Important Notice: This year the IEEE BigDataSecurity/HPSC/IDS/SmartCloud will be a hybrid conference, due to the visa and virus considerations. For all participants, please do notice all the time mentioned in this booklet is based on time zone New York (UTC-4).
Hybrid Conference Plans: The opening session, keynote speech, talks, and awards will be held onsite. We will also broadcast online at real-time in our conference room link (coming soon).
The program schedule of IEEE BigDataSecurity/HPSC/IDS/SmartCloud is as follows:
Friday, May, 10th, 2024 (New York Time)
Conference Room | Room A | Room B |
9:00 – 9:45 | Conference Registration | |
9:45 – 10:00 | Opening | |
10:00 – 10:50 | Keynote (Ling Liu) | |
10:50 – 11:00 | Award Ceremony | |
11:00 – 11:15 | Coffee Break | |
11:15 – 12:15 | BDS 1 | HPSC 1 |
12:15 – 13:00 | Lunch | |
13:00 – 14:00 | BDS 2 | SC 1 |
14:00 – 15:00 | Coffee Break | |
15:00 – 15:30 | BDS 3 | IDS 1 |
15:30 – 16:30 | BDS 4 | SC 2 |
16:30 – 17:30 | SC 3 | SC 4 |
17:30 – 20:00 | Banquet |
Saturday, May 11th, 2024 (New York Time)
Conference Room | Room A | Room B |
9:00 – 10:00 | BDS 5 | BDS 6 |
10:00 – 10:55 | BDS 7 | HPSC 2 |
10:55 – 11:05 | Coffee Break | |
11:05 – 12:00 | HPSC 3 | HPSC 4 |
12:00 – 13:00 | Lunch | |
13:00 – 14:00 | SC 5 | HPSC 5 |
14:00 – 15:00 | IDS 2 | IDS 3 |
15:00 – 15:30 | Coffee Break | |
15:30 – 16:30 | IDS 4 |
Sunday, May 12th, 2024 (New York Time)
10:00 – 12:00 | Steering Committee Meeting |
Adjourn |
IEEE Bigdatasecurity 2024
BIGDATASECURITY 1: 05/10/2024, 11:15-12:15, Room A
- Bhavani Thuraisingham, Kim Nimon and Latifur Khan.An Education Program for Big Data Security and Privacy.
- Dongfeng Lv, Manman Ma, Hanxia Dong, Yishan Shang and Kuo Bao. Anomaly Detection in Multivariate Time Series with Contaminated Training Data Using VAE.
- Zhouji Wang, Kui Li, Xinyue Lu and Wei Gong. A Low-Cost Positioning Beacon in Rail Transit System.
- Shuyi Li, Xueyang Liu and Wenhui Hu.Test Case Recommendation for Blockchain Systems Based on Graph Convolutional Networks.
BIGDATASECURITY 2: 05/10/2024, 13:00-14:00, Room A
- Wenjia Wang, Seyed Masoud Sadjadi and Naphtali Rishen. A Survey of Major Cybersecurity Compliance Frameworks.
- Yingying Cai, Wenhui Hu and Xueyang Liu. User Dual Intents Graph Modeling for Information Diffusion Prediction.
- Luxiu Yin, Wei Liang, Chun Wang, Qihui Huang and Xuanya Wang. Towards Privacy Protection: A Non-Invasive Human Detection Method via Edge-Cloud Collaboration.
- Beihu Wu, Hao Tian, Xueyang Liu, Wenhui Hu, Chen Yang and Shuyi Li. Sarcasm Detection in Chinese and English Text with Fine-Tuned Large Language Models.
BIGDATASECURITY 3: 05/10/2024, 15:030-15:30, Room A
- Xinyi Yang, Kaipei Li and Jie Tian. A Dance Emotion Recognition Method Based on Movement Analysis and Federated Learning in Edge-Cloud Hybrid Environments.
