Program
Program of the event

Program at a Glance
Conferences | ||
CIT | 17th International IEEE Conference on Computer and Information Technology | |
ICA3PP | 17th International Conference on Algorithms and Architectures for Parallel Processing | |
NSS | International Conference on Network and Systems Security | |
Workshops | ||
DACSC | International Workshop on Distributed Autonomous Computing in Smart City | |
DTWSM | 4th International Workshop on Data, Text, Web and Social Network Mining | |
IW5GS | 3rd International Workshop on 5G Security and Machine Learning | |
Pbio | 5th International Workshop on Parallelism in Bioinformatics | |
RACIT | International Symposium on Recent Advances of Computer and Information Technologies | |
SECIOE | 2nd International Workshop on Security of Internet of Everything | |
SecureEdge | International Workshop on Secure and Resource-Efficient Edge Computing | |
SMCN | International Workshop on Security Measurements in Cyber Networks | |
UCER | 2nd International Workshop on Ultra-scale Computing for Early Researchers | |
Tutorials | ||
CES | Tutorial on Customer Edge Switching | |
HPmPP | Tutorial on High Performance Multithreaded Packet Processing |
Monday, August 21st
Room | 1 | 3 | 4 | 5 | 10 | 11 | 12 |
---|---|---|---|---|---|---|---|
8:30-9:00 | Opening of the Conference | ||||||
9:00-9:45 | Keynote: Professor Elisa Bertino, IEEE Fellow | ||||||
9:45-10:15 | Morning Coffee | ||||||
10:15-11:00 | Keynote: Professor Francisco Herrera | ||||||
11:00-12:00 | Panel: Big Data and Analytics | ||||||
12:00-13:20 | Lunch | ||||||
13:20-15:05 | CIT 1 | NSS 1 | ICA3PP 1 | UCER 1 | CES p1 | SMCN 1 | CIT 2 |
15:05-15:35 | Afternoon Coffee | ||||||
15:35-17:20 | CIT 3 | NSS 2 | ICA3PP 2 | UCER 2 | CES p2 | SMCN 2 | CIT 4 |
18:30-20:30 | Welcome Reception City Hall |
Tuesday, August 22nd
Room | 1 | 3 | 4 | 5 | 10 | 11 | 12 |
---|---|---|---|---|---|---|---|
8:15-9:00 | Keynote 3: Lauri Oksanen, VP, Nokia Bellabs | ||||||
9:00-9:45 | Keynote 4: Tatu Ylönen, CEO of SSH Communications Security, Finland/USA | ||||||
9:45-10:15 | Morning Coffee | ||||||
10:15-12:00 | CIT 5 | NSS 3 | ICA3PP 3 | SECIOE 1 | IW5GS 1 | SMCN 3 | Pbio 1 |
12:00-13:20 | Lunch | ||||||
13:20-15:10 | CIT 6 | NSS 4 | ICA3PP 4 | SECIOE 2 | IW5GS 2 | HPmPP | Pbio 2 |
15:10-15:40 | Afternoon Coffee | ||||||
15:40-17:30 | CIT 7 | NSS 5 | ICA3PP 5 | SECIOE 3 | IW5GS 3 | DACSC 1 | Pbio 3 |
19:00-22:30 | Gala Dinner (Kalastajatorppa) |
Wednesday, August 23rd
Room | 1 | 3 | 4 | 5 | 10 | 11 | 12 |
---|---|---|---|---|---|---|---|
8:00-8:45 | Keynote 5: Jinjun Chen, Professor, Swinburne University of Technology, Australia | ||||||
8:45-9:30 | Keynote 6: Anand Prasad, Dr., NEC Corporation | ||||||
9:30-9:55 | Morning Coffee | ||||||
9:55-10:40 | Keynote 7: Shiwen Mao, Professor, Auburn University, USA | ||||||
10:45-12:30 | CIT 8 | NSS 6 | ICA3PP 6 | SecureEdge 1 | RACIT 1 | DACSC 2 | DTWSM 1 |
12:30-13:45 | Lunch | ||||||
13:45-15:25 | CIT 9 | HPmPP | ICA3PP 7 | SecureEdge 2 | RACIT 2 | DACSC 3 | DTWSM 2 |
15:30-15:50 | Closing of the Conference | ||||||
15:50-16:20 | Afternoon Coffee |
Keynote Speakers: Details of keynote speakers can be found here
Technical Symposia
Monday, August 21st
13:20 – 15:05 | R1.1 – CIT 1: Machine Learning, Data Mining and Big Data Analytics | |
---|---|---|
Chair: Rafael Valero Fernandez, Keele University, UK Learning from Big Data: A Survey and Evaluation of Approximation Technologies for Large-scale Reinforcement Learning Cheng Wu and Yiming Wang Predicting the Popularity of Online News Based on Multivariate Analysis Caiyun Liu, Wenjie Wang, Yuqing Zhang, Ying Dong, Fannv He and Chensi Wu Efficient Strip-Mode Microwave Correlated Imaging Method with Data Fusion Yuanyue Guo and Jie Deng Sentiment classification: Feature selection based approaches versus deep learning Alper Kursat Uysal and Yi Lu Murphey |
||
13:20 – 15:05 | R3.1 – NSS 1: Platform and Hardware Security | |
