Online Conferencing
(1) We will use Tencent Meeting & VooV Meeting (https://voovmeeting.com/) for online conferencing. Please install Tencent Meeting & VooV Meeting (Client) in advance. We will send our conference registrants an email on how to join our video conferencing system with credentials around one or two days before the conference start date.
(2) For authors choosing Type 2 presentations, your videos will be played below around one or two days before the conference start date and we will remove them right after the conference.
Part I: Tencent Meeting & VooV Meeting for Opening Ceremony, Keynotes, and Type 1, 3 & 4 Presentations for Techinical Sessions
We will use Tencent Meeting & VooV Meeting (https://voovmeeting.com/) for online conferencing. Please install Tencent Meeting & VooV Meeting (Client) in advance. We will send our conference registrants an email on how to join our video conferencing system with credentials around one or two days before the conference start date.
Time(BJT) | Conference | Tencent Meeting Links | #Tencent Meeting |
---|---|---|---|
Dec. 29 08:30 - 12:05 |
UbiSec 2022 Opening Ceremony and Keynote Speeches (1-4) | https://meeting.tencent.com/dm/6rd2COZP7UNW | 519-826-102 |
Dec. 29 14:00 - 17:40 |
UbiSec-1, UbiSec-2 | https://meeting.tencent.com/dm/rIXlUagsdH4 | 309-411-405 |
Dec. 30 8:30 - 11:45 |
UbiSec 2022 Keynote Speech (5), UbiSec-3 | https://meetingtencent.com/dm/AqRuKSXSntCI | 148-463-519 |
Session UbiSec 2022 Invited Talks -1
Chair: Prof. Xiaofei Xing, Guangzhou University, China
08:00-10:15, December 28 (Wednesday) Room 1
Invited Speaker 1: Prof. Arcangelo Castiglione, University of Salerno, Italy
Title:New Insights on Cryptographic Hierarchical Access Control: Models, Schemes, and Analysis
Invited Speaker 2:Prof. Scott Fowler, Linköping University, Sweden
Title: Optimizing Industrial IoT HVAC using Machine Learning
Invited Speaker 3: Prof. Wenjun Jiang, Hunan University, China
Title: Online User Analysis and Learning Optimization
Session UbiSec 2022 Invited Talks -2
Chair: Prof. Shuhong Chen, Guangzhou University, China
10:30-12:00, December 28 (Wednesday) Room 1
Invited Speaker 4: Prof. Ryan Ko, University of Queensland, Australia
Title: Operational Technology (OT) and Supply Chain Cyber Security: The Storm Approaching US
Invited Speaker 5: Prof. Qin Liu, Hunan University,China
Title:Secure Search in Cloud Computing and Emerging Applications
Session UbiSec 2022 Invited Talks -3
Chair: Prof. Tao Peng, Guangzhou University, China
14:30-16:00, December 28 (Wednesday) Room 1
Invited Speaker 6: Prof. Tian Wang, Beijing Normal University,China
Title: Green Offloading: from “Eastern Data, Western Computing” to Edge Computing
Invited Speaker 7: Prof. Carlos Becker Westphall, Federal University of Santa Catarina, Brazil
Title: Mutual Authentication with Multi-factor and Hybrid Approach to Intrusion Detection in IoT-Fog-Cloud Environment
Session UbiSec 2022 Invited Talks -4
Chair: Prof.Guojun Wang, Guangzhou University, China
16:20-17:50, December 28 (Wednesday) Room 1
Invited Speaker 8: Prof. Yulei Wu, University of Exeter, UK
Title: Trustworthiness of Anomaly Detection for IIoT
Invited Speaker 9: Prof. Yang Xu, Hunan University, China
Title: Blockchain-enabled Cloud Security: Frameworks and Solutions
Part III: Type 2 Presentations for Technical Sessions
For authors choosing Type 2 presentations, your videos will be shown below around one or two days before the conference start date and we will remove them right after the conference.
