistent Threats
Lauri Isotalo (Elisa)
14:10 -14:30 IPsec and IKE as Functions in SDN Controlled Network
Markku Vajaranta, Joona Kannisto and Jarmo Harju
14:30 – 14:50 Area-dividing Route Mutation in Moving Target Defense Based on SDN
Huiting Tan, Chaojing Tang, Chen Zhang and Shaolei Wang
14:50 -15:10 Probabilistic Transition-based Approach for Detecting Application-Layer DDoS attacks in Encrypted Software-Defined Networks
Elena Ivannikova, Mikhail Zolotukhin and Timo Hamalainen
13:20 – 15:10 R12.4 – PBio 2: Hardware accelerators in Bioinformatics

Session Chair: José M. Granado-Criado

Configuring Concurrent Computation of Phylogenetic Partial Likelihoods: Accelerating Analyses using the BEAGLE Library.
Daniel L. Ayres and Michael P. Cummings.

Accelerating FaST-LMM for Epistasis Tests.
Héctor Martínez, Sergio Barrachina, Maribel Castillo, Enrique S. Quintana-Ortí, Jordi Rambla De Argila, Xavier Farré and Arcadi Navarro.

Pipelined Multi-FPGA Genomic Data Clustering.
Rick Wertenbroek, Enrico Petraglio and Yann Thoma.

First Experiences Accelerating Smith-Waterman on Intel’s Knights Landing Processor.
Enzo Rucci, Carlos Garcia, Guillermo Botella, Armando De Giusti, Marcelo Naiouf and Manuel Prieto-Matias.
15:40 – 17:30 R5.5 – SECIOE 3

Chair: Michal Zima, Masaryk University, Brno, Czech Republic

Access Control Model for AWS Internet of Things
Smriti Bhatt, Farhan Patwa and Ravi Sandhu

Privacy Verification Chains for IoT
Noria Foukia, David Billard and Eduardo Solana

Platform for detection of voids in the Bogotá D. C. road network and exposure of its information in a web environment
Angel Rendon, Octavio Salcedo and Lewys Correa

A Denial of Service Attack Method for IoT System in Photovoltaic Energy System
Lulu Liang, Kai Zheng, Qiankun Sheng, Wei Wang, Xin Huang
15:40 – 17:30 R10.5 – IW5GS 3: New approaches for 5G Security

Chair: Silke Holtmanns
15:40 – 16:05 Concealing IMSI in 5G Network Using Identity Based Encryption
Md Mohsin Ali Khan and Valtteri Niemi
16:05 – 16:30 Mind Your Right to Know: On De-anonymization Auditability in V2X Communications
Tommi Meskanen, Masoud Naderpour, Valtteri Niemi
16:30 – 16:55 A formal approach for network security policy relevancy checking
Fakher Ben Ftima, Kamel Karoui and Henda Ben Ghezala
16:55 - Covert Channels Implementation and Detection in Virtual Environments
Irina Mihai, Catalin Leordeanu and Alecsandru Patrascu
15:40 – 17:30 R11.5 – DACSC 1: Internet of Vehicles

Chair: Wendong Wang, BUPT, China

En-Eye: A Cooperative Video Fusion Framework for Traffic Safety in Intelligent Transportation Systems
Tianhao Wu and Lin Zhang

Security/Reliability-Aware Relay Selection with Connection Duration Constraints for Vehicular Networks
Zhenyu Liu and Lin Zhang

Research on Properties of Nodes Distribution on Internet of Vehicle
Jiujun Cheng, Zheng Shang, Hao Mi, Cheng Cheng and Zhenhua Huang

Application of Batch and Stream Collaborative Computing in Urban Traffic Data Processing
Tao Zhang and Shuai Zhao
15:40 – 17:30 R12.5 – PBio 3: Heterogeneous and distributed computing in Bioinformatics

Session Chair: José M. Granado-Criado

Power-performance Evaluation of Parallel Multi-objective EEG Feature Selection on CPU-GPU Platforms.
Juan José Escobar, Julio Ortega, Antonio Francisco Díaz, Jesús González and Miguel Damas.