Chair: Roberto Saia, Ph.D, University of Cagliari, Italy A Practical Method to Confine Sensitive API Invocations on Commodity Hardware Donghai Tian, Dingjun Qi, Li Zhan, Yuhang Yin, Changzhen Hu and Jingfeng Xue Hardware and Software Support for Transposition of Bit Matrices in High-Speed Encryption Patrick Eitschberger, Jörg Keller and Simon Holmbacka An Android Vulnerability Detection System Jiayuan Zhang and Yao Yao DNA-Droid: A Real-time Android Ransomware Detection Framework Amirhossein Gharib and Ali Ghorbani Exploring Energy Consumption of Juice Filming Charging Attack on Smartphones: A Pilot Study Lijun Jiang, Weizhi Meng, Yu Wang and Chunhua Su |
||
13:20 – 15:05 | R4.1 – ICA3PP 1: Parallel and Distributed Architectures | |
Chair: Prof Valtteri Niemi, University of Helsinki, Finland Workload Type-Aware Scheduling on big.LITTLE Platforms Simon Holmbacka and Jörg Keller Pipelining Computation and Data Reuse Strategies for Scaling GROMACS on the Sunway Many-core Processor Yu Yang, Hong An, Junshi Chen, Weihao Liang, Qingqing Xu and Yong Chen Exploring FPGA-GPU Heterogeneous Architecture for ADAS: Towards Performance and Energy Xiebing Wang, Linlin Liu, Kai Huang and Alois Knoll |
||
13:20 – 15:05 | R12.1 – CIT 2: Social Networks and Optimization | |
Chair: Hao Wang, Norwegian University of Science & Technology, Norway A Core Theory based Algorithm for Influence Maximization in Social Networks Kan Zhang, Zichao Zhang and Yanlei Wu A design towards personally identifiable information control and awareness in OpenID Connect identity providers Rafael Weingärtner and Carla Merkle Westphall ROBOMO: Effects of a Motivational Intervention to Address the Barriers During Science Learning Khaoula Youssef, Walid Boukadida and Michio Okada A multi-objective metaheuristic approach to search-based stress testing Francisco Nauber Gois, Pedro PorfÍrio Muniz Farias and AndrÉ Coelho |
||
15:35 – 17:20 | R1.2 – CIT 3: Wireless Networks and Communications I | |
Chair: Madhusanka Liyanage, University of Oulu, Finland Robust Optimal Spectrum Patrolling for Passive Monitoring in Cognitive Radio Networks Jiachen Li, Jing Xu, Wei Liu, Shimin Gong and Kai Zeng Cooperative Multi-Relay Assisted Multicast Beamforming in Wirelessly Power Communications Jiachen Li, Yue Mi, Shimin Gong, Jing Xu, Xiaoxia Huang and Yanyan Shen Improved Presence detection for Occupancy Control in Multisensory Environments Charikleia Papatsimpa and Jean Paul Linnartz Subspace Decomposition Channel Estimation for Multiple Virtual MIMO SC-FDMA Systems Ashraf Tahat, Claude D'Amours and Benoit Champagne Dynamic MAC protocol for Tactical Data Links Zhe Guo and Zheng Yan |
||
15:35 – 17:20 | R3.2 – NSS 2: Network Security I | |
Chair: Dr. Weizhi Meng, Technical University of Denmark, Denmark Mixed Wavelet-based Neural Network Model for Cyber Security Situation Prediction using MODWT and Hurst Exponent Analysis Fannv He, Yuqing Zhang, Donghang Liu, Ying Dong, Caiyun Liu and Chensi Wu Detecting DNS Tunneling Using Ensemble Learning Saeed Shafieian, Daniel Smith and Mohammad Zulkernine CookiesWall: Preventing Session Hijacking Attacks Using Client Side Proxy Somanath Tripathy and Praveen Kumar |
||
15:35 – 17:20 | R4.2 – ICA3PP 2: Software Systems and Programming Models | |
Chair: Stephan Sigg Hzmem: New Huge Page Allocator with Main Memory Compression Guoxi Li, Wenzhi Chen, Kui Su, Zonghui Wang and Zhongyong Lu An FPGA-Based Real-Time Moving Object Tracking Approach Wenjie Chen, Yangyang Ma, Zhilei Chai, Mingsong Chen and Daojing He Automatic Acceleration of Stencil Codes in Android Sergio Afonso, Alejandro Acosta and Francisco Almeida |
||
15:35 – 17:20 | R12.2 – CIT 4: Video and Audio Transmission | |
Chair: Kimmo Järvinen, University of Helsinki Fast Coding-Unit Mode Decision for HEVC Transrating Shih-Hsuan Yang and Chong-Cheng Zhong Multidimensional QoE Assessment of a Simultaneous Transmission Method in Multi-View Video and Audio Transmission with MPEG-DASH Yuki Maehara and Toshiro Nunome Energy Efficient Event Driven Video Streaming Surveillance Using sleepyCAM Tenager Mekonnen, Erkki Harjula, Arto Heikkinen, Timo Koskela and Mika Ylianttila Fuzzy Analogy based Effort Estimation: An Empirical Comparative Study Ali Idri and Ibtissam Abnane |
