Program

Important Notice: This year the IEEE BigDataSecurity/HPSC/IDS/SmartCloud will be a hybrid conference, due to the visa and virus considerations. For all participants, please do notice all the time mentioned in this booklet is based on time zone New York (UTC-4).

Hybrid Conference Plans: The opening session, keynote speech, talks, and awards will be held onsite. We will also broadcast online at real-time in our conference room link (coming soon).


The program schedule of IEEE BigDataSecurity/HPSC/IDS/SmartCloud is as follows:

Friday, May, 10th, 2024 (New York Time)

Conference Room Room A Room B
9:00 – 9:45 Conference Registration
9:45 – 10:00 Opening
10:00 – 10:50 Keynote (Ling Liu)
10:50 – 11:00 Award Ceremony
11:00 – 11:15 Coffee Break
11:15 – 12:15 BDS 1 HPSC 1
12:15 – 13:00 Lunch
13:00 – 14:00 BDS 2 SC 1
14:00 – 15:00 Coffee Break
15:00 – 15:30 BDS 3 IDS 1
15:30 – 16:30 BDS 4 SC 2
16:30 – 17:30 SC 3 SC 4
17:30 – 20:00 Banquet

Saturday, May 11th, 2024 (New York Time)

Conference Room Room A Room B
9:00 – 10:00 BDS 5 BDS 6
10:00 – 10:55 BDS 7 HPSC 2
10:55 – 11:05 Coffee Break
11:05 – 12:00 HPSC 3 HPSC 4
12:00 – 13:00 Lunch
13:00 – 14:00 SC 5 HPSC 5
14:00 – 15:00 IDS 2 IDS 3
15:00 – 15:30 Coffee Break
15:30 – 16:30 IDS 4

Sunday, May 12th, 2024 (New York Time)

10:00 – 12:00 Steering Committee Meeting
Adjourn
IEEE Bigdatasecurity 2024

BIGDATASECURITY 1: 05/10/2024, 11:15-12:15, Room A

  • Bhavani Thuraisingham, Kim Nimon and Latifur Khan.An Education Program for Big Data Security and Privacy.
  • Dongfeng Lv, Manman Ma, Hanxia Dong, Yishan Shang and Kuo Bao. Anomaly Detection in Multivariate Time Series with Contaminated Training Data Using VAE.
  • Zhouji Wang, Kui Li, Xinyue Lu and Wei Gong. A Low-Cost Positioning Beacon in Rail Transit System.
  • Shuyi Li, Xueyang Liu and Wenhui Hu.Test Case Recommendation for Blockchain Systems Based on Graph Convolutional Networks.

BIGDATASECURITY 2: 05/10/2024, 13:00-14:00, Room A

  • Wenjia Wang, Seyed Masoud Sadjadi and Naphtali Rishen. A Survey of Major Cybersecurity Compliance Frameworks.
  • Yingying Cai, Wenhui Hu and Xueyang Liu. User Dual Intents Graph Modeling for Information Diffusion Prediction.
  • Luxiu Yin, Wei Liang, Chun Wang, Qihui Huang and Xuanya Wang. Towards Privacy Protection: A Non-Invasive Human Detection Method via Edge-Cloud Collaboration.
  • Beihu Wu, Hao Tian, Xueyang Liu, Wenhui Hu, Chen Yang and Shuyi Li. Sarcasm Detection in Chinese and English Text with Fine-Tuned Large Language Models.

BIGDATASECURITY 3: 05/10/2024, 15:030-15:30, Room A

  • Xinyi Yang, Kaipei Li and Jie Tian. A Dance Emotion Recognition Method Based on Movement Analysis and Federated Learning in Edge-Cloud Hybrid Environments.
  • Yong Lin, Peng Jiang, Keke Gai and Liehuang Zhu. Exploiting Multi-Model Collaborative Inference for Privacy Enhancement in Text Classification.
  • Chen Yang, Shuyi Li, Xueyang Liu, Wenhui Hu, Beihu Wu and Hao Tian. Temporal Analysis and Prediction of Marriage Registration Figures Based on Long-Term Time Series Models.

