The 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications (IEEE TrustCom-18)
July 31th - August 3rd, 2018, New York, USA.


Technical Program

IEEE TrustCom 2018

Track 1: Trust Track 1 1:30 PM - 2:30 PM, 07/31/2018 Room A
Session Chair: Kim-Kwang Raymond Choo
• Scot Tucker. Engineering Trust: A Graph-based Algorithm for Modeling, Validating, and Evaluating Trust
• Wang Yubiao, Wen Junhao, Zhou Wei and Luo Fengji. A Novel Dynamic Cloud Service Trust Evaluation Model in Cloud Computing
• Yongkai Fan, Shengle Liu, Gang Tan, Xiaodong Lin, Guanqun Zhao and Jianrong Bai. One Secure Access Scheme based on Trusted Execution Environment
• Tianao Ma, Wei Hu, Yonghao Wang, Dalia El-Banna, John Grant and Hongjun Dai. Evaluation of Flexilink as Deterministic Unified Real-Time Protocol for Industrial Networks

Track 1: Trust Track 2 2:30 PM - 3:30 PM, 07/31/2018 Room A
Session Chair: Esma Aimeur
• Ghada El-Haddad, Esma Aimeur and Hicham Hage. Understanding Trust, Privacy and Financial Fears in Online Payment
• Sebastian Friebe, Ingo Sobik and Martina Zitterbart. DecentID: Decentralized and Privacy-preserving Identity Storage System using Smart Contracts
• Monika Ewa Rakoczy, Amel Bouzeghoub, Katarzyna Wegrzyn-Wolska and Alda Lopes Gancarski. Reputation Prediction using Influence Conversion
• Mostafa Kahla, Mohamed Azab and Ahmed Mansour. Secure, Resilient, and Self-configuring Fog Architecture for Untrustworthy IoT Environments

Track 1: Trust Track 3 3:45 PM - 4:45 PM, 07/31/2018 Room A
Session Chair: Esma Aimeur
• Mohamed Azab, Ahmed Hamdy and Ahmed Mansour. Repoxy: Replication Proxy for Trustworthy SDN Controller Operation
• Concepcion Sanchez Aleman, Niki Pissinou, Sheila Alemany and Georges Kamhoua. A Dynamic Trust Weight Allocation Technique for Data Reconstruction in Mobile Wireless Sensor Networks
• Jian Chen, Ziyang Chen, Peijia Zheng, Jianting Guo, Wei Zhang and Jiwu Huang. Encrypted Domain Mel-Frequency Cepstral Coefficient and Fragile Audio Watermarking
• Bumjin Gwak, Jinhee Cho, Dongman Lee and Heesuk Son. TARAS: Trust-Aware Role-based Access Control System in the Public Internet-of-Things

Track 1: Trust Track 4 4:45 PM - 5:45 PM, 07/31/2018 Room A
Session Chair: Esma Aimeur
• Jian Chen, Peijia Zheng, Jianting Guo, Wei Zhang and Jiwu Huang. A Privacy-Preserving Multipurpose Watermarking Scheme for Audio Authentication and Protection
• Manu Elappila and Suchismita Chinara. Dynamic Survivable Path Routing for Fast Changing IoT Network Topologies
• Zhaojun Lu, Qian Wang, Gang Qu and Zhenglin Liu. BARS: a Blockchain-based Anonymous Reputation System for Trust Management in VANETs
• Abu Shohel Ahmed and Tuomas Aura. Turning trust around: Smart Contract-assisted Public Key Infrastructure

Track 1: Trust Track 5 8:00 AM – 9:00 AM, 08/01/2018 Room A
Session Chair: Dale Lindskog
• Ibrahim Tariq Javed, Khalifa Toumi and Noël Crespi. N-Combat: A Nuisance Call Combating Framework for Internet Telephony
• Muhammad Saleem Khan, Saira Waris, Idrees Ahmed and Majid Iqbal Khan. A Comprehensive Analysis of Packet Loss in MANETs
• Sheikh Mahbub Habib, Nikolaos Alexopoulos, Monirul Islam, Jens Heider, Stephen Marsh and Max Mühlhäuser. Trust4App: Automating Trustworthiness Assessment of Mobile Applications
• Shunan Ma, Xunbo Shuai, Zhaohua Zhou and Kechun Qiao. Bionic Mechanism Based Dynamic Trust Evaluation Method in Cloud Environment

Track 1: Trust Track 6 11:15 AM – 12:15 PM, 08/01/2018 Room A
Session Chair: Dale Lindskog
• Hamza Baqa, Nguyen Binh Truong, Noel Crespi, Gyu Myoung Lee and Franck Le Gall, Quality of Information as an indicator of Trust in the Internet of Things
• Keju Meng, Fuyou Miao, Yue Yu and Changbin Lu. A Universal Secret Sharing Scheme with General Access Structure Based on CRT
• Gaosheng Liu, Xin Wang, Xiaohong Li, Jianye Hao and Zhiyong Feng. ESRQ:An Efficient Secure Routing Method in Wireless Sensor Networks Based on Q-Learning
• Antonio Caliò and Andrea Tagarelli. Trust-based dynamic linear threshold models for non-competitive and competitive influence propagation

Track 1: Trust Track 7 3:45 PM – 4:45 PM, 08/01/2018 Room A
Session Chair: Dale Lindskog
• Dapeng Qu, Dengyu Liang, Songlin Wu, Jie Li, Weihong Xuan and Xingwei Wang. A Trust Energy-efficient QoS Routing Scheme for Mobile Peer-to-Peer Networks
• Tao Sun, Xin Guo and Ting Zhang. Testing Sequence Generation Method Based on Unrelated Behaviors Serializing
• Mark Carman, Raymond Choo, Mark Koerber, Jiuyong Li and Helen Ashman. Manipulating visibility of political and apolitical threads on Reddit via score boosting
• Ruidan Li and Errin Fulp. Using Evolutionary Approaches to Manage Surveillance Cameras in Dynamic Environments
• Jie Zhou and Min Tian. An Elite Clone Parallel Genetic Algorithm for Trust Monitoring Assignment Problem in Adaptive Wireless Sensor Networks
• Hamza Baqa, Nguyen Binh Truong, Noel Crespi, Gyu Myoung Lee and Franck Le Gall. Quality of Information as an indicator of Trust in the Internet of Things

Track 2: Security Track 1 1:30 PM - 2:30 PM, 07/31/2018 Room B
Session Chair: Katarzyna Wegrzyn-Wolska
• Mehdi Yousefi, Nhamo Mtetwa, Yan Zhang and Huaglory Tianfield. A Reinforcement Learning Approach for Attack Graph Analysis
• Wenli Shang, Junrong Cui, Chunhe Song, Jianming Zhao and Peng Zeng. Research on Industrial Control Anomaly Detection Based on FCM Data Preprocessing and SVM Classification
• Ramon Bruderer, Moises Villena, Manuel Tupia and Mariuxi Bruzza. A Cybersecurity Model for Mobile Devices Aimed At SMEs That Use Freelancers and BYOD schemes
• Sha Ma. Authorized Equality Test of Encrypted Data for Secure Cloud Databases

Track 2: Security Track 2 2:30 PM - 3:30 PM, 07/31/2018 Room B
Session Chair: Gerard Memmi
• Weitao Xu, Sanjay Jha and Wen Hu. Exploring the Feasibility of Physical Layer Key Generation for LoRaWAN
• Jiewen Mao, Weijun Deng and Fuke Shen. DDoS Flooding Attack Detection Based on Joint-entropy with Multiple Traffic Features
• Martin Schanzenbach, Christian Banse and Julian Schütte. Practical Decentralized Attribute-Based Delegation using Secure Name Systems
• Lingtao Qi, Haiping Huang, Peng Wang and Ruchuan Wang. Abnormal item detection based on time window merging for recommender systems