Tuesday, August 22nd
10:15 – 12:00 | R1.3 – CIT 5: Wireless Networks and Communications II | |
---|---|---|
Chair: Ashraf A. Tahat, Princess Sumaya University for Technology, Jordan A Simplified Massive MIMO Approach using Precoding Mário Marques Da Silva and Rui Dinis Indoor localization using ambient FM radio fingerprinting: A 9-month study Andrei Popleteev Assessment of TCP parameters for mobile devices concerning performance and energy consumption Jonas Pontes, Demetrio Borges, Eric Borba, Victor Lira and Eduardo Tavares Antenna Array Based Localization Scheme for Vehicular Networks Marco Antonio Marques Marinho, Alexey Vinel, Felix Antreich, Joao Paulo Carvalho Lustosa Da Costa and Edison Pignaton de Freitas A New Method of Error Reduction for Affine Projection Algorithm Shin'Ichi Koike |
||
10:15 – 12:00 | R3.3 – NSS 3: Cloud and IoT Security | |
Chair: Catalin Leordeanu, Lecturer, University Politehnica of Bucharest, Romania A Generic Construction of Secure-Channel Free Searchable Encryption with Multiple Keywords Keita Emura Experiences in Trusted Cloud Computing Silke Holtmanns, Ian Oliver, Yoan Miche, Aapo Kalliola, Shankar Lal, Leo Hippeläinen and Sowmya Ravidas Private Membership Test Protocol with Low Communication Complexity Sara Ramezanian, Tommi Meskanen, Masoud Naderpour and Valtteri Niemi Risk Modelling of Blockchain Ecosystem Igor Kabashkin Adaptively Secure Hierarchical Identity-based Encryption over Lattice Leyou Zhang and Qing Wu |
||
10:15 – 12:00 | R4.3 – ICA3PP 3: Distributed and Network Based Computing | |
Chair: Llorente Santos Jesus, Aalto University Optimizing Concurrent Evacuation Transfers for Geo-Distributed Datacenters in SDN Xiaole Li, Hua Wang, Shanwen Yi, Xibo Yao, Fangjin Zhu and Linbo Zhai Energy-Balanced and Depth-Controlled Routing Protocol for Underwater Wireless Sensor Networks Hao Qin, Zhiyong Zhang, Rui Wang,Xiaojun Cai and Zhiping Jia On the Energy Efficiency of Sleeping and Rate Adaptation for Network Devices Timothée Haudebourg and Anne-Cécile Orgerie |
||
13:20 – 15:10 | R1.4 – CIT 6: Machine Learning, Data Mining and Big Data Analytics II | |
Chair: Kazuhiko Takahashi, Doshisha University, Japan Remarks on Adaptive-type Hypercomplex-valued Neural Network-based Feedforward Feedback Controller Kazuhiko Takahashi Towards Accurate Predictions of Customer Purchasing Patterns K-P Lam, Rafael Valero-Fernandez, David Collins, Collin Rigby and James Bailey Improving Performance for Geo-Distributed Data Process in Wide –Area Ge Zhang, Zhongzhi Luan and Weiguo Wu Predicting Student Performance in an ITS using Task-driven Features Ritu Chaturvedi and Christie Ezeife An adaptive visualization tool for high order discontinuous galerkin method with quadratic elements Liyang Xu, Xiaoguang Ren, Xinhai Xu, Hao Li, Yuhua Tang and Yongquan Feng |
||
13:20 – 15:10 | R3.4 – NSS 4: Crypto and other topics | |
Chair: Leyou Zhang, Prof., Xidian University, China A Generic yet Efficient Method for Secure Inner Product Lihua Wang, Takuya Hayashi, Yoshinori Aono and Le Trieu Phong Randomization can't stop BPF JIT spray Elena Reshetova, Filippo Bonazzi and N. Asokan EEG-based Random Number Generators Dang Nguyen, Dat Tran, Wanli Ma and Dharmendra Sharma Safety of ABAC_\alpha is Decidable Tahmina Ahmed and Ravi Sandhu Implementation of Bitsliced AES Encryption on CUDA-Enabled GPU Naoki Nishikawa, Hideharu Amano and Keisuke Iwai |
||
13:20 – 14:20 | R4.4 – ICA3PP 4: Big Data and its Applications | |
Chair: Dr. Yu Xiao, Aalto University, Finland Private and Efficient Set Intersection Protocol for Big Data Analytics Zakaria Gheid and Yacine Challal A Topology-aware Framework for Graph Traversals Jia Meng, Liang Cao and Huashan Yu Adaptive Traffic Signal Control with Network-wide Coordination Yong Chen, Juncheng Yao, Chunjiang He, Hanhua Chen and Hai Jin |
||
14:20 – 15:10 | ICA3PP 5: Parallel and Distributed Algorithms | |
