Workshops
The 8th International Workshop on Security and Privacy in Big Data
Big Security 1
Cooperative Game Model of Delegation Computing: Verifier Separated from Calculators
Duo Zhang, Youliang Tian and Linjie Wang (Guizhou University, China); Sheng Gao (Central University of Finance and Economics, China); Jianfeng Ma (Xidian University, China)
U-ASG: A Universal Method to Perform Adversarial Attack on Autoencoder based Network Anomaly Detection Systems
Chenming Yang (University of Electronic Science and Technology of China, China); Liang Zhou (UESTC, China); Hui Wen and Yue Wu (University of Electronic Science and Technology of China, China)
Identification of Encrypted Video Streaming Based on Differential Fingerprints
Hua Wu, Zhenhua Yu, Guang Cheng and Shuyi Guo (Southeast University, China)
RNBG: A Ranking Nodes Based IP Geolocation Method
Chong Liu (PLA Strategic Support Force Information Engineering University, China); Xiangyang Luo (PLA Strategic Support Force Information Engineering University & Zhengzhou Science and Technology Institute, China); Fuxiang Yuan (PLA Strategic Support Force Information Engineering University, China); Fenlin Liu (Zhengzhou Information Science and Technology Institute, China)
Session Chair
Professor Shui Yu, University of Technology Sydney, Australia
Big Security 2
Adaptive Adversarial Attack on Scene Text Recognition
Xiaoyong Yuan and Pan He (University of Florida, USA); Xiaolin Li (Tongdun Technology, USA); Dapeng Oliver Wu (University of Florida, USA)
Image Translation with Attention Mechanism based on Generative Adversarial Networks
Yu Lu, Ju Liu, Xueyin Zhao and Xiaoxi Liu (Shandong University, China); Weiqiang Chen (Hisense Group, China); Xuesong Gao (Tianjin University, China)
Sparser: Secure Nearest Neighbor Search with Space-filling Curves
Siqin Fang (Xidian University, China); Sean Kennedy, Chenggang Wang and Boyang Wang (University of Cincinnati, USA); Qingqi Pei and Xuefeng Liu (Xidian University, China)
HIDEchain: A User Centric Secure Edge Computing Architecture for Healthcare IoT Devices
Rabeya Bosri, Abdur Razzak Uzzal and Abdullah Al Omar (University of Asia Pacific, Bangladesh); Md Zakirul Alam Bhuiyan (Fordham University, USA); Mohammad Shahriar Rahman (University of Liberal Arts Bangladesh, Bangladesh)
Session Chair
Professor Dapeng Oliver Wu, University of Florida, USA.
Big Security 3
Efficient Vulnerability Detection based on Abstract Syntax Tree and Deep Learning
Hantao Feng (School of Cyber Engineering, Xidian University & National Computer Network Intrusion Protection Center, China); Xiaotong Fu (School of Cyber Engineering, Xidian University, China); Hongyu Sun (School of Cyber Engineering, Xidian University & National Computer Network Intrusion Protection Center, China); He Wang (School of Cyber Engineering, Xidian University, China); Zhang Yuqing (National Computer Network Intrusion Protection Center, University of Chinese Academy of Sciences, China)
Fidelity Leakages: Applying Membership Inference Attacks to Preference Data
Pierre Danhier (Belgium); Clément Massart and François-Xavier Standaert (Université Catholique de Louvain, Belgium)
Detecting Anomalies in Encrypted Traffic via Deep Dictionary Learning
Junchi Xing (Zhejiang University, China); Chunming Wu (College of Computer Science, Zhejiang University, China)
Multi-scale Learning based Malware Variant Detection using Spatial Pyramid Pooling Network
Sriram S (Amrita Vishwa Vidyapeetham, India); Vinayakumar R (Cincinnati Children's Hospital Medical Center, USA); V Sowmya (Amrita Vishwavidyapeetham, India); Mamoun Alazab (CDU, Australia); Soman K P (Amrita Vishwa Vidyapeetham, India)
Session Chair
Professor Donghui Hu, Hefei University of Technology, China
Big Privacy 1
Using NLP and Machine Learning to Detect Data Privacy Violations
Paulo Silva, Carolina Gonçalves and Carolina Godinho (University of Coimbra, Portugal); Nuno Antunes (University of Coimbra & CISUC, Portugal); Marilia Curado (University of Coimbra, Portugal)
Privacy-preserving Data Aggregation for Big Data in Financial Institutions
Hongning Li, Jiexiong Chen and Qingqi Pei (Xidian University, China); Hao Yue (San Francisco State University, USA)
An IoT data sharing privacy preserving scheme
Yan Sun, Lihua Yin, Zhe Sun and Zhihong Tian (Guangzhou University, China); Xiaojiang Du (Temple University, USA)
A Blockchain-Based Trading Platform for Big Data
Shuli Zheng, Lixuan Pan, Donghui Hu, Meng Li and Yuqi Fan (Hefei University of Technology, China)
Session Chair
Professor Marilia Curado, University of Coimbra, Portugal
Made with in Toronto · Privacy Policy · © 2021 Duetone Corp.