The 8th International Workshop on Security and Privacy in Big Data

Session BigSecurity-S1

Big Security 1

Conference
9:30 AM — 11:00 AM EDT
Local
Jul 6 Mon, 9:30 AM — 11:00 AM EDT

Cooperative Game Model of Delegation Computing: Verifier Separated from Calculators

Duo Zhang, Youliang Tian and Linjie Wang (Guizhou University, China); Sheng Gao (Central University of Finance and Economics, China); Jianfeng Ma (Xidian University, China)

3
This talk does not have an abstract.

U-ASG: A Universal Method to Perform Adversarial Attack on Autoencoder based Network Anomaly Detection Systems

Chenming Yang (University of Electronic Science and Technology of China, China); Liang Zhou (UESTC, China); Hui Wen and Yue Wu (University of Electronic Science and Technology of China, China)

4
This talk does not have an abstract.

Identification of Encrypted Video Streaming Based on Differential Fingerprints

Hua Wu, Zhenhua Yu, Guang Cheng and Shuyi Guo (Southeast University, China)

4
This talk does not have an abstract.

RNBG: A Ranking Nodes Based IP Geolocation Method

Chong Liu (PLA Strategic Support Force Information Engineering University, China); Xiangyang Luo (PLA Strategic Support Force Information Engineering University & Zhengzhou Science and Technology Institute, China); Fuxiang Yuan (PLA Strategic Support Force Information Engineering University, China); Fenlin Liu (Zhengzhou Information Science and Technology Institute, China)

4
This talk does not have an abstract.

Session Chair

Professor Shui Yu, University of Technology Sydney, Australia

Session BigSecurity-S2

Big Security 2

Conference
11:30 AM — 1:00 PM EDT
Local
Jul 6 Mon, 11:30 AM — 1:00 PM EDT

Adaptive Adversarial Attack on Scene Text Recognition

Xiaoyong Yuan and Pan He (University of Florida, USA); Xiaolin Li (Tongdun Technology, USA); Dapeng Oliver Wu (University of Florida, USA)

1
This talk does not have an abstract.

Image Translation with Attention Mechanism based on Generative Adversarial Networks

Yu Lu, Ju Liu, Xueyin Zhao and Xiaoxi Liu (Shandong University, China); Weiqiang Chen (Hisense Group, China); Xuesong Gao (Tianjin University, China)

0
This talk does not have an abstract.

Sparser: Secure Nearest Neighbor Search with Space-filling Curves

Siqin Fang (Xidian University, China); Sean Kennedy, Chenggang Wang and Boyang Wang (University of Cincinnati, USA); Qingqi Pei and Xuefeng Liu (Xidian University, China)

0
This talk does not have an abstract.

HIDEchain: A User Centric Secure Edge Computing Architecture for Healthcare IoT Devices

Rabeya Bosri, Abdur Razzak Uzzal and Abdullah Al Omar (University of Asia Pacific, Bangladesh); Md Zakirul Alam Bhuiyan (Fordham University, USA); Mohammad Shahriar Rahman (University of Liberal Arts Bangladesh, Bangladesh)

1
This talk does not have an abstract.

Session Chair

Professor Dapeng Oliver Wu, University of Florida, USA.

Session BigSecurity-S3

Big Security 3

Conference
2:30 PM — 4:00 PM EDT
Local
Jul 6 Mon, 2:30 PM — 4:00 PM EDT

Efficient Vulnerability Detection based on Abstract Syntax Tree and Deep Learning

Hantao Feng (School of Cyber Engineering, Xidian University & National Computer Network Intrusion Protection Center, China); Xiaotong Fu (School of Cyber Engineering, Xidian University, China); Hongyu Sun (School of Cyber Engineering, Xidian University & National Computer Network Intrusion Protection Center, China); He Wang (School of Cyber Engineering, Xidian University, China); Zhang Yuqing (National Computer Network Intrusion Protection Center, University of Chinese Academy of Sciences, China)

0
This talk does not have an abstract.

Fidelity Leakages: Applying Membership Inference Attacks to Preference Data

Pierre Danhier (Belgium); Clément Massart and François-Xavier Standaert (Université Catholique de Louvain, Belgium)

0
This talk does not have an abstract.

Detecting Anomalies in Encrypted Traffic via Deep Dictionary Learning

Junchi Xing (Zhejiang University, China); Chunming Wu (College of Computer Science, Zhejiang University, China)

0
This talk does not have an abstract.

Multi-scale Learning based Malware Variant Detection using Spatial Pyramid Pooling Network

Sriram S (Amrita Vishwa Vidyapeetham, India); Vinayakumar R (Cincinnati Children's Hospital Medical Center, USA); V Sowmya (Amrita Vishwavidyapeetham, India); Mamoun Alazab (CDU, Australia); Soman K P (Amrita Vishwa Vidyapeetham, India)

0
This talk does not have an abstract.

Session Chair

Professor Donghui Hu, Hefei University of Technology, China

Session BigSecurity-S4

Big Privacy 1

Conference
4:30 PM — 6:00 PM EDT
Local
Jul 6 Mon, 4:30 PM — 6:00 PM EDT

Using NLP and Machine Learning to Detect Data Privacy Violations

Paulo Silva, Carolina Gonçalves and Carolina Godinho (University of Coimbra, Portugal); Nuno Antunes (University of Coimbra & CISUC, Portugal); Marilia Curado (University of Coimbra, Portugal)

0
This talk does not have an abstract.

Privacy-preserving Data Aggregation for Big Data in Financial Institutions

Hongning Li, Jiexiong Chen and Qingqi Pei (Xidian University, China); Hao Yue (San Francisco State University, USA)

0
This talk does not have an abstract.

An IoT data sharing privacy preserving scheme

Yan Sun, Lihua Yin, Zhe Sun and Zhihong Tian (Guangzhou University, China); Xiaojiang Du (Temple University, USA)

0
This talk does not have an abstract.

A Blockchain-Based Trading Platform for Big Data

Shuli Zheng, Lixuan Pan, Donghui Hu, Meng Li and Yuqi Fan (Hefei University of Technology, China)

0
This talk does not have an abstract.

Session Chair

Professor Marilia Curado, University of Coimbra, Portugal

Made with in Toronto · Privacy Policy · © 2020 Duetone Corp.