Chair: Shadi Ibrahim, Inria, France A Novel Parallel Dual-Character String Matching Algorithm on Graphical Processing Units Chung-Yu Liao and Cheng-Hung Lin Distributed Nonnegative Matrix Factorization with HALS Algorithm on MapReduce Rafal Zdunek and Krzysztof Fonal |
||
15:40 – 17:30 | R1.5 – CIT 7: Network Security and Privacy | |
Chair: Raimo Kantola A Software-Hardware Co-Designed Methodology for Efficient Thread Level Speculation Qiong Wang, Jialong Wang, Li Shen and Zhiying Wang Fast Transmission Mechanism for Secure VPLS Architectures Madhusanka Liyanage, Andrei Gurtov and Mika Ylianttila "You have a potential hacker's infection": A study on technical support scams Sampsa Rauti and Ville Leppänen A New Approach to Utility-based Privacy Preserving in Data Publishing Yilmaz Vural and Murat Aydos Best random codes construction for syndrome coding scheme Ke Zhang, Martin Tomlinson and Mohammed Zaki Ahmed |
||
15:40 – 17:30 | R3.5 – NSS 5: Authentication and Key Management | |
Chair: Prof. Jayaprakash Kar, The LNM Institute of Information Technology, India Cryptanalysis and Improvement of an Identity-based Proxy Multi-signature scheme Jayaprakash Kar The Time Will Tell on You: Exploring Information Leaks in SSH Public Key Authentication Joona Kannisto and Jarmo Harju Lightweight Deterministic Non Interactive (ni) Hierarchical Key Agreement Scheme (KAS) Pinaki Sarkar |
||
15:40 – 17:30 | R4.5 – ICA3PP 6: Applications of Parallel and Distributed Computing | |
Chair: Anne-Cécile Orgerie, CNRS, France GPU-Accelerated Block-Max Query Processing Haibing Huang, Mingming Ren, Yue Zhao, Rebecca J. Stones, Rui Zhang, Gang Wang and Xiaoguang Liu KD-tree and HEALPix-Based Distributed Cone Search Indexing System for Multi-Band Astronomical Catalogs Chen Li, Ce Yu, Jian Xiao, Xiaoteng Hu, Hao Fu, Kun Li and Yanyan Huang An Out-of-Core Branch and Bound Method for Solving the 0-1 Knapsack Problem on a GPU Jingcheng Shen, Kentaro Shigeoka, Fumihiko Ino and Kenichi Hagihara The Curve Boundary Design and Performance Analysis for DGM Based on OpenFOAM Yongquan Feng, Xinhai Xu, Yuhua Tang, Liyang Xu and Yongjun Zhang |
Wednesday, August 23rd
10:45 – 12:30 | R1.6 – CIT 8: Cloud Computing and Data Centre Networks | |
---|---|---|
Chair: KP Lam, Keele University, UK A Sensitivity Approach to Energy-Efficient Mapping of Dependable Virtual Networks Victor Lira, Eduardo Tavares, Meuse Oliveira Jr, Dennys Azevedo and Jonas Pontes CDController: A Cloud Data Access Control System based on Reputation Huaqing Lin, Zheng Yan and Raimo Kantola Cloud IEC 61850: DDS Performance in Virtualized Environment with OpenDDS Roger D. F. Ferreira and Rômulo S. Oliveira Using Game Theory To Solve the Fault Diagnosis Problem Under Symmetric Comparison Rules Mourad Elhadef |
||
10:45 – 12:30 | R3.6 – NSS 6: Network Security II | |
Chair: Llorente Santos Jesus, Aalto University Exploiting AUTOSAR Safety Mechanisms to Launch Security Attacks Ahmad Nasser, Di Ma and Sam Lauzon CookiesWall: Preventing Session Hijacking Attacks Using Client Side Proxy Somanath Tripathy and Praveen Kumar A State Recovery Attack on ACORN-v1 and ACORN-v2 Deepak Kumar Dalai and Dibyendu Roy |
||
10:45 – 12:30 | R4.6 – ICA3PP 7: Service Dependability and Security in Distributed and Parallel Systems | |
Chair: Zheng Yan, Xidian/Aalto University Leakage-Resilient Password-Based Authenticated Key Exchange Ou Ruan, Mingwu Zhang and Jing Chen Secure Encrypted Data Deduplication with Ownership Proof and User Revocation Wenxiu Ding, Zheng Yan and Robert H. Deng Optimally Selecting the Timing of Zero-Day Attack via Spatial Evolutionary Game Yanwei Sun, Lihua Yin, Yunchuan Guo, Fenghua Li and Binxing Fang |
||
13:45 – 15:25 | R1.7 – CIT 9: Machine Learning, Data Mining and Big Data Analytics III | |
Chair: Ali Idri, Mohamed V University, Morocco A data mining-based approach for cardiovascular dysautonomias diagnosis and treatment Ali Idri and Ilham Kadi Investigating the Agility Bias in DNS Graph Mining Jukka Ruohonen and Ville Leppänen The Enumeration of Flippable Edges in Maximal Planar Graphs Dongyang Zhao, Yangyang Zhou and Jin Xu Accurate Localization using LTE Signaling Data Lei Ni, Yanming Shen, Yuxin Wang, Haoyang Tang and Zhao Yin A Novel Model for Cybersecurity Economics and Analysis Paresh Rathod, Timo Hämäläinen |