BIGDATASECURITY 4: 05/10/2024, 15:30-16:30, Room A

  • Taolei Shi and Wei Gong. A Survey of Bluetooth Indoor Localization.
  • Fangming Jing, Yang Chen, Shuyi Li, Xueyang Liu and Wenhui Hu. Precision Assistance for residents with subsistence allowance: Cluster Analysis of Mixed-Type Data Based on k-prototypes.
  • Xiaohui Wei, Mengting Zhou, Nan Jiang and Hengshan Yue. Evaluating the Soft Error Resilience of Graph Applications on GPGPUs.
  • Shizhong Li, Ruonan Chen and Dawei Li. A Distributed Attribute-Based Proxy Re-Encryption Scheme for Data Sharing in IoT.
  • Jingnian Liu, Wei Liang, Yuxiang Chen and Kai Jin. SyNet:Medical image anomaly detection with noise synthesis network.
  • Xiangyun Qian, Rui Zhang, Zi Kang and Hui Xia. An Invisible Backdoor Attack on Cloud Computing in the Internet of Things.

BIGDATASECURITY 5: 05/11/2024, 9:00-10:00, Room A

  • Ming Chen, Sen Yang, Wenbo Dai, Zisheng Wang and Jun Xu. A Method for Anomaly Detection in Power Energy Topology Graph Data Based on Domain Knowledge Graph and Graph Neural Networks (GNN)
  • Wei Yu, Jianguo Qian, Ranyue Xu, Chenxing Jin, Haina Fang and Xianhai Shi. Improving Substation Network Security with DevSecOps and AIOps.
  • Zijun Wang, Hongchen Guo and Keke Gai. Decision Tree-based Privacy Protection in Federated Learning: A Survey.
  • Chen Jiang, Mengxian Chen, Huasen Xie, Hua Wang and Jun Xu. A Method for Anomaly Detection in Power Time Series Data within Energy Big Data Based on Generative Adversarial Networks.

BIGDATASECURITY 6: 05/11/2024, 9:00-10:00, Room B

  • Xintian Ren, Jun Wu and Hansong Xu. Diffusion Model Based Secure Semantic Communications with Adversarial Purification.
  • Mengyuan Zhang, Yingying Zhao and Yingjie Tian. Research on Production Capacity Utilization Index Based on Electricity Big Data.
  • Chai Haozhe and Wu Jun. Sound-LDR Sensors Empowered Secure True Random Number Generator for PoS Consensus in Blockchain.
  • Guohao Cui, Hao Wang, Wentao Hao and Xiaoyi Zhou. OT24: Optical color image encryption based on Two-dimensional quantum walks and 24-bit-plane permutation.

BIGDATASECURITY 7: 05/11/2024, 10:00-10:55, Room A

  • Yanlu Li, Yufeng Xiao, Yinyan Gong, Ronglin Zhang and Yingzi Huo. Explainable AI:A Way to Achieve Trustworthy AI.
  • Wenjing Xu, Haochen Liang, Lin Sun, Yulun Song and Yunlong Xie. A Blockchain-Based Identity Control Scheme for Cross-Organizational Data Sharing.
  • Chuangchuang Dai, Haodong Cheng, Lei Guan and Mingbo Chi. Industrial Internet of Things Identity Resolution Techniques: A Review.
  • Qianqian Pan and Jun Wu. AI-Finger: From Physical Unclonable Function to AI-Hardware Fingerprint.
  • Ranyue Xu, Wei Yu, Hao Huang, Yongchun Pan, Chen Zhou and Gang Zheng. Enhancing Cybersecurity in Power Substations through Active Immune Detection and Low-Load Network Security Risk Intelligence Platform.




sponsor  sponsor  sponsor  sponsor  sponsor  venuesponsor