Track 2: Security Track 3 3:45 PM - 4:45 PM, 07/31/2018 Room B
Session Chair: Katarzyna Wegrzyn-Wolska
• Ekaterina Volodina, Adnan Aziz, Erwin Rathgeb and Tobias Hossfeld. Application of Visual Analysis to Detect and Analyze Patterns in VoIP Attack Traffic
• Li Qiang, Jiang Zhengwei, Yang Zeming, Liu Baoxu, Wang Xin and Zhang Yunan. A Quality Evaluation Method of Cyber Threat Intelligence in User Perspective
• Reza M. Parizi, Ali Dehghantanha and Kim Kwang Raymond Choo. Towards Better Ocular Recognition for Secure Real-World Applications
• Pengfei Wang, Fengyu Wang, Zhenzhong Cao and Fengbo Lin. Identifying Peer-to-Peer Botnets through Periodicity Behavior Analysis

Track 2: Security Track 4 4:45 PM - 5:45 PM, 07/31/2018 Room B
Session Chair: Katarzyna Wegrzyn-Wolska
• Yang Lu, Richard Sinnott and Karin Verspoor. Semantic-based Policy Composition for Privacy-demanding Data Linkage
IoT Systems • Yiwen Gao, Wei Cheng, Hailong Zhang and Yongbin Zhou. Cache-Collision Attacks on GPU-based AES Implementation with Electro-Magnetic Leakages
• Hui Xie, Kun Lv and Changzhen Hu. An Improved Monte Carlo Graph Search Algorithm for Optimal Attack Path Analysis
• Devu Manikantan Shila and Emeka Eyisi. Adversarial Gait Detection On Mobile Devices Using Recurrent Neural Networks

Track 2: Security Track 5 8:00 AM – 9:00 AM, 08/01/2018 Room B
Session Chair: Gerard Memmi
• Zijun Yu, Chun Shan, Limin Mao, Changzhen Hu and Wenjie Xiong. Software system representation methods based on algebraic component
• Liting Yu, Dongrong Zhang, Liang Wu, Shuguo Xie, Donglin Su and Xiaoxiao Wang. AES Design Improvements Towards Information Security Considering Scan Attack
• Wei Zhang, Dongdai Lin, Hailong Zhang, Xiaojun Zhou, Yiwen Gao and Cong Chen. A Lightweight Multi-Precision Squaring on Embedded Processors for ECC
• Zhenya Chen, Weifeng Liu, Ying Yang, Jizhi Wang, Meng Guo, Lijuan Chen, Guang Yang and Jie Zhou. Electronic Evidence Service Research in Cloud Computing Environment

Track 2: Security Track 6 11:15 AM – 12:15 AM, 08/01/2018 Room B
Session Chair: Gerard Memmi
• Shuang Wei, Shuaifu Dai, Xinfeng Wu and Xinhui Han. STDC:A SDN-Oriented Two-Stage DDoS Detection and Defence System Based on Clustering
• Julian Schütte and Gerd Brost. LUCON: Data Flow Control for Message-Based IoT Systems
• Jiarong Wang, Lijun Cai, Aimin Yu, Min Zhu and Dan Meng. TempatMDS: A Masquerade Detection System Based on Temporal and Spatial Analysis of File Access Records
• Shao-Chien Chen, Yi-Ruei Chen and Wen-Guey Tzeng. Effective Botnet Detection Through Neural Networks on Convolutional Features

Track 2: Security Track 7 3:45 PM – 4:45 PM, 08/01/2018 Room B
Session Chair: Andrea Tagarelli
• Talal Halabi, Martine Bellaiche and Adel Abusitta. Online Allocation of Cloud Resources based on Security Satisfaction
• Katarzyna Kapusta and Gerard Memmi. Enhancing data protection with a structure-wise fragmentation and dispersal of encrypted data
• Sumit Kumar Tetarave, Somanath Tripathy, Ezhil Kalaimannan and Caroline John. eBot: Approach towards modeling an advanced P2P Botnet
• Huikang Cao, Ruixuan Li, Wenlong Tian, Zhiyong Xu and Weijun Xiao. A Practical Accountability Scheme for Oblivious RAM in Cloud Storage

Track 2: Security Track 8 4:45 PM – 5:45 PM, 08/01/2018 Room A
Session Chair: Dale Lindskog
• Nour El Madhoun, Emmanuel Bertin and Guy Pujolle. For Small Merchants: A Secure Smartphone-Based Architecture to Process and Accept NFC Payments
• Noboru Kunihiro, Wen-Jie Lu, Takashi Nishide and Jun Sakuma. Outsourced Private Function Evaluation with Privacy Policy Enforcement
• Fabrizio Biondi, Thomas Given-Wilson and Axel Legay. Universal Optimality of Apollonian Cell Encoders
• Firas Saidi, Zouheir Trabelsi and Henda Ben Ghezala. An Evidential Clustering Based Framework for Cyber Terrorist Cells Topology Identification

Track 2: Security Track 9 4:45 PM – 5:45 PM, 08/01/2018 Room B
Session Chair: Andrea Tagarelli
• Nilesh Chakraborty, Shreya Singh and Samrat Mondal. On Designing a Questionnaire Based Honeyword Generation Approach for Achieving Flatness
• Hatem Ismail, Stefanie Roos and Neeraj Suri. A Composite Malicious Peer Eviction Mechanism for Super-P2P Systems
• Filipe Apolinário, Miguel L. Pardal and Miguel Correia. S-Audit: Efficient Data Integrity Verification for Cloud Storage
• Zechun Cao and Shou-Hsuan Stephen Huang. Detecting Intruders and Preventing Hackers from Evasion by Tor Circuit Selection

Track 2: Security Track 10 8:00 AM – 9:00 AM, 08/02/2018 Room A
Session Chair: Andrea Tagarelli
• Iakovos Gurulian, Konstantinos Markantonakis, Eibe Frank and Raja Naeem Akram. Good Vibrations: Artificial Ambience-Based Relay Attack Detection
• Stephen Adams, Bryan Carter, Cody Fleming and Peter A Beling. Selecting System Specific Cyber-Security Attack Patterns using Topic Modeling
• William Ledbetter, William Glisson, Todd McDonald, Todd Andel, George Grispos and Kim-Kwang Raymond Choo. Digital Blues: An Investigation into the Use of Bluetooth Protocols
• Meera Sridhar, Abhinav Mohanty, Fadi Yilmaz, Vasant Tendulkar and Kevin W. Hamlen. Inscription: Thwarting ActionScript Web Attacks From Within

Track 2: Security Track 11 8:00 AM – 9:00 AM, 08/02/2018 Room B
Session Chair: Xiangjian He
• George Clark, Michael Doran and William Glisson. A Malicious Attack on the Machine Learning Policy of a Robotic System
• Hidehito Gomi, Shuji Yamaguchi, Kota Tsubouchi and Naomi Sasaya. Continuous Authentication System Using Online Activities
• Mehdi Nobakht, Yulei Sui, Aruna Seneviratne and Wen Hu. Permission Analysis of Health and Fitness Apps in IoT Programming Frameworks
• Taku Noguchi and Mayuko Hayakawa. Black Hole Attack Prevention Method Using Multiple RREPs in Mobile Ad Hoc Networks

