Workshop Agenda

Overview

This year’s AsiaCCS workshops will run on 10/07/2023. Please refer to the map attached in this page to find the map of each workshop venue site.

The workshop agenda is given below. Please note that all times mentioned in this page are in GMT+10 (AEST)

(02:00 PM - 04:45 PM)
Venue: Treasury

---

02:00 PM - 02:05 PM
Welcome

---

02:05 PM - 02:50 PM

Keynote: Post-Quantum Zero-Knowledge Proofs and Applications
by Prof. Ron Steinfeld

---

02:50 PM - 03:05 PM
Coffee Break

---

[Session 1: Post-Quantum Cryptography]

03:05 PM - 03:25 PM

SoK: On Efficacy of the BGF Decoder for QC-MDPC-based Quantum-Safe Cryptosystems
Syed Wajid Ali Shah, Mohammad Nosouhi, Lei Pan and Robin Doss

03:25 PM - 03:45 PM

Breaking a Fifth-Order Masked Implementation of CRYSTALS-Kyber by Copy-Paste
Elena Dubrova, Kalle Ngo, Joel Gärtner and Ruize Wang

---

03:45 PM - 04:00 PM
Coffee Break

---

[Session 2: Cryptographic Protocols]

04:00 PM - 04:20 PM

Designated Verifier Signature with Claimability
Kyosuke Yamashita, Keisuke Hara, Yohei Watanabe, Naoto Yanai and Junji Shikata

04:20 PM - 04:40 PM

Few-helping-card Protocols for Some Wider Class of Symmetric Boolean Functions with Arbitrary Ranges
Hayato Shikata, Daiki Miyahara and Takaaki Mizuki

---

04:40 PM - 04:45 PM
Closing Remarks

(02:00 PM - 04:40 PM)
Venue: Monash 1

---

02:00 PM - 02:10 PM
Welcome

---

02:10 PM - 03:00 PM

Keynote: Privacy Compliance in Emerging Applications
by Prof. Guangdong Bai

---

03:00 PM - 03:15 PM
Coffee Break

---

[Paper Session I]
Session Chair: TBA

03:15 PM - 03:35 PM

SECBlock-IIoT: A Secure Blockchain-enabled Edge Computing Framework for Industrial Internet of Things
A. S. M. Sanwar Hosen, Pradip Kumar Sharma, Deepak Puthal, In-Ho Ra and Gi Hwan Cho

03:35 PM - 03:55 PM

WinkFuzz: model-based script synthesis for fuzzing
Zian Liu, Chao Chen, Ejaz Ahmed, Jun Zhang and Dongxi Liu

---

[Paper Session II]
Session Chair: TBA

04:00 PM - 04:20 PM

A Blockchain-Based False Data Detection Architecture for the Autonomous Vehicular Systems
Ziaur Rahman, Xun Yi, Ibrahim Khalil, Adnan Anwar and Shantanu Pal

04:20 PM - 04:40 PM

BDFL: A Blockchain-enabled FL Framework for Edge-based Smart UAV Delivery Systems
Chengzu Dong, Zhiyu Xu, Frank Jiang, Shantanu Pal, Chong Zhang, Shiping Chen and Xiao Liu

(09:00 AM - 05:00 PM)
Venue: Parliament

---

09:00 AM - 09:10 AM
Workshop Opening

---

09:10 AM - 09:50 AM

Keynote: The Dumbo Protocol Family: Making Asynchronous Consensus Real
by Dr. Qiang Tang
Session Chair: Siqi Ma

---

[BSCI Session 1]

09:50 AM - 10:10 AM

ForTrac: A Secure NFT-based Forward Traceability System for Providing Data Accuracy and Completeness
Fokke Heikamp (Deakin University, Australia), Lei Pan (Deakin University, Australia), Rolando Trujillo (Universitat Rovira i Virgili, Spain), Sushmita Ruj (UNSW, Australia) and Robin Doss (Deakin University, Australia)