The Second International Conference on Ubiquitous Security (UbiSec 2022 )
Session UbiSec-2: 14:00-17:15, December 29 (Thursday), Room 2
Chair: Guanghui Feng, Guangzhou University, China
Hierarchical Policies of Subgoals for Safe Deep Reinforcement Learning
Fumin Yu, Feng Gao, Yao Yuan, Xiaofei Xing and Yinglong Dai
Listen to the Music: Evaluating the use of music in audio based authentication
Michael Tsai and Vimal Kumarr
System Call Processing Using Lightweight NLP for IoT Behavioral Malware Detection
John Carter, Spiros Mancoridis, Malvin Nkomo, Steven Weber and Kapil Dandekar
An Aspect-Based Semi-Supervised Generative Model for Online Review Spam Detection
Shitao Wang, Wenjun Jiang and Shuhong Chen
Impact of Reenactment Programs on Young Generation
Anam Fatima, Muhammad Waseem Iqbal, Muhammad Aqeel, Toqir A. Rana, Guojun Wang and Muhammad Arif
A Hybrid Secure Two-party Protocol for Vertical Federated Learning
Wenti Yang, Zhaoyang He, Yalei Li, Haiyan Zhang and Zhitao Guan
Zero-Day Attacks (ZDA): Detection and Removal Techniques
Khalid Hamid, Muhammad Waseem Iqbal, Muhammad Aqeel, Toqir A. Rana, Xiangyong Liu and Muhammad Arif
Session UbiSec-3: 9:25-11:45, December 30 (Friday), Room 1
Chair: Mingfei Chen, Guangzhou University, China
An Interactive Query Differential Privacy Protection Model Based on Big Data Analysis
Guanghui Feng, Wenyin Yang, Tao Peng, Xiaofei Xing, Shuhong Chen and Yuting Li
Differentially Private Clustering Algorithm for Mixed Data
Huifeng Yang, Liandong Chen, Kai Cheng, Dan Luo, Shuai Yuan and Zhitao Guan
Decentralized Collaborative Filtering Algorithm with Privacy Preserving for Recommendation in Mobile Edge Computing
Xiangyong Liu, Pengfei Yin, Pin Liu and Shuhong Chen
Privacy-Preserving Federated Learning with 1-Bit Compression and Adaptive Optimizer
Yuting Li, Guojun Wang and Guanghui Feng
Sensor Cloud Data Privacy Protection Model Based On Collaborative Deep Learning
Yufeng Zhuang and Xiaoqian Ran
Session UbiSec-4: 14:00-17:15, December 30 (Friday), Room 1
Chair: Wei Yang, Guangzhou University, China
Using Opcode Sequences to Detect Unknown Vulnerability in Smart Contracts Based on Machine Learning
Xiangbin Li, Xiaofei Xing, Guojun Wang, Peiqiang Li and Xiangyong Liu
Malware Traffic Classification based on GAN and BP Neural Network
Yun Duan, Laifu Wang, Dongxin Liu, Boren Deng and Yunfan Tian
Prototyping the IDS Security Components in the Context of Industry 4.0 - A Textile and Clothing Industry Case Study
Nuno Torres, Ana Chaves, César Toscano and Pedro Pinto
Improved DeepLabV3+ based Railway track extraction to Enhance Railway Transportation Safety
Yanbin Weng, Zuochuang Li, Xiaobin Huang and Xiahu Chen
A New Signal Packing Algorithm for CAN-FD with Security Consideration
Bo Zheng and Yong Xie
Android Malware Detection And Analysis - Literature Review
Ahmed Sabbah and Adel Taweel
Empirical Likelihood for Partially Linear Single-Index Models with Missing Response Variables and Error-prone Covariates
Xin Qi, Hongling Chen and Qin Liu
Session UbiSec-5: 14:00-17:15, December 30 (Friday), Room 2
Chair: Tao Peng, Guangzhou University, China
An Improved Cuckoo Search Algorithm and Its Application in Function Optimization
Songlv Feng, Cuina Cheng and Liping Mo
Source Code Vulnerability Detection using Deep Learning Algorithms for Industrial Applications
Akram Louati and Tiago Gasiba
BlockLearning: A Modular Framework for Blockchain-based Vertical Federated Learning
Henrique Dias and Nirvana Meratnia
An Adversarial Sample Defense Method based on Saliency Information
Shuqi Liu, Yufeng Zhuang and Ying Zhao
A-VMD: Adaptive Variational Mode Decomposition Scheme for Noise Reduction in Sensor-Cloud
Zhenru Huo, Guoqing Jia, Weidong Fang, Wei Chen and Wuxiong Zhang
Threat Modeling in Cloud Computing - A literature review
Mohammed Kharma and Adel Taweel
Session UbiSec-6: 8:30-10:30, December 31 (Saturday), Room 1
Chair: Xiangyong Liu, Guangzhou University, China
Vulnerability Detection with Representation Learning
Zhiqiang Wang, Sulong Meng and Ying Chen
Garbage recognition algorithm based on self-attention mechanism and deep sorting
Haiyang Huang, Falong Xiao, Xiaofang Zhang, Wanting Yan, Fumin Liu and Yuezhong Wu
Multi-Mobile Agent Security by Design Itinerary Planning Approach in Wireless Sensor Network
Saad Khan, Tariq Alsboui, Richard Hill and Hussain Al-Aqrabi
On The Variability in The Application and Measurement of Supervised Machine Learning in Cyber Security
Omar Alshaikh, Simon Parkinson and Saad Khan
Approaches for Zero Trust Adoption Based Upon Organization Security Level
Muntaha Alawneh and Imad Abbadi