Track 2: Security Track 12 10:15 AM – 11:15 AM, 08/02/2018 Room A
Session Chair: Andrea Tagarelli
• Tong Liu, Gang Shi, Liwei Chen, Jihu Zhang, Fei Zhang and Yaxuan Yang. TMDFI: Tagged Memory Assisted for Fine-grained Data-Flow Integrity towards Embedded Systems against Software Exploitation
• A. S. M. Kayes, Wenny Rahayu, Tharam Dillon and Elizabeth Chang. Accessing Data from Multiple Sources Through Context-Aware Access Control
• Chunhua Li, Weirui Xie and Ke Zhou. Efficient Binary-Encoding Policy Combination for Large-Scale Collaborative Scenarios
• Luís Sacramento, Ibéria Medeiros, João Bota and Miguel Correia. FlowHacker: Detecting Unknown Network Attacks in Big Traffic Data using Network Flows

Track 2: Security Track 13 10:15 AM – 11:15 AM, 08/02/2018 Room B
Session Chair: Xiangjian He
• Hooman Alavizadeh, Julian Jang-Jaccard and Dong Seong Kim. Evaluation for Combination of Shuffle and Diversity on Moving Target Defense Strategy for Cloud Computing
• Dilli Prasad Sharma, Dong Seong Kim, Seunghyun Yoon, Hyuk Lim, Jin-Hee Cho and Terrence J. Moore. FRVM: Flexible Random Virtual IP Multiplexing in Software-Defined Networking
• Simon Yusuf Enoch, Jin Hong and Dong Seong Kim. Time Independent Security Analysis for Dynamic Networks using Graphical Security Models
• Andrea Saracino, Fabio Martinelli and Francesco Restuccia. Practical Location Validation in Participatory Sensing Through Mobile WiFi Hotspots

Track 2: Security Track 14 10:15 AM – 11:15 AM, 08/02/2018 Room C
Session Chair: Toru Nakanishi
• Imine Youcef, Djamel-Eddine Kouicem, Ahmed Lounis and Abdelmadjid Bouabdallah. MASFOG: An Efficient Mutual Authentication Scheme For Fog Computing Architecture
• Zechao Liu, Zoe L. Jiang, Xuan Wang, S. M. Yiu, Ruoqing Zhang and Yulin Wu. A Temporal and Spatial Constrained Attribute-Based Access Control Scheme for Cloud Storage
• Judong Bao, Yongqiang He and Weiping Wen. DroidPro: An AOTC-based Bytecode-Hiding Scheme for Packing the Android Applications
• Rocio Lopez Perez, Florian Adamsky, Ridha Soua and Thomas Engel. Machine Learning for Reliable Network Attack Detection in SCADA Systems

Track 2: Security Track 15 11:15 AM – 12:15 AM, 08/02/2018 Room A
Session Chair: Noboru Kunihiro
• Jeffery Garae, Ryan K. L. Ko and Mark Apperley. A Full-Scale Security VIsualization Effectiveness Measurement and Presentation Approach
• Eric Klieme, Christian Tietz and Christoph Meinel. Beware of SMOMBIES: Verification of Users based on Activities while Walking
• Samir G. Sayed and Mohamed Shawkey. Data Mining Based Strategy for Detecting Malicious PDF Files
• Glaidson Menegazzo Verzeletti, Emerson Ribeiro de Mello and Michelle Silva Wangham. A National Mobile Identity Management Strategy for Electronic Government Services

Track 2: Security Track 16 11:15 AM – 12:15 AM, 08/02/2018 Room B
Session Chair: Junjie Zhang
• Nisha Malik, Priyadarsi Nanda, Arushi Arora, Deepak Puthal and Xiangjian He. Blockchain Based Secured Identity Authentication and Expeditious Revocation Framework for vehicular Networks
• Xiehua Li, Jie Jiang and Yichen Chen. Fully Decentralized Authentication and Revocation Scheme in Data Sharing Systems
• Menghao Zhang, Jun Bi, Jiasong Bai and Guanyu Li. FloodShield: Securing the SDN Infrastructure Against Denial-of-Service Attacks
• Wei Zhang, Dongdai Lin, Hailong Zhang, Xiaojun Zhou and Yiwen Gao. A Lightweight FourQ primitive on ARM Cortex-M0

Track 2: Security Track 17 11:15 AM – 12:15 AM, 08/02/2018 Room C
Session Chair: Wuxu Peng
• Danjun Liu, Jingyuan Wang, Zelin Rong, Xianya Mi, Fangyu Gai, Yong Tang and Baosheng Wang. Pangr: A Behavior-based Automatic Vulnerability Detection and Exploitation Framework
• Xiang Liu, Jie Huang and Guowen Zong. Public Auditing for Network Coding Based Secure Cloud Storage
• Syed Rizvi, Abdul Razaque and Joseph Gualdoni. Securing Wireless Sensor Networks from Sinkhole and Sybil Attacks Using Secure Data Aggregation Protocol
• Wang Qiwen, Jiang Jianguo, Shi Zhixin, Wang Wen, Lv Bin, Qi Biao and Yin Qilei. A novel multi-source fusion model for known and unknown attack scenarios

Track 2: Security Track 18 11:15 AM – 12:15 AM, 08/02/2018 Room D
Session Chair: Hidehito Gomi
• Guolin Tan, Peng Zhang, Qingyun Liu, Xinran Liu, Chunge Zhu and Fenghu Dou. Adaptive Malicious URL Detection Learning in the Presence of Concept Drift
• Liya Su, Yepeng Yao, Ning Li, Junrong Liu, Zhigang Lu and Baoxu Liu. Hierarchical Clustering Based Network Traffic Data Reduction for Improving Suspicious Flow Detection
• Biao Qi, Jianguo Jiang, Zhixin Shi, Rui Mao and Qiwen Wang. BotCensor: Detecting DGA-Based Botnet Using Two-Stage Anomaly Detection
• Guang Yang, Lijun Cai, Aimin Yu and Dan Meng. A General and Expandable Insider Threat Detection System through the Baseline Anomaly Detection and Scenario-driven Alarm Filters

Track 2: Security Track 19 2:30 PM – 3:30 PM, 08/02/2018 Room A
Session Chair: Noboru Kunihiro
• Satsuya Ohata, Takahiro Matsuda and Kanta Matsuura. Provably Secure Password Reset Protocol: Model, Definition, and Construction
• Xiang Tian, Yujia Zhu, Zhao Li, Chao Zheng, Yong Sun and Qingyun Liu. VegaStar: An Illegal Domain Detection System on Large-scale Video Traffic
• Rudrapatna Shyamasundar. An Experimental Flow Secure File System
• Danjun Liu, Yao Li, Yong Tang, Baosheng Wang and Wei Xie. VMPBL: Identifying Vulnerable Functions based on Machine Learning Combining Patched Information and Binary Comparison Technique by LCS

Track 2: Security Track 20 2:30 PM – 3:30 PM, 08/02/2018 Room B
Session Chair: Xiangjian He
• Anshul Arora and Sateesh Peddoju. NTPDroid: A Hybrid Android Malware Detector using Network Traffic and System Permissions
• Mohannad Mostafa, Tanushree Banerjee and M. Anwar Hasan. Energy Exhaustion Attack on Barrett’s Reduction
• Trusit Shah and Subbarayan Venkatesan. Authentication of IoT Device and IoT Server Using Secure Vaults
• Errin Fulp and Howard Gage. Using Feature Selection to Identify Chains of Insecure Software Configuration Parameters
• Nouha Oualha. Reinforcing IoT-Enforced Security Policies