||
13:45 – 15:25 | R4.7 – ICA3PP 8: Performance Modeling and Evaluation | |
Chair: KP Lam, Keele University, UK Performance Analysis of a Ternary Optical Computer Based on M/M/1 Queueing System Xianchao Wang, Sulan Zhang, Mian Zhang, Jia Zhao and Xiangyang Niu Efficient Computation Offloading for Various Tasks of Multiple Users in Mobile Edge Clouds Weiyu Liu, Xiangming Wen, Zhaoming Lu, Luning Liu and Xin Chen A CNN-Based Supermarket Auto-Counting System Zhonghong Ou, Changwei Lin, Meina Song and Haihong E Research and Implementation of Question Classification Model in Q & A System Haihong E, Yingxi Hu, Meina Song, Zhonghong Ou and Xinrui Wang |
Workshops
Monday, August 21st
13:20 – 15:05 | R5.1 – UCER 1: | |
---|---|---|
Chair: Dr. Jiri Dokulil, University of Vienna, Austria Probabilistic-based selection of alternate implementations for heterogeneous platforms Javier Fernández, Jesús Sánchez Cuadrado, David del Rio Astorga, Manuel F. Dolz, and J. Daniel García Accelerating processing of scale-free graphs on massively-parallel architectures Mikhail Chernoskutov A Hybrid Parallel Search Algorithm for Solving Combinatorial Optimization Problems on Multicore Clusters Victoria Sanz, Armando De Giusti, and Marcelo Naiouf |
||
13:20 – 15:05 | R11.1 – SMCN 1: | |
Chair: Wenxiu Ding, Xidian University A Quantitative method for evaluating Network Security based on Attack Graph Lv Kun, Zheng Yukun and Hu Changzhen SulleyEX: A Fuzzer for Stateful Network Protocol Rui Ma, Tianbao Zhu, Changzhen Hu, Chun Shan and Xiaolin Zhao A detecting method of array bounds defects based on symbolic execution Chun Shan, Shiyou Sun, Jingfeng Xue, Changzhen Hu and Hongjin Zhu Machine learning for Analyzing Malware Dong Yajie, Liu Zhenyan, Yan Yida, Wang Yong, Xue Jingfeng and Zhang Ji Optimal Attack Path Generation Based on Supervised Kohonen Neural Network Yun Chen, Kun Lv and Changzhen Hu |
||
15:35 – 17:20 | R5.2 – UCER 2 | |
Chair: Dr. Javier Fernández Muñoz, University Carlos III of Madrid, Spain Concurrent Treaps Praveen Alapati, Swamy Saranam, Madhu Mutyam Survey on Energy-saving Technologies for Disk-based Storage Systems Ce Yu, Jianmei Wang, Chao Sun, Xiaoxiao Lu, Jian Xiao and Jizhou Sun The Open Community Runtime on the Intel Knights Landing Architecture Jiri Dokulil, Siegfried Benkner and Jakub Yaghob High-Performance Graphics in Racket with DirectX Antoine Bossard |
||
15:35 – 17:20 | R11.2 – SMCN 2 | |
Chair: Foukia Noria, HES, Switzerland Defenses against Wormhole Attacks in Wireless Sensor Networks Rui Ma, Siyu Chen, Ke Ma, Changzhen Hu and Xiajing Wang A systematic analysis of random forest based social media spam classification Mohammed Al-Janabi and Peter Andras Application Research on Network Attack and Defense with Zachman Framework Chensi Wu, Yuqing Zhang and Ying Dong A Novel Approach to Network Security Situation Assessment Based on Attack Confidence Donghang Liu, Lihua Dong, Shaoqing Lv, Ying Dong, Fannv He, Chensi Wu and Yuqing Zhang A Discrete Wavelet Transform Approach to Fraud Detection Roberto Saia |
Tuesday, August 22nd
10:15 – 12:00 | R5.3 – SECIOE 1 | |
---|---|---|
Chair: Dr. Somanath Tripathy, Associate Professor, IIT Patna, India Improving Alert Accuracy for Smart Vehicles Chia-Mei Chen, Gu-Hsin Lai and Tan-Ho Chang Hardware Secured, Password-based Authentication for Smart Sensors for the Industrial Internet of Things Thomas Wolfgang Pieber, Thomas Ulz, Christian Steger and Rainer Matischek Towards Dependably Detecting Geolocation of Cloud Servers Leo Hippeläinen, Ian Oliver and Shankar Lal Tor de-anonymisation techniques Juha Nurmi and Mikko Niemelä |
||
10:15 – 12:00 | R10.3 – IW5GS 1: Interconnection Security | |
Chair: Yoan Miche | ||
10:15 -10:45 | Jaakko Wallenius (CSO Elisa) | |
10:45 – 11:10 | Stealthy SS7 Attacks Sergey Puzankov (Positive Technologies) |
|
11:10 – 11:35 | Diameter Security: An Auditor's Viewpoint Sergey Mashukov (Positive Technologies) |
|
