Online Conferencing

 

(1) We will use Tencent Meeting & VooV Meeting (https://voovmeeting.com/) for online conferencing. Please install Tencent Meeting & VooV Meeting (Client) in advance. We will send our conference registrants an email on how to join our video conferencing system with credentials around one or two days before the conference start date.

 

(2) For authors choosing Type 2 presentations, your videos will be played below around one or two days before the conference start date and we will remove them right after the conference.

 

Part I: Tencent Meeting & VooV Meeting for Opening Ceremony, Keynotes, and Type 1, 3 & 4 Presentations for Techinical Sessions

We will use Tencent Meeting & VooV Meeting (https://voovmeeting.com/) for online conferencing. Please install Tencent Meeting & VooV Meeting (Client) in advance. We will send our conference registrants an email on how to join our video conferencing system with credentials around one or two days before the conference start date.

 

Time(BJT) Conference Tencent Meeting Links #Tencent Meeting
Dec. 29
08:30 - 12:05
UbiSec 2022 Opening Ceremony and Keynote Speeches (1-4) https://meeting.tencent.com/dm/6rd2COZP7UNW 519-826-102
Dec. 29
14:00 - 17:40
UbiSec-1, UbiSec-2 https://meeting.tencent.com/dm/rIXlUagsdH4 309-411-405
Dec. 30
8:30 - 11:45
UbiSec 2022 Keynote Speech (5), UbiSec-3 https://meetingtencent.com/dm/AqRuKSXSntCI 148-463-519



Part II: Presentations for Invited Talks

Session UbiSec 2022 Invited Talks -1


Chair: Prof. Xiaofei Xing, Guangzhou University, China
08:00-10:15, December 28 (Wednesday) Room 1

Invited Speaker 1: Prof. Arcangelo Castiglione, University of Salerno, Italy

Title:New Insights on Cryptographic Hierarchical Access Control: Models, Schemes, and Analysis

Viewing Video Slides here!


Invited Speaker 2:Prof. Scott Fowler, Linköping University, Sweden

Title: Optimizing Industrial IoT HVAC using Machine Learning

Viewing Video Slides here!


Invited Speaker 3: Prof. Wenjun Jiang, Hunan University, China

Title: Online User Analysis and Learning Optimization

Viewing Video Slides here!


Session UbiSec 2022 Invited Talks -2


Chair: Prof. Shuhong Chen, Guangzhou University, China
10:30-12:00, December 28 (Wednesday) Room 1

Invited Speaker 4: Prof. Ryan Ko, University of Queensland, Australia

Title: Operational Technology (OT) and Supply Chain Cyber Security: The Storm Approaching US

Viewing Video Slides here!


Invited Speaker 5: Prof. Qin Liu, Hunan University,China

Title:Secure Search in Cloud Computing and Emerging Applications

Viewing Video Slides here!


Session UbiSec 2022 Invited Talks -3


Chair: Prof. Tao Peng, Guangzhou University, China
14:30-16:00, December 28 (Wednesday) Room 1

Invited Speaker 6: Prof. Tian Wang, Beijing Normal University,China

Title: Green Offloading: from “Eastern Data, Western Computing” to Edge Computing

Viewing Video Slides here!


Invited Speaker 7: Prof. Carlos Becker Westphall, Federal University of Santa Catarina, Brazil

Title: Mutual Authentication with Multi-factor and Hybrid Approach to Intrusion Detection in IoT-Fog-Cloud Environment

Viewing Video Slides here!


Session UbiSec 2022 Invited Talks -4


Chair: Prof.Guojun Wang, Guangzhou University, China
16:20-17:50, December 28 (Wednesday) Room 1

Invited Speaker 8: Prof. Yulei Wu, University of Exeter, UK

Title: Trustworthiness of Anomaly Detection for IIoT

Viewing Video Slides here!


Invited Speaker 9: Prof. Yang Xu, Hunan University, China

Title: Blockchain-enabled Cloud Security: Frameworks and Solutions

Viewing Video Slides here!


Part III: Type 2 Presentations for Technical Sessions

For authors choosing Type 2 presentations, your videos will be shown below around one or two days before the conference start date and we will remove them right after the conference.

The Second International Conference on Ubiquitous Security (UbiSec 2022 )


Session UbiSec-2: 14:00-17:15, December 29 (Thursday), Room 2
Chair: Guanghui Feng, Guangzhou University, China

Hierarchical Policies of Subgoals for Safe Deep Reinforcement Learning

Fumin Yu, Feng Gao, Yao Yuan, Xiaofei Xing and Yinglong Dai

Viewing Video Slides here!


Listen to the Music: Evaluating the use of music in audio based authentication

Michael Tsai and Vimal Kumarr

Viewing Video Slides here!


System Call Processing Using Lightweight NLP for IoT Behavioral Malware Detection

John Carter, Spiros Mancoridis, Malvin Nkomo, Steven Weber and Kapil Dandekar

Viewing Video Slides here!


An Aspect-Based Semi-Supervised Generative Model for Online Review Spam Detection

Shitao Wang, Wenjun Jiang and Shuhong Chen

Viewing Video Slides here!


Impact of Reenactment Programs on Young Generation

Anam Fatima, Muhammad Waseem Iqbal, Muhammad Aqeel, Toqir A. Rana, Guojun Wang and Muhammad Arif

Viewing Video Slides here!