Track 2: Security Track 21 4:45 PM – 5:45 PM, 08/02/2018 Room A
Session Chair: Junjie Zhang
• Ruichun Gu, Xiaolong Zhang, Lei Yu and Junxing Zhang. Enhancing Security and Scalability in Software Defined LTE Core Networks
• Jagannadh Vempati, Ram Dantu and Mark Thompson. Uninterrupted Video Surveillance in the Face of an Attack
• Linda Huang, Julia Jia, Emma Ingram and Wuxu Peng. Enhancing the Naive Bayes Spam Filter through Intelligent Text Modification Detect
• Junjie Hou, Yongxin Zhu, Linghe Kong, Zhe Wang, Sen Du, Shijin Song and Tian Huang. A Case Study of Accelerating Apache Spark with FPGA
• Hongjun Dai, Hongbo Chen and Meikang Qiu. A Multiple Layer Sercuriy Architecture for Internet of Things into MVC Design

Track 2: Security Track 22 8:00 AM – 9:00 AM, 08/03/2018 Room B
Session Chair: Wuxu Peng
• Kinza Sarwar, Sira Yongchareon and Jian Yu. Lightweight Elliptic Curve Cryptography and Fragile Zero-Watermarking based Scheme for Internet of Things Security
• Souad Najoua Lagmiri, Jamila El Alami and Noureddine El Alami. A Multimedia Encryption Algorithm based on Hyperchaotic Systems
• Kevin Atighehchi and Morgan Barbier Signature Renewal for Low Entropy Data

Track 2: Security Track 23 11:15 AM – 12:15 PM, 08/03/2018 Room B
Session Chair: Wuxu Peng
• Manmeet Singh Gill, Dale Lindskog and Pavol Zavarsky. Profiling Network Traffic Behavior for the purpose of Anomaly-based Intrusion Detection
• Xin Tang, Linna Zhou, Yongfeng Huang and Chin-Chen Chang, Efficient Cross-User Deduplication of Encrypted Data through Re-Encryption
• Gökhan Kul, Junh Upadhyaya and Varun Chandola, Detecting Data Leakage from Databases on Android Apps with Concept Drift

Track 3: Privacy Track 1 1:30 PM - 2:30 PM, 07/31/2018 Room C
Session Chair: Weitao Xu
• Wanli Xue, Yiran Shen and Wen Hu. Acies: A Privacy-Preserving System for Edge-based Classification
• Shuo Wang, Richard Sinnott and Surya Nepal. PAIRS: Privacy-Aware Identification and Recommendation of Spatio-Friends
• Boyang Wang and Xinxin Fan. Lightweight Verification for Searchable Encryption
• Peter Aaby, Juan Mata, Richard Macfarlane and William Buchanan. Privacy Parameter Variation using RAPPOR on a Malware Dataset

Track 3: Privacy Track 2 2:30 PM - 3:30 PM, 07/31/2018 Room C
Session Chair: Nour El Madhoun
• Martin Schanzenbach, Georg Bramm and Julian Schütte. reclaimID: Secure, Self-Sovereign Identities using Name Systems and Attribute-Based Encryption
• Ximeng Liu, Robert H. Deng, Yinghui Zhang, Kim-Kwang Raymond Choo and Yang Yang. PUSC: Privacy-Preserving User-Centric Skyline Computation over Multiple Encrypted Domains
• Vaibhav Kulkarni, Arielle Moro, Bertil Chapuis and Benoît Garbinato. Capstone: Mobility Modeling on Smartphones to Achieve Privacy by Design
• Shuo Wang, Richard Sinnott and Surya Nepal. P-GENT: Privacy-Preserving Geocoding of Non-Geotagged Tweets

Track 3: Privacy Track 3 3:45 PM - 4:45 PM, 07/31/2018 Room C
Session Chair: Weitao Xu
• Yuxiang Ma, Yulei Wu, Jingguo Ge and Jun Li. A Flow-Level Architecture for Balancing Accountability and Privacy
• Meng Liu, Priyadarsi Nanda, Xuyun Zhang, Chi Yang, Shui Yu and Jianxin Li. Asymmetric Commutative Encryption Scheme Based Efficient Solution to the Millionaires' Problem
• Clemens Zeidler and Muhammad Rizwan Asghar. AuthStore: Password-based Authentication and Encrypted Data Storage in Untrusted Environments
• Rocco Salvia, Pietro Ferrara, Fausto Spoto and Agostino Cortesi. SDLI: Static Detection of Leaks across Intents

Track 3: Privacy Track 4 4:45 PM - 5:45 PM, 07/31/2018 Room C
Session Chair: Weitao Xu
• Zijun Yu, Chun Shan, Limin Mao, Changzhen Hu and Wenjie Xiong. Software system representation methods based on algebraic component
• Liting Yu, Dongrong Zhang, Liang Wu, Shuguo Xie, Donglin Su and Xiaoxiao Wang. AES Design Improvements Towards Information Security Considering Scan Attack
• Lal Hussain, Wajid Aziz, Sharjil Saeed, Saima Rathore and Muhammad Rafique. Automated Breast Cancer Detection using Machine Learning Techniques by Extracting Different Feature Extracting Strategies
• Minyi Lu, Jiaming Xu, Ao Fan and Weiwei Shan. A Compact, Lightweight and Low-Cost 8-bit Datapath AES Circuit for IoT Applications in 28nm CMOS

Track 3: Privacy Track 5 8:00 AM – 9:00 AM, 08/01/2018 Room C
Session Chair: Weitao Xu
• Yun Feng, Baoxu Liu, Xiang Cui, Chaoge Liu, Xuebin Kang and Junwei Su. A Systematic Method on PDF Privacy Leakage Issues
• Yi Qin and Chuan Yue. Website Fingerprinting by Power Estimation Based Side-Channel Attacks on Android 7
• Felix Beierle. Do You Like What I Like? Similarity Estimation in Proximity-based Mobile Social Networks
• Fadi Mohsen, Hamed Abdelhaq, Halil Bisgin, Andrew Jolly and Michael Szczepanski. Countering Intrusiveness Using New Security-Centric Ranking Algorithm Built On Top of Elasticsearch

Track 3: Privacy Track 6 11:15 AM – 12:15 AM, 08/01/2018 Room C
Session Chair: Nour El Madhoun
• Oksana Kulyk, Peter Mayer, Oliver Käfer and Melanie Volkamer. A Concept and Evaluation of Usable and Fine-Grained Privacy-Friendly Cookie Settings Interface
• Haibat Khan, Benjamin Dowling and Keith M. Martin. Highly Efficient Privacy-Preserving Key Agreement for Wireless Body Area Networks
• Yang Wang, Stephen Adams, Peter Beling, Steven Greenspan, Sridhar Rajagopalan, Maria Velez-Rojas, Serge Mankovski, Steven Boker and Donald Brown. Privacy Preserving Distributed Deep Learning and its Application in Credit Card Fraud Detection
• Yang Lu, Richard Sinnott, Karin Verspoor and Udaya Parampalli. Privacy-Preserving Access Control in Electronic Health Record Linkage

Track 3: Privacy Track 7 3:45 PM – 4:45 PM, 08/01/2018 Room C
Session Chair: Nour El Madhoun
• Muhammad Arif, Guojun Wang and Tao Peng. Track me if you can? Query Based Dual Location Privacy in VANETS for V2V and V2I Communication
• Runhua Xu, Balaji Palanisamy and James Joshi. QueryGuard: Privacy-preserving Latency-aware Query Optimization for Edge Computing
• Zheng He, Shiran Pan and Dongdai Lin. PMDA: Privacy-Preserving Multi-functional Data Aggregation without TTP in Smart Grid
• Zheng Wang. Understanding the Performance and Challenges of DNS Query Name Minimization

