Friday, July 26, 2024 |
|
14:00-22:00 |
Registration |
|
|
Saturday, July 27, 2024 |
|
International Conference Hall (Floor 2) |
|
09:00-09:30 |
Conference Opening |
09:30-10:00 |
Keynote 1: Cryptographic Credential Management in Mobile Computing |
10:00-10:30 |
Keynote 2: Privacy Preserving Service Discovery: Approaches and Challenges |
10:30-10:45 |
Tea break |
10:45-11:15 |
Keynote 3: Security and Privacy Challenges of AI Large Models |
11:15-11:45 |
Keynote 4: Exploring ChatGPT's Capabilities on Vulnerability Management |
11:45-13:30 |
Lunch Break |
|
|
Hao Yi Hall (Floor 2) |
|
Session A1: Machine Learning and Differential Privacy (Chair: Guangxia Xu) |
|
13:30-13:40 |
Large Vision-Language Model Security: A Survey |
13:40-13:50 |
A Robust Linked List Steganography Without Embedding for Digital Images |
13:50-14:00 |
Advancements in Multi-Image Hiding: A Novel Local Approach for Enhanced Payload Capacity |
14:00-14:10 |
LDPDetect: Efficient Detection and Defense against Graph Poisoning Attacks under Local Differential Privacy |
14:10-14:20 |
Differentially Private Correlated Attributes Selection for Vertically Partitioned Data Publishing |
14:20-14:30 |
On the Differential Transparency Order of Boolean Functions |
Session A2: Federated Learning (Chair: Beibei Li) |
|
14:30-14:40 |
Defense-Guided Adaptive Attack on Byzantine-Robust Federated Learning |
14:40-14:50 |
Efficient Private Set Intersection for Vertical Federated Learning in IoV |
14:50-15:00 |
EVFLS: An Effective and Verifiable Federated Learning Aggregation Scheme |
15:00-15:10 |
Robust Federated Learning Client Selection using Shapley Value in Heterogeneous Environments |
15:10-15:20 |
Privacy-balanced Protection Methodology for Vehicle Health Monitoring under the Federated Learning Framework |
15:20-15:30 |
Mantis: Fast and Communication-friendly Secure Two-Party Neural Network Inference |
15:30-15:40 |
Tea Break |
Session A3: Privacy-Preserving Services (Chair: Qingchuan Zhao) |
|
15:40-15:50 |
Secure Cloud Album: Design and Implementation |
15:50-16:00 |
Efficient and Lightweight Medical Record Query Scheme Based on Homomorphism in Wireless Body Area Networks |
16:00-16:10 |
A Privacy-Preserving and Efficient Fuzzy Range Query Processing Scheme on Cloud Server |
16:10-16:20 |
Advertising Diversion App using Clipboard Content Recognition |
16:20-16:30 |
Secure Task Assignment based on Path Matching in Crowdsensing |
16:30-16:40 |
Excellent Program For Face Recognition Privacy Preserving |
Session A4: Blockchain and Distributed System (Chair: Chenxu Wang) |
|
16:40-16:50 |
ShardOpt: Optimal Sharding Strategy with Transaction Prediction |
16:50-17:00 |
Secrecy Rate Optimization for The Power Beacon-assisted Secrecy Network Based on Stackelberg Game |
17:00-17:10 |
Smart Contract Vulnerability Detection Based on Code Graph Embedding |
17:10-17:20 |
Notary Group-based Cross-chain Traceability Scheme for Cold Chain Logistics |
17:20-17:30 |
Blockchian-Based Access Control and Data Sharing with IPFS in IIOT |
|
|
Hao Jing Hall (Floor 2) |
|
Session B1: Public-Key Cryptography (Chair:Shengmin Xu) |
|
13:30-13:40 |
A Reliable and Privacy-preserving Truth Discovery Scheme for Mobile Crowdsensing based on Functional Encryption |
13:40-13:50 |
Certificate-Based Proxy Re-Encryption+ Scheme in Digital Twin Smart City |
13:50-14:00 |
Identity-Based Threshold Broadcast Proxy Re-Encryption Plus Scheme |
14:00-14:10 |
Multi-Ciphertext Equality Batch Test Supporting Inequality Verification |
14:10-14:20 |
Lattice-based Puncturable Blind Signature Scheme with Bidirectional Security |
14:20-14:30 |
A Quantum-Resistant Blockchain Based on Hash Function |
Session B2: Multi-Party Computation (Chair: Anjia Yang) |
|
14:30-14:40 |
PAMPC: Publicly Auditable Multi-Party Computation with Cheater Detection |
14:40-14:50 |
Multi-party Weighted Threshold d-Dimensional Semi-Quantum Secret Sharing Based on the Chinese Remainder Theorem |
14:50-15:00 |
Multi-receiver Certiffcateless Searchable Public Key Encryption Scheme for IoMT |
15:00-15:10 |
A Semi-Centralized Dynamic Session Key Agreement Protocol based on CL-PKC for In-vehicle Network |
15:10-15:20 |
A Novel Multi-user Certificateless Searchable Public Key Encryption Scheme for Industrial Internet of Things |
15:20-15:30 |
Practical Third-party Private Set Intersection Protocol from Homomorphic Encryption |
15:30-15:40 |
Tea Break |
Session B3: Authentication and Deduplication (Chair: Fei Chen) |
|
15:40-15:50 |
A Novel Anonymous Authentication Key Agreement Protocol in Satellite Terrestrial Networks |
15:50-16:00 |
A PUF-based Lightweight Mutual Authentication Scheme for IoT Devices |
16:00-16:10 |
BFDup: Batch Fuzzy Deduplication Scheme for Massive Data in Non-trusted Environments |
16:10-16:20 |
Secure Encrypted Deduplication Based on Frequency Distribution |
16:20-16:30 |
Cross-domain Authentication Scheme for IoT Terminals Based on Blockchain |
16:30-16:40 |
A Blockchain-Based Anonymous Authentication Scheme for Medical Security |
Session B4: Smart Grid (Chair: Zhongyun Hua) |
|
16:40-16:50 |
A Multidimensional Data Aggregation Scheme with Anonymous and Demand-response Billing |
16:50-17:00 |
Achieving Secure and Efficient Multi-layer Data Sharing for Smart Grid |
17:00-17:10 |
Vulnerability Detection for Open Source Components in Smart Power Grid |
17:10-17:20 |
Addressing Economic Dispatch Problem in a Smart Grid: a Privacy-Preserving and Distributed Optimization Approach |
17:20-17:30 |
A Multi-Dimensional Data Aggregation Signcryption Scheme with Anonymity in the Smart Grid |
|
|
Sunday, July 28, 2024 |
|
09:00-11:45 |
Roundtable Discussion |
13:30-17:00 |
Breakout Session Discussion |