- Yong Lin, Peng Jiang, Keke Gai and Liehuang Zhu. Exploiting Multi-Model Collaborative Inference for Privacy Enhancement in Text Classification.
- Chen Yang, Shuyi Li, Xueyang Liu, Wenhui Hu, Beihu Wu and Hao Tian. Temporal Analysis and Prediction of Marriage Registration Figures Based on Long-Term Time Series Models.
BIGDATASECURITY 4: 05/10/2024, 15:30-16:30, Room A
- Taolei Shi and Wei Gong. A Survey of Bluetooth Indoor Localization.
- Fangming Jing, Yang Chen, Shuyi Li, Xueyang Liu and Wenhui Hu. Precision Assistance for residents with subsistence allowance: Cluster Analysis of Mixed-Type Data Based on k-prototypes.
- Xiaohui Wei, Mengting Zhou, Nan Jiang and Hengshan Yue. Evaluating the Soft Error Resilience of Graph Applications on GPGPUs.
- Shizhong Li, Ruonan Chen and Dawei Li. A Distributed Attribute-Based Proxy Re-Encryption Scheme for Data Sharing in IoT.
- Jingnian Liu, Wei Liang, Yuxiang Chen and Kai Jin. SyNet:Medical image anomaly detection with noise synthesis network.
- Xiangyun Qian, Rui Zhang, Zi Kang and Hui Xia. An Invisible Backdoor Attack on Cloud Computing in the Internet of Things.
BIGDATASECURITY 5: 05/11/2024, 9:00-10:00, Room A
- Ming Chen, Sen Yang, Wenbo Dai, Zisheng Wang and Jun Xu. A Method for Anomaly Detection in Power Energy Topology Graph Data Based on Domain Knowledge Graph and Graph Neural Networks (GNN)
- Wei Yu, Jianguo Qian, Ranyue Xu, Chenxing Jin, Haina Fang and Xianhai Shi. Improving Substation Network Security with DevSecOps and AIOps.
- Zijun Wang, Hongchen Guo and Keke Gai. Decision Tree-based Privacy Protection in Federated Learning: A Survey.
- Chen Jiang, Mengxian Chen, Huasen Xie, Hua Wang and Jun Xu. A Method for Anomaly Detection in Power Time Series Data within Energy Big Data Based on Generative Adversarial Networks.
BIGDATASECURITY 6: 05/11/2024, 9:00-10:00, Room B
- Xintian Ren, Jun Wu and Hansong Xu. Diffusion Model Based Secure Semantic Communications with Adversarial Purification.
- Mengyuan Zhang, Yingying Zhao and Yingjie Tian. Research on Production Capacity Utilization Index Based on Electricity Big Data.
- Chai Haozhe and Wu Jun. Sound-LDR Sensors Empowered Secure True Random Number Generator for PoS Consensus in Blockchain.
- Guohao Cui, Hao Wang, Wentao Hao and Xiaoyi Zhou. OT24: Optical color image encryption based on Two-dimensional quantum walks and 24-bit-plane permutation.
BIGDATASECURITY 7: 05/11/2024, 10:00-10:55, Room A
- Yanlu Li, Yufeng Xiao, Yinyan Gong, Ronglin Zhang and Yingzi Huo. Explainable AI:A Way to Achieve Trustworthy AI.
- Wenjing Xu, Haochen Liang, Lin Sun, Yulun Song and Yunlong Xie. A Blockchain-Based Identity Control Scheme for Cross-Organizational Data Sharing.
- Chuangchuang Dai, Haodong Cheng, Lei Guan and Mingbo Chi. Industrial Internet of Things Identity Resolution Techniques: A Review.
- Qianqian Pan and Jun Wu. AI-Finger: From Physical Unclonable Function to AI-Hardware Fingerprint.
- Ranyue Xu, Wei Yu, Hao Huang, Yongchun Pan, Chen Zhou and Gang Zheng. Enhancing Cybersecurity in Power Substations through Active Immune Detection and Low-Load Network Security Risk Intelligence Platform.