11:35 – 12:00 | Subscriber Profile Extraction and Modification via Diameter Interconnection Silke Holtmanns, Ian Oliver, Yoan Miche (Nokia Bell Labs) |
|
10:15 – 12:00 | R11.3 – SMCN 3 | |
Session Chair: Tu Peng, Beijing Institute of Technology An Automatic Vulnerabilities Classification Method based on their Relevance Hao Zhang, Kun Lv and Changzhen Hu A Novel Threat-Driven Data Collection Method for Resource-Constrained Networks Jing Li, Lihua Yin, Yunchuan Guo, Chao Li, Fenghua Li, Lihua Chen OE-CP-ABE: Over-Encryption based CP-ABE Scheme for Efficient Policy Updating Jialu Hao, Jian Liu, Hong Rong, Huimei Wang and Ming Xian Privacy-Preserving Stochastic Gradient Descent with Multiple Distributed Trainers Le Trieu Phong |
||
10:15 – 12:00 | R12.3 – PBio 1: Multicore and cluster computing in Bioinformatics | |
Session Chair: José M. Granado-Criado A Resource Manager for Maximizing the Performance of Bioinformatics Workflows in Shared Clusters. Ferran Badosa, Cesar Acevedo, Antonio Espinosa, Gonzalo Vera and Ana Ripoll. Massively Parallel Sequence Alignment with BLAST through Work Distribution Implemented using PCJ Library. Marek Nowicki, Davit Bzhalava and Piotr Bala On the Use of Binary Trees for DNA Hydroxymethylation Analysis. César González, Mariano Pérez, Juan M. Orduña, Javier Chaves and Ana-Bárbara García. Parallel Multi-Objective Optimization for High-Order Epistasis Detection. Daniel Gallego-Sánchez, José M. Granado-Criado, Sergio Santander-Jiménez, Álvaro Rubio-Largo and Miguel A. Vega-Rodríguez. |
||
13:20 – 15:10 | R5.4 – SECIOE 2 | |
Chair: Todor Ginchev, Aalto University Coincer: Decentralised Trustless Platform for Exchanging Decentralised Cryptocurrencies Michal Zima Enhancing Resilience of KPS Using Bidirectional Hash Chains and Application on Sensornet Deepak Kumar Dalai and Pinaki Sarkar μShield: Configurable Code-Reuse Attacks Mitigation For Embedded Systems Ali Abbasi, Jos Wetzels, Wouter Bokslag, Emmanuele Zambon and Sandro Etalle A Role-based Access Control System for Intelligent Buildings Nian Xue, Xin Huang and Liu Dawei |
||
13:20 – 15:10 | R10.4 – IW5GS 2: Virtualized and Software-Defined Network Security | |
Chair: Ian Oliver | ||
13:20 – 13:50 | Bengt Sahlin (Ericsson) | |
13:50 – 14:10 | 5G Slicing as a Tool to test User Equipment against Advanced Persistent Threats Lauri Isotalo (Elisa) |
|
14:10 -14:30 | IPsec and IKE as Functions in SDN Controlled Network Markku Vajaranta, Joona Kannisto and Jarmo Harju |
|
14:30 – 14:50 | Area-dividing Route Mutation in Moving Target Defense Based on SDN Huiting Tan, Chaojing Tang, Chen Zhang and Shaolei Wang |
|
14:50 -15:10 | Probabilistic Transition-based Approach for Detecting Application-Layer DDoS attacks in Encrypted Software-Defined Networks Elena Ivannikova, Mikhail Zolotukhin and Timo Hamalainen |
|
13:20 – 15:10 | R12.4 – PBio 2: Hardware accelerators in Bioinformatics | |
Session Chair: José M. Granado-Criado Configuring Concurrent Computation of Phylogenetic Partial Likelihoods: Accelerating Analyses using the BEAGLE Library. Daniel L. Ayres and Michael P. Cummings. Accelerating FaST-LMM for Epistasis Tests. Héctor Martínez, Sergio Barrachina, Maribel Castillo, Enrique S. Quintana-Ortí, Jordi Rambla De Argila, Xavier Farré and Arcadi Navarro. Pipelined Multi-FPGA Genomic Data Clustering. Rick Wertenbroek, Enrico Petraglio and Yann Thoma. First Experiences Accelerating Smith-Waterman on Intel’s Knights Landing Processor. Enzo Rucci, Carlos Garcia, Guillermo Botella, Armando De Giusti, Marcelo Naiouf and Manuel Prieto-Matias. |
||
15:40 – 17:30 | R5.5 – SECIOE 3 | |
Chair: Michal Zima, Masaryk University, Brno, Czech Republic Access Control Model for AWS Internet of Things Smriti Bhatt, Farhan Patwa and Ravi Sandhu Privacy Verification Chains for IoT Noria Foukia, David Billard and Eduardo Solana Platform for detection of voids in the Bogotá D. C. road network and exposure of its information in a web environment Angel Rendon, Octavio Salcedo and Lewys Correa A Denial of Service Attack Method for IoT System in Photovoltaic Energy System Lulu Liang, Kai Zheng, Qiankun Sheng, Wei Wang, Xin Huang |