Track 3: Privacy Track 8 4:45 PM – 5:45 PM, 08/01/2018 Room C
Session Chair: Kim-Kwang Raymond Choo
• Fuwen Liu, Jin Peng and Min Zuo. Toward a secure access to 5G network
• Chunkai Zhang, Ao Yin, Yulin Wu, Yingyang Chen and Xuan Wang. Fast Time Series Discords Detection With Privacy Preserving
• Toru Nakanishi and Takeshi Kanatani. An Efficient Blacklistable Anonymous Credential System with Reputation Using Pairing-based Accumulator
• Keke Gai, Yulu Wu, Liehuang Zhu and Meikang Qiu. Privacy-Preserving Data Synchronization Using Tensor-based Fully Homomorphic Encryption

Track 3: Privacy Track 9 8:00 AM – 9:00 AM, 08/02/2018 Room C
Session Chair: Toru Nakanishi
• Thomas Lenz and Vesna Krnjic. Towards Domain-Specific and Privacy-Preserving Qualified eID in a User-Centric Identity Model
• Bin Li and Yijie Wang. RZKPB: A Privacy-preserving Blockchain-Based Fair Transaction Method for Sharing Economy
• Jinpei Yan, Yong Qi, Qifan Rao and Saiyu Qi. Towards A User-friendly and Secure Hand Shaking Authentication for Smartphones
• Zhenyu Chen, Yanyan Fu, Min Zhang, Zhenfeng Zhang and Hao Li. A Flexible Mix-zone Selection Scheme Towards Trajectory Privacy Protection
• Wesam Fadheel, Raed Salih and Leszek Lilien. PHeDHA: Protecting Healthcare Data in Health Information Exchanges with Active Data Bundles

Track 4: Forensics and Analytics Track 1 1:30 PM - 2:30 PM, 07/31/2018 Room D
Session Chair: Kim-Kwang Raymond Choo
• Dimaz Ankaa Wijaya, Joseph Liu, Ron Steinfeld and Dongxi Liu. Monero Ring Attack: Recreating Zero Mixin Transaction Effect
• Manoranjan Mohanty, Ming Zhang, Muhammad Rizwan Asghar and Giovanni Russello. PANDORA: Preserving Privacy in PRNU-Based Source Camera Attribution
• Wenjuan Li, Weizhi Meng, Yu Wang, Lam For Kwok and Rongxing Lu. Identifying Passive Message Fingerprint Attacks via Honey Challenge in Collaborative Intrusion Detection Networks
• Tilo Fischer. Testing Cryptographically Secure Pseudo Random Number Generators with Artificial Neural Networks

Track 4: Forensics and Analytics Track 2 2:30 PM - 3:30 PM, 07/31/2018 Room D
Session Chair: Kim-Kwang Raymond Choo
• Xulyu Zhu, Zheng Yan, Jianfei Ruan, Qinghua Zheng and Bo Dong. IRTED-TL: An Inter-Region Tax Evasion Detection Method based on Transfer Learning
• Liangfu Lu, Xinhe Zhu, Xuyun Zhang, Junhan Liu, Md Zakirul Alam Bhuiyan and Guangtai Cui. One Intrusion Detection Method Based On Uniformed Conditional Dynamic Mutual Information
• Kay Michel, Marco Carvalho, Heather Crawford and Albert Esterline. Cyber Identity: Salient Trait Ontology and Computational Framework to aid in solving Cybercrime

Track 4: Forensics and Analytics Track 3 3:45 PM - 4:45 PM, 07/31/2018 Room D
Session Chair: Kim-Kwang Raymond Choo
• Aditya K, Slawomir Grzonkowski and Nhienan Lekhac. Enabling Trust in Deep Learning Models: A Digital Forensics Case Study
• Tina Wu and Andrew Martin. Bluetooth Low Energy used for Memory Acquisition from Smart Health Care Devices
• Viacheslav Voronin, Evgenii Semenishchev, Svetlana Tokareva and Sos Agaian. Algorithm For Forensic Thermal Image Enhancement Using Local And Global Logarithmic Transform Histogram Matching

Track 4: Forensics and Analytics Track 4 4:45 PM - 5:45 PM, 07/31/2018 Room D
Session Chair: Fadi Mohsen
• Hongbin Liu, Ming Xu, Yiming Wu, Ning Zheng, Yuanfang Chen and Md Zakirul Alam Bhuiyan. Resilient Bipartite Consensus for Multi-Agent Networks with Antagonistic Interactions
• Cheng Guo, Xinyu Tang, Yuanfang Chen, Pengxu Tain and Alam Bhuiyan Md Zakirul. An Efficient Distributed Approach on High Dimensional Data Similarity Searchable Encryption
• Aaron Koehl. Autoblog Forensics and Attribution

Track 5: Emerging Tech Track 1 8:00 AM - 9:00 AM, 08/01/2018 Room D
Session Chair: Toru Nakanishi
• Peter Mell. Managed Blockchain Based Cryptocurrencies with Consensus Enforced Rules and Transparency
• Yuyin Qian, Peng Zeng, Zuming Shen and Kim-Kwang Raymond Choo. A Lightweight Path Authentication Protocol for RFID-based Supply Chains
• Saqib Ali, Guojun Wang, Bebo White and Roger Leslie Cottrell. A Blockchain-based Decentralized Data Storage and Access Framework for PingER
• Huangjie Zheng, Yuchen Wang, Chen Han, Fangjie Le, Ruan He and Jialiang Lu. Learning and Utilizing Ontology with Machine Learning in Attack Detection

Track 5: Emerging Tech Track 2 11:15 AM - 12:15 AM, 08/01/2018 Room D
Session Chair: Nour El Madhoun
• Changli Zhou, Tian Wang, Wenxian Jiang and Hui Tian. Practical K Nearest Neighbor Query Scheme with Two-party Guarantees in Road Networks
• Marcos Simplicio, Eduardo Cominetti, Harsh Kupwade Patil, Jefferson Ricardini, Leonardo Ferraz and Marcos Silva. A privacy-preserving method for temporarily linking/revoking pseudonym certificates in VANETs
• Mohammad Jabed Morshed Chowdhury, Alan Colman, Jun Han, Muhammad Ashad Kabir and Paul Sarda. Blockchain as a Notarization Service for Data Sharing on Personal Data Store (PDS)
• Peter T. Breuer, Jonathan Bowen, Esther Palomar and Zhiming Liu. Superscalar Encrypted RISC: Measure of a Secret Computer

Track 5: Emerging Tech Track 3 3:45 PM - 4:45 PM, 08/01/2018 Room D
Session Chair: Satsuya Ohata
• Freya Sheer Hardwick, Raja Naeem Akram and Kostas Markantonakis. Fair and Transparent Blockchain based Tendering Framework - A Step Towards Open Governance
• Mohammad Jabed Morshed Chowdhury, Alan Colman, Jun Han, Ashad Kabir and Paul Sarda. Blockchain versus Database: A Critical Analysis
• Xinbo Liu, Yaping Lin, Qin Liu and Xin Yao. A Privacy-Preserving Principal Component Analysis Outsourcing Framework
• Ji Huang, Pei Wang, Tianning Zang, Qian Qiang, Yipeng Wang and Miao Yu. Detecting Domain Generation Algorithms With Convolutional Neural Language Models