A Hybrid Secure Two-party Protocol for Vertical Federated Learning

Wenti Yang, Zhaoyang He, Yalei Li, Haiyan Zhang and Zhitao Guan

Viewing Video Slides here!


Zero-Day Attacks (ZDA): Detection and Removal Techniques

Khalid Hamid, Muhammad Waseem Iqbal, Muhammad Aqeel, Toqir A. Rana, Xiangyong Liu and Muhammad Arif

Viewing Video Slides here!



Session UbiSec-3: 9:25-11:45, December 30 (Friday), Room 1
Chair: Mingfei Chen, Guangzhou University, China

An Interactive Query Differential Privacy Protection Model Based on Big Data Analysis

Guanghui Feng, Wenyin Yang, Tao Peng, Xiaofei Xing, Shuhong Chen and Yuting Li

Viewing Video Slides here!


Differentially Private Clustering Algorithm for Mixed Data

Huifeng Yang, Liandong Chen, Kai Cheng, Dan Luo, Shuai Yuan and Zhitao Guan

Viewing Video Slides here!


Decentralized Collaborative Filtering Algorithm with Privacy Preserving for Recommendation in Mobile Edge Computing

Xiangyong Liu, Pengfei Yin, Pin Liu and Shuhong Chen

Viewing Video Slides here!


Privacy-Preserving Federated Learning with 1-Bit Compression and Adaptive Optimizer

Yuting Li, Guojun Wang and Guanghui Feng

Viewing Video Slides here!


Sensor Cloud Data Privacy Protection Model Based On Collaborative Deep Learning

Yufeng Zhuang and Xiaoqian Ran

Viewing Video Slides here!



Session UbiSec-4: 14:00-17:15, December 30 (Friday), Room 1
Chair: Wei Yang, Guangzhou University, China

Using Opcode Sequences to Detect Unknown Vulnerability in Smart Contracts Based on Machine Learning

Xiangbin Li, Xiaofei Xing, Guojun Wang, Peiqiang Li and Xiangyong Liu

Viewing Video Slides here!


Malware Traffic Classification based on GAN and BP Neural Network

Yun Duan, Laifu Wang, Dongxin Liu, Boren Deng and Yunfan Tian

Viewing Video Slides here!


Prototyping the IDS Security Components in the Context of Industry 4.0 - A Textile and Clothing Industry Case Study

Nuno Torres, Ana Chaves, César Toscano and Pedro Pinto

Viewing Video Slides here!


Improved DeepLabV3+ based Railway track extraction to Enhance Railway Transportation Safety

Yanbin Weng, Zuochuang Li, Xiaobin Huang and Xiahu Chen

Viewing Video Slides here!


A New Signal Packing Algorithm for CAN-FD with Security Consideration

Bo Zheng and Yong Xie

Viewing Video Slides here!


Android Malware Detection And Analysis - Literature Review

Ahmed Sabbah and Adel Taweel

Viewing Video Slides here!


Empirical Likelihood for Partially Linear Single-Index Models with Missing Response Variables and Error-prone Covariates

Xin Qi, Hongling Chen and Qin Liu

Viewing Video Slides here!



Session UbiSec-5: 14:00-17:15, December 30 (Friday), Room 2
Chair: Tao Peng, Guangzhou University, China

An Improved Cuckoo Search Algorithm and Its Application in Function Optimization

Songlv Feng, Cuina Cheng and Liping Mo

Viewing Video Slides here!


Source Code Vulnerability Detection using Deep Learning Algorithms for Industrial Applications

Akram Louati and Tiago Gasiba

Viewing Video Slides here!


BlockLearning: A Modular Framework for Blockchain-based Vertical Federated Learning

Henrique Dias and Nirvana Meratnia

Viewing Video Slides here!


An Adversarial Sample Defense Method based on Saliency Information

Shuqi Liu, Yufeng Zhuang and Ying Zhao

Viewing Video Slides here!


A-VMD: Adaptive Variational Mode Decomposition Scheme for Noise Reduction in Sensor-Cloud

Zhenru Huo, Guoqing Jia, Weidong Fang, Wei Chen and Wuxiong Zhang

Viewing Video Slides here!


Threat Modeling in Cloud Computing - A literature review

Mohammed Kharma and Adel Taweel

Viewing Video Slides here!



Session UbiSec-6: 8:30-10:30, December 31 (Saturday), Room 1
Chair: Xiangyong Liu, Guangzhou University, China

Vulnerability Detection with Representation Learning

Zhiqiang Wang, Sulong Meng and Ying Chen

Viewing Video Slides here!


Garbage recognition algorithm based on self-attention mechanism and deep sorting

Haiyang Huang, Falong Xiao, Xiaofang Zhang, Wanting Yan, Fumin Liu and Yuezhong Wu

Viewing Video Slides here!


Multi-Mobile Agent Security by Design Itinerary Planning Approach in Wireless Sensor Network

Saad Khan, Tariq Alsboui, Richard Hill and Hussain Al-Aqrabi

Viewing Video Slides here!


On The Variability in The Application and Measurement of Supervised Machine Learning in Cyber Security

Omar Alshaikh, Simon Parkinson and Saad Khan

Viewing Video Slides here!


Approaches for Zero Trust Adoption Based Upon Organization Security Level

Muntaha Alawneh and Imad Abbadi

Viewing Video Slides here!