||
15:40 – 17:30 | R10.5 – IW5GS 3: New approaches for 5G Security | |
Chair: Silke Holtmanns | ||
15:40 – 16:05 | Concealing IMSI in 5G Network Using Identity Based Encryption Md Mohsin Ali Khan and Valtteri Niemi |
|
16:05 – 16:30 | Mind Your Right to Know: On De-anonymization Auditability in V2X Communications Tommi Meskanen, Masoud Naderpour, Valtteri Niemi |
|
16:30 – 16:55 | A formal approach for network security policy relevancy checking Fakher Ben Ftima, Kamel Karoui and Henda Ben Ghezala |
|
16:55 - | Covert Channels Implementation and Detection in Virtual Environments Irina Mihai, Catalin Leordeanu and Alecsandru Patrascu |
|
15:40 – 17:30 | R11.5 – DACSC 1: Internet of Vehicles | |
Chair: Wendong Wang, BUPT, China En-Eye: A Cooperative Video Fusion Framework for Traffic Safety in Intelligent Transportation Systems Tianhao Wu and Lin Zhang Security/Reliability-Aware Relay Selection with Connection Duration Constraints for Vehicular Networks Zhenyu Liu and Lin Zhang Research on Properties of Nodes Distribution on Internet of Vehicle Jiujun Cheng, Zheng Shang, Hao Mi, Cheng Cheng and Zhenhua Huang Application of Batch and Stream Collaborative Computing in Urban Traffic Data Processing Tao Zhang and Shuai Zhao |
||
15:40 – 17:30 | R12.5 – PBio 3: Heterogeneous and distributed computing in Bioinformatics | |
Session Chair: José M. Granado-Criado Power-performance Evaluation of Parallel Multi-objective EEG Feature Selection on CPU-GPU Platforms. Juan José Escobar, Julio Ortega, Antonio Francisco Díaz, Jesús González and Miguel Damas. Using Spark and GraphX to Parallelize Large-Scale Simulations of Bacterial Populations over Host Contact Networks. Andreia Sofia Teixeira, Pedro T. Monteiro, João A. Carriço, Francisco C. Santos and Alexandre P. Francisco. PPCAS: Implementation of a Probabilistic Pairwise Model for Consistency-based Multiple Alignment in Apache Spark. Jordi Lladós, Fernando Guirado and Fernando Cores. Accelerating Exhaustive Pairwise Metagenomic Comparisons. Esteban Pérez-Wohlfeil, Oscar Torreno and Oswaldo Trelles. |
Wednesday, August 23rd
10:45 – 12:30 | R5.6 – SecureEdge 1: Secure and Resource-Efficient Edge Computing I | |
---|---|---|
Chair: Mika Ylianttila, Professor, Oulu University, Finland Some Cryptography Models Designed by Double Odd-edge Labelling of Trees Hongyu Wang, Jin Xu and Bing Yao Enhancing Security, Scalability and Flexibility of Virtual Private LAN Services Madhusanka Liyanage, Mika Ylianttila and Andrei Gurtov Horizontal Requirement Engineering in Integration of Multiple IoT Use Cases of City Patform as a Service Toshihiko Yamakami |
||
10:45 – 12:30 | R10.6 – RACIT 1: Advances of Computer and Information Technologies I | |
Chair: Yongquan Feng, National University of Defense Technology, China Investigation and Performance Evaluation of Scalable High Efficiency Video Coding Wei-Lune Tang and Shih-Hsuan Yang An Efficient Dynamic Ridesharing Algorithm Jianren Gao, Yuxin Wang, Yanming Shen, Haoyang Tang and Zhao Yin A Best Practice Based E-government Portals’ Maturity Model – A Case Study Ali Idri, Abdoullah Fath Allah, Laila Cheikhi and Rafa Al Qutaich Security Assessment of a Distributed, Modbus-based Building Automation System Tuomas Tenkanen and Timo Hamalainen Practical Performance Models for High-order CFD Simulation Hao Li, Xiaoguang Ren, Yufei Lin, Yuhua Tang, Shuai Ye and Chen Cui |
||
10:45 – 12:30 | R11.6 – DACSC 2: Big Data | |
Chair: Yu Xiao Fine-grained Infer $PM_2.5$ Using Images from Crowdsourcing Shuai Li, Teng Xi and Xirong Que, Wendong Wang An Advanced Random Forest Algorithm Targeting the Big Data with Redundant Features Ying Zhang, Bin Song, Yue Zhang and Sijia Chen The Impact of International Inter-City Investment on Enterprises Performance: Pluralistic Interpretation of Geographical Death Yanghao Zhan, Yan Chen and Ruirui Zhai Comparing Electricity Consumer Categories based on Load Pattern Clustering with Their Natural Types Zigui Jiang, Rongheng Lin, Fangchun Yang and Zhihan Liu |
||