Track 5: Emerging Tech Track 4 4:45 PM - 5:45 PM, 08/01/2018 Room D
Session Chair: Taku Noguchi
• Bin Li, Yijie Wang, Peichang Shi, Huan Chen and Li Cheng. FPPB: A Fast and Privacy-preserving Method Based on the Permissioned Blockchain for Fair Transactions in Sharing Economy
• Anastasia Theodouli, Stelios Arakliotis, Konstantinos Moschou, Konstantinos Votis and Dimitrios Tzovaras. On the design of a Blockchain-based system to facilitate Healthcare Data Sharing
• James Tapsell, Raja Naeem Akram and Konstantinos Markantonakis. Consumer Centric Data Control, Tracking and Transparency -- A Position Paper
• Qin Liu, Shuyu Pei, Kang Xie, Jie Wu, Tao Peng and Guojun Wang. Achieving Secure and Effective Search Services in Cloud Computing

Track 5: Emerging Tech Track 5 8:00 AM - 9:00 AM, 08/02/2018 Room D
Session Chair: Noboru Kunihiro
• Yizhi Ren, Mengjin Jiang, Ye Yao, Ting Wu, Zhen Wang, Mengkun Li and Kim-Kwang Raymond Choo. Node Immunization in Networks with Uncertainty
• Zhiju Yang, Rui Zhao and Chuan Yue. Effective Mobile Web User Fingerprinting via Motion Sensors
• Andreas Abraham, Kevin Theuermann and Emanuel Kirchengast. Qualified eID Derivation into a Distributed Ledger (DL) based IdM System
• Chao Yang, Xinghe Chen, Tingting Song, Bin Jiang and Qin Liu. A hybrid recommendation algorithm based on heuristic similarity and trust measure
• Jiaqi Chen, Fan Zhang and Lei Zou. SPARQL Multi-Query Optimization

Track 5: Emerging Tech Track 6 10:15 AM - 11:15 AM, 08/02/2018 Room D
Session Chair: Noboru Kunihiro
• Feipeng Yan, Ming Xu, Tong Qiao, Ting Wu, Xue Yang, Ning Zheng and Kim-Kwang Raymond Choo. Identifying WeChat Red Packets and Fund Transfers via Analyzing Encrypted Network Traffic
• Nicholas Mata, Nicole Beebe and Kim-Kwang Raymond Choo. Are Your Neighbors Swingers or Kinksters? Feeld App Forensic Analysis
• Taylor Cloyd, Trey Osborn, Brian Ellingboe, William Glisson and Kim-Kwang Raymond Choo. Browser Analysis of Residual Facebook Data
• Arnoud Goudbeek, Kim-Kwang Raymond Choo and Nhien An Le Khac. A Forensic Investigation Framework for Smart Home Environment

Track 6: Hardware Security Track 1 2:30 PM - 3:30 PM, 08/02/2018 Room C
Session Chair: Weiwei Shan
• Mingfu Xue, Rongzhen Bian, Jian Wang and Weiqiang Liu. A Co-Training based Hardware Trojan Detection Technique by Exploiting Unlabeled ICs and Inaccurate Simulation Models
• Rongzhen Bian, Mingfu Xue and Jian Wang. Building Trusted Golden Models-free Hardware Trojan Detection Framework Against Untrustworthy Testing Parties Using A Novel Clustering Ensemble Technique
• Minyi Lu, Jiaming Xu, Ao Fan and Weiwei Shan. A Compact, Lightweight and Low-Cost 8-bit Datapath AES Circuit for IoT Applications in 28nm CMOS
• Jiaming Xu, Minyi Lu, Ao Fan and Weiwei Shan. Differential Power Analysis of 8-bit Datapath AES for IoT applications
• Shenghua Chen, Wei Ge, Jinjiang Yang, Bo Liu and Jun Yang. A Power Analysis Attack Countermeasure Based on Random Execution

Track 6: Hardware Security Track 2 2:30 PM - 3:30 PM, 08/02/2018 Room D
Session Chair: Anasse Bari
• Feipeng Yan, Ming Xu, Tong Qiao, Ting Wu, Xue Yang, Ning Zheng and Kim-Kwang Raymond Choo. Identifying WeChat Red Packets and Fund Transfers via Analyzing Encrypted Network Traffic
• Nicholas Mata, Nicole Beebe and Kim-Kwang Raymond Choo. Are Your Neighbors Swingers or Kinksters? Feeld App Forensic Analysis
• Taylor Cloyd, Trey Osborn, Brian Ellingboe, William Glisson and Kim-Kwang Raymond Choo. Browser Analysis of Residual Facebook Data
• Arnoud Goudbeek, Kim-Kwang Raymond Choo and Nhien An Le Khac. A Forensic Investigation Framework for Smart Home Environment

IEEE TrustCom SHORT PAPERS

Track 1: Trust Track 3:45 PM - 4:45 PM, 08/02/2018 Room B
Session Chair: Anasse Bari
• James Obert, Adrian Chavez and Jay Johnson. Behavioral Based Trust Metrics and the Smart Grid
• Guoqiang Bai, Hailiang Fu, Wei Li and Xingjun Wu. Differential Power Attack on SM4 block cipher
• Salih Ergun. Cryptanalysis of a Chaotic Ring Oscillator Based Random Number Generator
• Markus Jäger, Stefan Nadschläger and Josef Küng. Concepts for Trust Propagation in Knowledge Processing Systems - A brief Introduction and Overview
• Ameneh Deljoo, Tom van Engers, Ralph Koning, Leon Gommans and Cees de Laat. Towards Trustworthy Information Sharing by Creating Cyber Security Alliances

Track 2: Security Track 1 3:45 PM - 4:45 PM, 08/02/2018 Room C
Session Chair: Satsuya Ohata
• Zhijun Wu, Qingbo Pan, Meng Yue and Shaopu Ma. An Approach of Security Protection for VSAT Network
• Amira Zrelli and Tahar Ezzedine. Monitoring of Temperature and Pressure through Brillouin Optical Sensors for Disasters Systems
• Sarvjot Kang, Dale Lindskog and Hamman Samuel. An Implementation of Hierarchical Intrusion Detection Systems Using Snort and Federated Databases
• Chaoqun Yang, Xiangyu Li and Shujuan Yin. Low-Cost Energy-Efficient Side-Channel Attacks Resistant AES S-box with Power-Aware Hiding Inverter in GF(2^4)
• Yin Huang, Wei Liang, Jing Long, Jianbo Xu and Kuan-Ching Li. A Novel Identity Authentication for FPGA based IP Designs

Track 2: Security Track 2 3:45 PM - 4:45 PM, 08/02/2018 Room D
Session Chair: Hidehito Gomi
• Sarika Choudhary and Dr. Nishtha Kesswani. Detection and Prevention of Routing Attacks in Internet of Things
• Rongxuan Ma, Wei Hu and Yonghao Wang. Low Delay and Low Cost Surveillance System for Audio via a New Optimum FIR Digtal Filter
• Syed Muhammad Sajjad and Muhammad Yousaf. UCAM: Usage, Communication and Access Monitoring Based Detection System for IoT Botnets
• Kihwan Kim and Hoonjae Lee. Proposal of multi-channel operation technique using PingPong256
• Gyan Singh Yadav and Aparajita Ojha. A Reversible Data Hiding Scheme with High Security and Improved Embedding Capacity