Using Spark and GraphX to Parallelize Large-Scale Simulations of Bacterial Populations over Host Contact Networks.
Andreia Sofia Teixeira, Pedro T. Monteiro, João A. Carriço, Francisco C. Santos and Alexandre P. Francisco.

PPCAS: Implementation of a Probabilistic Pairwise Model for Consistency-based Multiple Alignment in Apache Spark.
Jordi Lladós, Fernando Guirado and Fernando Cores.

Accelerating Exhaustive Pairwise Metagenomic Comparisons.
Esteban Pérez-Wohlfeil, Oscar Torreno and Oswaldo Trelles.

Wednesday, August 23rd

10:45 – 12:30 R5.6 – SecureEdge 1: Secure and Resource-Efficient Edge Computing I

Chair: Mika Ylianttila, Professor, Oulu University, Finland

Some Cryptography Models Designed by Double Odd-edge Labelling of Trees
Hongyu Wang, Jin Xu and Bing Yao

Enhancing Security, Scalability and Flexibility of Virtual Private LAN Services
Madhusanka Liyanage, Mika Ylianttila and Andrei Gurtov

Horizontal Requirement Engineering in Integration of Multiple IoT Use Cases of City Patform as a Service
Toshihiko Yamakami
10:45 – 12:30 R10.6 – RACIT 1: Advances of Computer and Information Technologies I

Chair: Yongquan Feng, National University of Defense Technology, China

Investigation and Performance Evaluation of Scalable High Efficiency Video Coding
Wei-Lune Tang and Shih-Hsuan Yang

An Efficient Dynamic Ridesharing Algorithm
Jianren Gao, Yuxin Wang, Yanming Shen, Haoyang Tang and Zhao Yin

A Best Practice Based E-government Portals’ Maturity Model – A Case Study
Ali Idri, Abdoullah Fath Allah, Laila Cheikhi and Rafa Al Qutaich

Security Assessment of a Distributed, Modbus-based Building Automation System
Tuomas Tenkanen and Timo Hamalainen

Practical Performance Models for High-order CFD Simulation
Hao Li, Xiaoguang Ren, Yufei Lin, Yuhua Tang, Shuai Ye and Chen Cui
10:45 – 12:30 R11.6 – DACSC 2: Big Data

Chair: Yu Xiao

Fine-grained Infer $PM_2.5$ Using Images from Crowdsourcing
Shuai Li, Teng Xi and Xirong Que, Wendong Wang

An Advanced Random Forest Algorithm Targeting the Big Data with Redundant Features
Ying Zhang, Bin Song, Yue Zhang and Sijia Chen

The Impact of International Inter-City Investment on Enterprises Performance: Pluralistic Interpretation of Geographical Death
Yanghao Zhan, Yan Chen and Ruirui Zhai

Comparing Electricity Consumer Categories based on Load Pattern Clustering with Their Natural Types
Zigui Jiang, Rongheng Lin, Fangchun Yang and Zhihan Liu
10:45 – 12:30 R12.6 – DTWSM 1

Chair: Zheng Yan, Professor, Xidian University, China/Aalto University, Finland

Cloud Multimedia Files Assured Deletion Based on Bit Stream Transformation with Chaos
Wenbin Yao, Yijie Chen and Dongbin Wang

Interval Merging Binary Tree
István Finta, Lóránt Farkas, Sándor Szénási and Szabolcs Sergyán

Mining Suspicios Tax Evasion Groups in a Corporate Governance Network
Wenda Wei, Zheng Yan, Jianfei Ruan, Qinghua Zheng and Bo Dong

PerRec: A Permission Configuration Recommender System for Mobile Apps
Yanxiao Cheng and Zheng Yan
13:45 – 15:25 R5.7 – SecureEdge 2: Secure and Resource-Efficient Edge Computing II