10:45 – 12:30 | R12.6 – DTWSM 1 | |
Chair: Zheng Yan, Professor, Xidian University, China/Aalto University, Finland Cloud Multimedia Files Assured Deletion Based on Bit Stream Transformation with Chaos Wenbin Yao, Yijie Chen and Dongbin Wang Interval Merging Binary Tree István Finta, Lóránt Farkas, Sándor Szénási and Szabolcs Sergyán Mining Suspicios Tax Evasion Groups in a Corporate Governance Network Wenda Wei, Zheng Yan, Jianfei Ruan, Qinghua Zheng and Bo Dong PerRec: A Permission Configuration Recommender System for Mobile Apps Yanxiao Cheng and Zheng Yan |
||
13:45 – 15:25 | R5.7 – SecureEdge 2: Secure and Resource-Efficient Edge Computing II | |
Chair: Mika Ylianttila, Professor, Oulu University, Finland Dynamic Malware Detection using API Similarity Ehab Alkhateeb Where Resources meet at the Edge Klervie Toczé and Simin Nadjm-Tehrani Software-Defined Edge Defense Against IoT-Based DDoS Mert Özçelik, Niaz Chalabianloo and Gürkan Gür |
||
13:45 – 15:25 | R10.7 – RACIT 2: Advances of Computer and Information Technologies II | |
Chair: Leo Hippeläinen, Nokia Bell Labs, Finland Dynamic Reconfiguration of Architecture in the Communication Network of Air Traffic Management System Igor Kabashkin Changing for Win-Win Guangyu Xiong, Timo R. Nyberg and Gang Xiong 3D matrix-based visualization system of association rules Biying Wang, Tingting Zhang, Zheng Chang, Tapani Ristaniemi and Guohua Liu On the performance of web services and Google cloud messaging Waqar Hassan, Guido Albertengo, Fikru Getachew Debele and Dario Stramandino |
||
13:45 – 15:25 | R11.7 – DACSC 3: Smart City | |
Chair: Ye Tian Smart City Environmental perception from ambient cellular signals Isha Singh and Stephan Sigg When Clutter Reduction Meets Machine Learning for People Counting Using IRUWB Radar Xiuzhu Yang and Lin Zhang ESD-WSN: An Efficient SDN-based Wireless Sensor Network Architecture for IoT Applications Zhiwei Zhang, Zhiyong Zhang, Rui Wang, Zhiping Jia, Haijun Lei, and Xiaojun Cai Energy Efficient Manycast Routing, Modulation Level and Spectrum Assignment in Elastic Optical Networks for Smart City Applications Xiao Luo, Xue Chen and Lei Wang A Multitask-Oriented Selection Strategy for Efficient Cooperation of Collocated Mobile Devices Hui Gao, Jun Feng, Ruidong Wang and Wendong Wang |
||
13:45 – 15:25 | R12.7 – DTWSM 2 | |
Chair: Hui Li, Professor, Xidian University An Android Malware Detection System Based on Behavior Comparison Analysis Jing Tao, Qiqi Zhao, Pengfei Cao, Zheng Wang and Yan Zhang Stream-based Live Probabilistic Topic Computing and Matching Kun Ma, Ziqiang Yu, Ke Ji and Bo Yang Experiment for analysing the impact of financial events on Twitter Ana Fernández Vilas, Lewis Evans, Majdi Owda, Rebeca P. Díaz Redondo and Keeley Crocket APK-DFS: An Automatic interaction system based on Depth-First-Search for APK Jing Tao, Qiqi Zhao, Pengfei Cao, Zheng Wang and Yan Zhang Optimized Data Layout for Spatio-temporal Data in Time Domain Astronomy Jie Yan, Ce Yu, Chao Sun, Zhaohui Shang, Yi Hu and Jinghua Feng |
Tutorials
Monday, August 21st
13:20 – 15:05 | R10.1 – Cooperative Security with Commodity Linux Tools (CSec) Part 1: Introduction and motivation |
|
---|---|---|
Introduction to Customer Edge Switching Raimo Kantola, Aalto University, Finland Motivation for cooperation based on game theory Hammad Kabir, Aalto University, Finland |
||
15:35 – 17:20 | R10.2 – CSec Tutorial Part 2: Firewalling and trust processing | |
Realm Gateway and Firewalling using Linux Kernel Jesus Llorente, Aalto University, Finland Homomorphic encryption in digital trust processing Lifang Zhang, Aalto University, Finland |
Tuesday, August 22nd
13:20 – 15:10 | R11.4 – HPmPP: Tutorial on High Performance Multithreaded Packet Processing | |
---|---|---|
Juha-Matti Tilli, Nokia Bellabs Tutorial is available here Part 1 |
Wednesday, August 23rd
13:45 – 15:25 | R3.7 – HPmPP: Tutorial on High Performance Multithreaded Packet Processing | |
---|---|---|
Juha-Matti Tilli, Nokia Bellabs Tutorial is available here Part 2 |
Downlaod Final Program in PDF: Here
GOLD PATRON