10:10 AM - 10:30 AM

Trusted Sharing of Autonomous Vehicle Crash Data using Enterprise Blockchain and IPFS
Akarsh Singh (Indian Institute of Technology Kharagpur, India), Shounak Sural (Carnegie Mellon University, USA), Tirthankar Sengupta (Indian Institute of Technology Kharagpur, India) and Shamik Sural (Indian Institute of Technology Kharagpur, India)

10:30 AM - 10:50 AM

Liquid Democracy in DPoS Blockchains
Chao Li (Beijing Jiaotong University, China), Runhua Xu (Beihang University, China) and Li Duan (Beijing Jiaotong University, China)

---

10:50 AM - 11:05 AM
Coffee Break

---

[BSCI Session 2]

11:05 AM - 11:25 AM

Blockchain-empowered Search over Encrypted Data with Forward and Backward Privacy
Shaolong Tang (Beijing Institute of Technology, China), Jie Liu (Beijing Institute of Technology, China), Xiaoyao Luo (Beijing Institute of Technology, China), Peng Jiang (Beijing Institute of Technology, China), Keke Gai (Beijing Institute of Technology, China), Lei Xu (Beijing Institute of Technology, China) and Liehuang Zhu (Beijing Institute of Technology, China)

11:25 AM - 11:45 AM

A Framework for User-Centric Visualisation of Blockchain Transactions in Critical Infrastructure
Samantha Tharani Jeyakumar (Griffith University, Australia), Ryan Ko (The University of Queensland, Australia) and Vallipuram Muthukkumarasamy (Griffith University, Australia)

11:45 AM - 12:05 PM

DCSS: A Smart Contract-based Data Continuous Storage Scheme
Kun Wang (Beihang University, China), Qianhong Wu (Beihang University, China), Tianxu Han (Beihang University, China), Yujue Wang (Beihang University, China), Yingmiao Zhang (Beijing Jiaotong University, China) and Bo Qin (Renmin University of China, China)

---

12:05 PM - 01:00 PM
Lunch

---

[BSCI Session 3]

01:00 PM - 01:20 PM

Digital Twins and Blockchain for IoT Management
Mayra Samaniego (University of Saskatchewan, Canada) and Ralph Deters (University of Saskatchewan, Canada)

01:20 PM - 01:40 PM

Avoiding the 1 TB Storage Wall: Leveraging Ethereum's DHT to Reduce Peer Storage Needs
Jean-Philippe Eisenbarth (University of Luxembourg, France), Thibault Cholez (Universite de Lorraine, France) and Olivier Perrin (Universite de Lorraine, France)

01:40 PM - 02:00 PM

Decentralized Translator of Trust: Supporting Heterogeneous TEE for Critical Infrastructure Protection
Rabimba Karanjai (University of Houston, USA), Rowan Collier (Kent State University, USA), Zhimin Gao (University of Houston, USA), Lin Chen (Texas Tech University, USA), Xinxin Fan (IoTex, USA), Taeweon Suh (Korea University, South Korea), Weidong Shi (University of Houston, USA) and Lei Xu (Kent State University, USA)

---

02:00 PM - 02:15 PM
Coffee Break

---

[BSCI Session 4]

02:15 PM - 02:35 PM

A Blockchain-based Co-Simulation Platform for Transparent and Fair Energy Trading and Management
Ye Chen (Santa Clara University, USA), Peilin Wu (Shenzhen University, China), Yuanliang Li (Concordia University, USA), Yuhong Liu (Santa Clara University, USA), Peng Zhang (Shenzhen University, China), Jun Yan (Concordia University, USA) and Mohsen Ghafouri (Concordia University, USA)

02:35 PM - 02:55 PM

An Analysis of Important Factors Affecting the Success of Blockchain Smart Contract Security Vulnerability Scanning Tools
Cynthia Yi Min Chee (Deakin University, Australia), Shantanu Pal (Deakin University, Australia), Lei Pan (Deakin University, Australia) and Robin Doss (Deakin University, Australia)

02:55 PM - 03:15 PM

Efficient Balancing A* Search for Multi-robot Collaboration With Blockchain Consensus
Erteng Liu (Zhejiang University, China), Rui Shen (Zhejiang University, China), Tianchi Lu (Zhejiang University, China), Jianhai Chen (Zhejiang University, China) and Butian Huang (Hangzhou Yunphant Network Technology co. LTD, China)