Chair: Mika Ylianttila, Professor, Oulu University, Finland

Dynamic Malware Detection using API Similarity
Ehab Alkhateeb

Where Resources meet at the Edge
Klervie Toczé and Simin Nadjm-Tehrani

Software-Defined Edge Defense Against IoT-Based DDoS
Mert Özçelik, Niaz Chalabianloo and Gürkan Gür
13:45 – 15:25 R10.7 – RACIT 2: Advances of Computer and Information Technologies II

Chair: Leo Hippeläinen, Nokia Bell Labs, Finland

Dynamic Reconfiguration of Architecture in the Communication Network of Air Traffic Management System
Igor Kabashkin

Changing for Win-Win
Guangyu Xiong, Timo R. Nyberg and Gang Xiong

3D matrix-based visualization system of association rules
Biying Wang, Tingting Zhang, Zheng Chang, Tapani Ristaniemi and Guohua Liu

On the performance of web services and Google cloud messaging
Waqar Hassan, Guido Albertengo, Fikru Getachew Debele and Dario Stramandino
13:45 – 15:25 R11.7 – DACSC 3: Smart City

Chair: Ye Tian

Smart City Environmental perception from ambient cellular signals
Isha Singh and Stephan Sigg

When Clutter Reduction Meets Machine Learning for People Counting Using IRUWB Radar
Xiuzhu Yang and Lin Zhang

ESD-WSN: An Efficient SDN-based Wireless Sensor Network Architecture for IoT Applications
Zhiwei Zhang, Zhiyong Zhang, Rui Wang, Zhiping Jia, Haijun Lei, and Xiaojun Cai

Energy Efficient Manycast Routing, Modulation Level and Spectrum Assignment in Elastic Optical Networks for Smart City Applications
Xiao Luo, Xue Chen and Lei Wang

A Multitask-Oriented Selection Strategy for Efficient Cooperation of Collocated Mobile Devices
Hui Gao, Jun Feng, Ruidong Wang and Wendong Wang
13:45 – 15:25 R12.7 – DTWSM 2

Chair: Hui Li, Professor, Xidian University

An Android Malware Detection System Based on Behavior Comparison Analysis
Jing Tao, Qiqi Zhao, Pengfei Cao, Zheng Wang and Yan Zhang

Stream-based Live Probabilistic Topic Computing and Matching
Kun Ma, Ziqiang Yu, Ke Ji and Bo Yang

Experiment for analysing the impact of financial events on Twitter
Ana Fernández Vilas, Lewis Evans, Majdi Owda, Rebeca P. Díaz Redondo and Keeley Crocket

APK-DFS: An Automatic interaction system based on Depth-First-Search for APK
Jing Tao, Qiqi Zhao, Pengfei Cao, Zheng Wang and Yan Zhang

Optimized Data Layout for Spatio-temporal Data in Time Domain Astronomy
Jie Yan, Ce Yu, Chao Sun, Zhaohui Shang, Yi Hu and Jinghua Feng

Tutorials

Monday, August 21st

13:20 – 15:05 R10.1 – Cooperative Security with Commodity Linux Tools (CSec)
Part 1: Introduction and motivation

Introduction to Customer Edge Switching
Raimo Kantola, Aalto University, Finland

Motivation for cooperation based on game theory
Hammad Kabir, Aalto University, Finland
15:35 – 17:20 R10.2 – CSec Tutorial Part 2: Firewalling and trust processing

Realm Gateway and Firewalling using Linux Kernel
Jesus Llorente, Aalto University, Finland

Homomorphic encryption in digital trust processing
Lifang Zhang, Aalto University, Finland

Tuesday, August 22nd

13:20 – 15:10 R11.4 – HPmPP: Tutorial on High Performance Multithreaded Packet Processing

Juha-Matti Tilli, Nokia Bellabs
Tutorial is available here
Part 1

Wednesday, August 23rd

13:45 – 15:25 R3.7 – HPmPP: Tutorial on High Performance Multithreaded Packet Processing

Juha-Matti Tilli, Nokia Bellabs
Tutorial is available here
Part 2


Downlaod Final Program in PDF: Here





GOLD PATRON

nokia