Track 2: Security Track 3 4:45 PM - 5:45 PM, 08/02/2018 Room C
Session Chair: Anasse Bari
• Hajredin Daku, Pavol Zavarsky and Yasir Malik. Behavioral-Based Classification and Identification of Ransomware Variants Using Machine Learning
• Jianguo Jiang, Qian Yu, Min Yu, Gang Li, Jiuming Chen, Kunying Liu, Chao Liu and Weiqing Huang. ALDD: A Hybrid Traffic-User Behavior Detection Method for Application Layer DDoS
• Mimouna Alkhonaini and Hoda El-Sayed. Migrating Data Between Physical Server and Cloud: Improving Accuracy And Data Integrity
• Nazmul Hossain, Md. Alam Hossain, Md. Zobayer Hossain, Md. Hasan Imam Sohag and Shawon Rahman. OAuth-SSO: A Framework to Secure the OAuth-based SSO Service for Packaged Web Applications
• Tanushree Banerjee and M. Anwar Hasan. Energy efficiency analysis of elliptic curve based cryptosystems

Track 2: Security Track 4 4:45 PM - 5:45 PM, 08/02/2018 Room D
Session Chair: Satsuya Ohata
• Kun Yang. An Analysis of Internet Backbone Traffic
• Daniel Tse, Xuan Weng, Xin Wan, Lan Yao and Wensong Zhang. Research on Information Security Perception of Sina Weibo Users Based on KISCAP Model
• Henry Okonofua and Shawon Rahman. Evaluating the Risk Management Plan and Addressing Factors for Successes in Government Agencies
• Ashwag Albakri, Lein Harn and Mahesh Maddumala. Hierarchical Polynomial-based Key Management Scheme in Fog Computing
• Nestori Syynimaa. Who would you like to be today? Impersonation by fake Azure Active Directory identity federation
• Bernd Troegeler and Paul Watters, Steganographic Transport Performance Analysis
• Kevin Atighehchi, On the Incremental Digital Signatures

Track 3: Privacy Track 10:15 AM - 11:15 AM, 08/03/2018 Room A
Session Chair: Junjie Zhang
• Kai-Cheng Liu, Chuan-Wei Kuo, Wen-Chiuan Liao and Pang-Chieh Wang. Optimized data de-identification using multidimensional k-anonymity
• Ebrima Ceesay, Erica Shuford, Tara Kavanaugh, Brian Ralph and Paul Watters. Detecting and Determining Security Problems with Third-Party Trackers
• Peter Mell, Assane Gueye and Christopher Schanzle. Quantifying Information Exposure in Internet Routing
• Shujie Cui, Sana Belguith, Pramodya De Alwis, Muhammad Rizwan Asghar and Giovanni Russello. Malicious Entities are in Vain: Preserving Privacy in Publish and Subscribe Systems
• Haotian Zhou, Xiao-Yang Liu, Cai Fu, Chen Shang and Xinyi Chang. Differentially Private Matrix Completion via Distributed Matrix Factorization

Track 1&3: Trust&Privacy Track 9:00 AM - 10:00 AM, 08/03/2018 Room A
Session Chair: Hidehito Gomi
• Daniel Tse, Ting-Pong Ly, Chung-Kin Chow, Chung-Yan Tong and Kwok-Wah Tam. The Challenges of Big Data Governance in Healthcare
• Jerzy Konorski. Double-Blind Reputation vs. Intelligent Fake VIP Attacks in Cloud-Assisted Interactions
• Soham Kelkar, Timothy Kraus, Daria Morgan, Junjie Zhang and Rui Dai. Analyzing HTTP-Based Information Exfiltration of Malicious Android Applications
• Cai Chen, Manyuan Zhang, Huanzhi Zhang, Zhenyun Huang and Yong Li. Privacy-preserving Sensory Data Recovery
• Sebastian Burkhart, Andreas Unterweger, Günther Eibl and Dominik Engel. Detecting Swimming Pools in 15-Minute Load Data

Track 4: Forensics and Analytics Track 11:15 AM - 12:15 PM, 08/03/2018 Room A
Session Chair: Junjie Zhang
• Yang Wei, Xiuli Bi and Bin Xiao. C2R Net: The Coarse to Refined Network for Image Forgery Detection
• Anping Xiong, Yi Huang, Yunsong Wu, Jun Zhang and Linbo Long. An Adaptive Sliding Window Algorithm for Mining Frequent Itemsets in Computer Forensics
• Xiaoning Liu, Xingliang Yuan and Joseph Liu. Towards Privacy-Preserving Forensic Analysis for Time-series Medical Data
• Yazeed Albabtain and Baijian Yang. The Process of Reverse Engineering GPU Malware and Provide Protection To GPUS
• Xiaoyu Du, Paul Ledwith and Mark Scanlon. Deduplicated Disk Image Evidence Acquisition and Forensically-Sound Reconstruction

Track 5: Emerging Tech Track 9:00 AM - 10:00 AM, 08/03/2018 Room B
Session Chair: Taku Noguchi
• Robert Bridges, Jarilyn Hernandez, Jeffrey Nichols, Katerina Goseva-Popstojanova and Stacy Prowell. Towards Malware Detection via CPU Power Consumption: Data Collection Design and Analytics
• Hossein Sayadi, Hosein Mohammadi Makrani, Onkar Randive, Sai Manoj P D, Setareh Rafatirad and Houman Homayoun. Customized Machine Learning-Based Hardware-Assisted Malware Detection in Embedded Devices
• Hyunkyung Yoo, Jongchoul Yim and Sunme Kim. The Blockchain for Domain based Static Sharding
• Hongyang Yang, Xiao-Yang Liu and Qingwei Wu. A Practical Machine Learning Approach for Dynamic Stock Recommendation
• Yangxin Wu, Peijia Zheng, Jianting Guo, Wei Zhang and Jiwu Huang. A Controllable Efficient Content Distribution Framework Based on Blockchain and ISODATA

Track 4&5: Forensics and Analytics&Emerging Tech Track 10:15 AM - 11:15 AM, 08/03/2018 Room B
Session Chair: Taku Noguchi
• Na Huang, Jingsha He and Nafei Zhu. A Novel Method for Detecting Image Forgery Based on Convolutional Neural Network
• Ashar Neyaz, Narasimha Shashidhar and Umit Karabiyik. Forensic Analysis of Wear Leveling on Solid-State Media
• Everton de Matos, Ramão Tiburski, Leonardo A. Amaral and Fabiano Hessel. Providing Context-Aware Security for IoT Environments Through Context Sharing Feature
• Usman Ahmad, Hong Song, Awais Bilal, Shahzad Saleem and Asad Ullah. Securing Insulin Pump System Using Deep Learning and Gesture Recognition

IEEE TrustCom POSTERS 3:30 PM - 3:45 PM, 08/01/2018 Room A
Session Chair: Fadi Mohsen
• Jitto Joseph, Ron Ruhl and Hamman Samuel. Reducing Traffic Congestion for Machine to Machine Type Communication over 4G-LTE Network by Decreasing Total Bytes Transmitted
• Lanlan Pan, Xuebiao Yuchi, Jian Wang and Anlei Hu. A Public Key based EDNS Privacy Tunnel for DNS
• Behrooz Sezari, Dietmar P. F. Möller and Andreas Deutschmann. Anomaly-based Network Intrusion Detection Model using Deep Learning in Airports

IEEE BigDataSE 2018

IEEE BigDataSE 1 3:45 PM - 4:45 PM, 08/02/2018 Room A
Session Chair: Taku Noguchi
• Kyriakos Kritikos. Towards Dynamic Big Data Placement
• Saptashwa Mitra, Sangmi Pallickara, Yu Qiu, Haley Moss and Kaigang Li. Effective Integration of Geotagged, Ancilliary Longitudinal Survey Datasets to Improve Adulthood Obesity Predictive Models
• Meng Wang, Chase Wu, Huiyan Cao, Yang Liu, Yongqiang Wang and Aiqin Hou. On MapReduce Scheduling in Hadoop Yarn on Heterogeneous Clusters
• Mohamed Adel Serhani, Hadeel El Kassabi, Nabeel Al-Qirim and Alramzana N. Navaz. Towards a Multi-Model for Cloud Workflow Resource Monitoring, Adaptation, and Prediction

