Program

Friday, July 26, 2024

14:00-22:00

Registration

 

 

Saturday, July 27, 2024

International Conference Hall (Floor 2)

09:00-09:30

Conference Opening

09:30-10:00

Keynote 1: Cryptographic Credential Management in Mobile Computing
Speaker: Robert H. Deng
Chair: Qian Wang

10:00-10:30

Keynote 2: Privacy Preserving Service Discovery: Approaches and Challenges
Speaker: Guomin Yang
Chair: Jian Shen

10:30-10:45

Tea break

10:45-11:15

Keynote 3: Security and Privacy Challenges of AI Large Models
Speaker: Chao Shen
Chair: Hongyu Yang

11:15-11:45

Keynote 4: Exploring ChatGPT's Capabilities on Vulnerability Management
Speaker: Shouling Ji
Chair: Qi Li

11:45-13:30

Lunch Break

 

 

Hao Yi Hall (Floor 2)

Session A1: Machine Learning and Differential Privacy (Chair: Guangxia Xu)

 13:30-13:40

Large Vision-Language Model Security: A Survey

 13:40-13:50

A Robust Linked List Steganography Without Embedding for Digital Images

 13:50-14:00

Advancements in Multi-Image Hiding: A Novel Local Approach for Enhanced Payload Capacity

 14:00-14:10

LDPDetect: Efficient Detection and Defense against Graph Poisoning Attacks under Local Differential Privacy

 14:10-14:20

Differentially Private Correlated Attributes Selection for Vertically Partitioned Data Publishing

 14:20-14:30

On the Differential Transparency Order of Boolean Functions

Session A2: Federated Learning (Chair: Beibei Li)

 14:30-14:40

Defense-Guided Adaptive Attack on Byzantine-Robust Federated Learning

 14:40-14:50

Efficient Private Set Intersection for Vertical Federated Learning in IoV

 14:50-15:00

EVFLS: An Effective and Verifiable Federated Learning Aggregation Scheme

 15:00-15:10

Robust Federated Learning Client Selection using Shapley Value in Heterogeneous Environments

 15:10-15:20

Privacy-balanced Protection Methodology for Vehicle Health Monitoring under the Federated Learning Framework

 15:20-15:30

Mantis: Fast and Communication-friendly Secure Two-Party Neural Network Inference

 15:30-15:40

Tea Break

Session A3: Privacy-Preserving Services (Chair: Qingchuan Zhao)

 15:40-15:50

Secure Cloud Album: Design and Implementation

 15:50-16:00

Efficient and Lightweight Medical Record Query Scheme Based on Homomorphism in Wireless Body Area Networks

 16:00-16:10

A Privacy-Preserving and Efficient Fuzzy Range Query Processing Scheme on Cloud Server

 16:10-16:20

Advertising Diversion App using Clipboard Content Recognition

 16:20-16:30

Secure Task Assignment based on Path Matching in Crowdsensing

 16:30-16:40

Excellent Program For Face Recognition Privacy Preserving

Session A4: Blockchain and Distributed System (Chair: Chenxu Wang)

 16:40-16:50

ShardOpt: Optimal Sharding Strategy with Transaction Prediction

 16:50-17:00

Secrecy Rate Optimization for The Power Beacon-assisted Secrecy Network Based on Stackelberg Game

 17:00-17:10

Smart Contract Vulnerability Detection Based on Code Graph Embedding

 17:10-17:20

Notary Group-based Cross-chain Traceability Scheme for Cold Chain Logistics

 17:20-17:30

Blockchian-Based Access Control and Data Sharing with IPFS in IIOT

 

 

Hao Jing Hall (Floor 2)

Session B1: Public-Key Cryptography (Chair:Shengmin Xu)

 13:30-13:40

A Reliable and Privacy-preserving Truth Discovery Scheme for Mobile Crowdsensing based on Functional Encryption

 13:40-13:50

Certificate-Based Proxy Re-Encryption+ Scheme in Digital Twin Smart City

 13:50-14:00

Identity-Based Threshold Broadcast Proxy Re-Encryption Plus Scheme

 14:00-14:10

Multi-Ciphertext Equality Batch Test Supporting Inequality Verification

 14:10-14:20

Lattice-based Puncturable Blind Signature Scheme with Bidirectional Security

 14:20-14:30

A Quantum-Resistant Blockchain Based on Hash Function

Session B2: Multi-Party Computation (Chair: Anjia Yang)

 14:30-14:40

PAMPC: Publicly Auditable Multi-Party Computation with Cheater Detection

 14:40-14:50

Multi-party Weighted Threshold d-Dimensional Semi-Quantum Secret Sharing Based on the Chinese Remainder Theorem

 14:50-15:00

Multi-receiver Certiffcateless Searchable Public Key Encryption Scheme for IoMT

 15:00-15:10

A Semi-Centralized Dynamic Session Key Agreement Protocol based on CL-PKC for In-vehicle Network

 15:10-15:20

A Novel Multi-user Certificateless Searchable Public Key Encryption Scheme for Industrial Internet of Things

 15:20-15:30

Practical Third-party Private Set Intersection Protocol from Homomorphic Encryption

 15:30-15:40

Tea Break

Session B3: Authentication and Deduplication (Chair: Fei Chen)

 15:40-15:50

A Novel Anonymous Authentication Key Agreement Protocol in Satellite Terrestrial Networks

 15:50-16:00

A PUF-based Lightweight Mutual Authentication Scheme for IoT Devices

 16:00-16:10

BFDup: Batch Fuzzy Deduplication Scheme for Massive Data in Non-trusted Environments

 16:10-16:20

Secure Encrypted Deduplication Based on Frequency Distribution

 16:20-16:30

Cross-domain Authentication Scheme for IoT Terminals Based on Blockchain

 16:30-16:40

A Blockchain-Based Anonymous Authentication Scheme for Medical Security

Session B4: Smart Grid (Chair: Zhongyun Hua)

 16:40-16:50

A Multidimensional Data Aggregation Scheme with Anonymous and Demand-response Billing

 16:50-17:00

Achieving Secure and Efficient Multi-layer Data Sharing for Smart Grid

 17:00-17:10

Vulnerability Detection for Open Source Components in Smart Power Grid

 17:10-17:20

Addressing Economic Dispatch Problem in a Smart Grid: a Privacy-Preserving and Distributed Optimization Approach

 17:20-17:30

A Multi-Dimensional Data Aggregation Signcryption Scheme with Anonymity in the Smart Grid

 

 

Sunday, July 28, 2024

 09:00-11:45

Roundtable Discussion

 13:30-17:00

Breakout Session Discussion