IEEE BigDataSE 2 8:00 AM - 9:00 AM, 08/03/2018 Room A
Session Chair: Robert Bridges
• Anasse Bari and Goktug Saatcioglu. Ensemble-based sentiment analysis
• Mohammad Rashid. AMI Smart Meter Big Data Analytics for Time Series of Electricity Consumption
• Huihui Xie, Kun Lv and Changzhen Hu. An Effective Method to Generate Simulated Attack Data Based on Generative Adversarial Nets
• Hengyi Ren, Jian Guo, Lijuan Sun and Chong Han. Prediction Algorithm Based on Weather Forecast for Energy-Harvesting Wireless Sensor Networks
• Yibing Yang and M Omair Shafiq, Large scale and parallel sentiment analysis based on Label Propagation in Twitter Data

IEEE BigDataSE SHORT PAPERS 4:45 PM - 5:45 PM, 08/02/2018 Room B
Session Chair: James Obert
• Yu Zheng, Yongxin Zhu and Shijin Song. Improved weighted label propagation algorithm in social network computing
• Jinfeng Yang and David J.Lilja. Reducing Relational Database Performance Bottlenecks Using 3D XPoint Storage Technology
• Alaa Alsaig, Vangalur Alagar and Olga Ormandjieva. A Critical Analysis of the V-model of Big Data

IEEE SPTIoT 2018

IEEE SPTIoT 1 8:00 AM - 9:00 AM, 08/03/2018 Room C
Session Chair: Fadi Mohsen
• Shahrooz Pouryousef, Mariam Rezaiee and Ata Chizari. Let me join two worlds! Analysing the Integration of Web and Native Technologies in Hybrid Mobile Apps
• Jakub Klemsa, Lukáš Kencl and Tomáš Vaněk. VeraGreg: A Framework for Verifiable Privacy-Preserving Data Aggregation
• William Lidster and Shawon Rahman. Obstacles to Implementation of Information Security Governance

IEEE SPTIoT 2 9:00 AM - 10:00 AM, 08/03/2018 Room C
Session Chair: Anasse Bari
• William Lidster and Shawon Rahman. Emerging Approaches to Improve Malicious Activity Detection
• Qingqing Tan, Chong Han, Lijuan Sun, Jian Guo and Hai Zhu. CSI Frequency Domain Fingerprint-based Passive Indoor Human Detection
• Stephen Adams, Peter A Beling, Steve Greenspan, Maria Velez-Roja and Serge Mankovskii. Model-Based Trust Assessment for Internet of Things Networks

IEEE SPTIoT 3 10:15 AM - 11:15 AM, 08/03/2018 Room C
Session Chair: Anasse Bari
• Gianpiero Costantino, Antonio La Marra, Fabio Martinelli, Paolo Mori and Andrea Saracino. Privacy Preserving Distributed Attribute Computation for Usage Control in the Internet of Things
• Abdur Rahman Bin Shahid, Niki Pissinou, S.S. Iyengar and Kia Makki. Check-ins and Photos: Spatiotemporal Correlation-Based Location Inference Attack and Defense in Location-Based Social Networks

IEEE PSTCI 2018

IEEE PSTCI 1 8:00 AM - 9:00 AM, 08/03/2018 Room D
Session Chair: Xiaoyang Liu
• Paul Sarda, Mohammad Jabed Morshed Chowdhury and Alan Colman. Blockchain for Fraud Prevention: A Work-History Fraud Prevention System
• Alia Fatima, Usman Qamar and Aiman Khan Nazir. Incremental Wrapper based Random Forest Gene Subset Selection for Tumor Discernment
• Alia Fatima and Usman Qamar. Incremental Wrapper based Gene Subset Selection with replacement for Cancer Classification

IEEE PSTCI 2 9:00 AM - 10:00 AM, 08/03/2018 Room D
Session Chair: Fadi Mohsen
• Sudarshan Chawathe. Improving Email Security with Fuzzy Rules
• Sudarshan Chawathe. Monitoring Blockchains with Self-Organizing Maps
• Doyeon Kim, Dongil Shin and Dongkyoo Shin. Detection of unauthorized AP using machine learning algorithms for protection of information
• Cicek Guven, Mike Holenderski, Tanir Ozcelebi and Johan Lukkien. Using Artificial Neurons in Evidence Based Trust Computation

IEEE PSTCI 3 10:15 AM - 11:15 AM, 08/03/2018 Room D
Session Chair: Hidehito Gomi
• Muhammad Tayyab, Abid Khan, Mansoor Ahmed, Khizar Hameed and Junaid Haseeb. Geolocation Assurance of cloud data using a Lightweight Fingerprinting based approach
• Giovanni Di Crescenzo, Lisa Bahler, Brian Coan, Kurt Rohloff and Yuriy Polyakov. Intrusion-Resilient Classifier Approximations: from Wildcard Matching to Range Membership
• Hina Tufail, Kashif Zafar and Abdul Rauf Baig. Digital Watermarking for Relational Database Security using mRMR based Binary Bat Algorithm

IEEE HSAT 2018

IEEE HSAT 1 8:00 AM - 9:00 AM, 08/03/2018 Room E
Session Chair: Weiwei Shan
• Weiwei Shan, A tutorial of Side-channel-attack and Hardware Countermeasure of Encryption Circuit (Invited)
• Kento Hasegawa∗, Youhua Shi and Nozomu Togawa, Hardware Trojan Detection Utilizing Machine Learning Approaches (Invited talk)
• Aiguo Bu, Minyi Lu, Hao Cai and Weiwei Shan, Correlation-based Electromagnetic Analysis Attack Using Haar Wavelet Reconstruction with Low-pass Filtering on an FPGA Implementaion of AES

IEEE HSAT 2 9:00 AM - 10:00 AM, 08/03/2018 Room E
Session Chair: Weiwei Shan
• Jun Shi, Bo Lv, Yangyang Li, Yue Jia, Rui Wang, and Yong Liao, A New Wavelet Thresholding Method Based on Cyclostationarity for Enhancing the Interception of Computer Video Leakage Signals

IWCPSA18

IWCPSA18 11:15 AM - 12:15 PM, 08/03/2018 Room C
Session Chair: Fadi Mohsen
• Casimer Decusatis and Kulvinder Lotay. Secure, Decentralized Energy Resource Management using the Etherium Blockchain
• Xiaolin Zhao, Yiman Zhang, Xuhui Li and Quanbao Chen. Research on Malicious Code Homology Analysis Method Based on Texture Fingerprint Clustering
• Salem Benferhat. The Active-OrBAC
• Vladimir Marbukh. On Mitigation Inefficiency of Selfish Investment in Network Recovery from High Loss SIS Infection

WCSF18

WCSF18 11:15 AM - 12:15 PM, 08/03/2018 Room D

• Maximilian Uphoff, Matthäus Wander, Torben Weis and Marian Waltereit. SecureCloud: An Encrypted, Scalable Storage for Cloud Forensics
• Tina Wu. Acquiring the Memory of Smart Health Devices Using Bluetooth Low Energy
• Bagus Hanindhito, Fariz Azmi Pratama and Ulfah Nadiya. Rapid Evidence Remote Acquisition in High-Availability Server and Storage System for Digital Forensic to Unravel Academic Crime
• John Sheppard. Cloud Investigations of Illegal IPTV Networks