03:15 PM - 03:35 PM

An Asynchronous Chain and A Variable Bulk Arrival and Asynchronous Bulk Service Model
Jongho Seol (Middle Geogia State University, USA) and Nohpill Park (Oklahoma State University, USA)

---

[BSCI Short Paper & Poster Session]

03:35 PM - 03:55 PM

Smart contract symbol execution vulnerability detection method based on CFG path pruning
Yichuan Wang (Xi'an University of Technology, China), Jingjing Zhao (Xi'an University of Technology, China), Yaling Zhang (Xi'an University of Technology, China), Xinhong Hei (Xi'an University of Technology, China) and Lei Zhu (Xi'an University of Technology, China)

03:55 PM - 04:15 PM

Fruits Detections Using Single Shot MultiBox Detector
Md Ali (Rider University, USA), Chris Keller (Rider University, USA) and Michael Huang (Rider University, USA)

---

04:15 PM - 04:20 PM
Closing Remarks

(08:50 AM - 01:00 PM)
Venue: Monash 1

---

08:50 AM - 09:00 AM
Workshop Opening

---

09:00 AM - 10:00 AM

Keynote I: Data security & privacy in IoT MGC Architectures
by Prof. Robert Deng
Session Chair: Jianying Zhou

---

10:00 AM - 11:00 AM

Keynote II: Digital twins: double insecurity for industrial scenarios
by Prof. Cristina Alcaraz
Session Chair: Jianying Zhou

---

11:00 AM - 11:15 AM
Coffee Break

---

[Session I: Intrusion Detection in Cyber-Physical Systems]
Session Chair: Rodrigo Roman

11:15 AM - 11:30 AM

PAID: Perturbed Image Attacks Analysis and Intrusion Detection Mechanism for Autonomous Driving Systems
K. Z. Teng, T. Limbasiya, F. Turrin, Y. L. Aung, S. Chattopadhyay, J. Zhou and M. Conti

11:30 AM - 11:45 AM

A Practical Intrusion Detection System Trained on Ambiguously Labeled Data for Enhancing IIoT Security
W. Yang, Z. Chu, J. Fan, Z. Liu and K. Y. Lam

11:45 AM - 12:00 PM

Anomaly Detection Framework for Securing Next Generation Networks of Platoons of Autonomous Vehicles in a Vehicle-to-Everything System
S. Nazat and M. Abdallah

---

[Session II: Cybersecurity in Industrial Control Systems]
Session Chair: Jianying Zhou

12:00 PM - 12:15 PM

Blind Concealment from Reconstruction-based Attack Detectors for Industrial Control Systems via Backdoor Attacks
T. Walita, A. Erba, J. H. Castellanos and N. O. Tippenhauer

12:15 PM - 12:30 PM

Preventing Reverse Engineering of Control Programs in Industrial Control Systems
S. Banerjee, S. D. Galbraith, T. Khan, J. H. Castellanos and G. Russello

12:30 PM - 12:45 PM

ICSML: Industrial Control Systems ML Framework for native inference using IEC 61131-3 code
C. Doumanidis, P. Rajput and M. Maniatakos

---

12:45 PM - 01:00 PM
Conclusion

(08:50 AM - 01:25 PM)
Venue: Treasury

---

08:50 AM - 09:00 AM
Workshop Opening

---

09:00 AM - 10:00 AM

Keynote I: Attacking Machine Learning Models
by Prof. Yang Zhang
Session Chair: Jason Xue

---

10:00 AM - 11:00 AM

Keynote II: Adversarial Attacks and Defenses in Deep Learning: from a Perspective of Cybersecurity
by Prof. Tianqing Zhu
Session Chair: Shangqi Lai

---

11:00 AM - 11:15 AM
Coffee Break

---

[Session I: Privacy-Preserving Machine Learning]
Session Chair: Xiaoning (Maggie) Liu

11:15 AM - 11:30 AM

Privacy-Enhanced Knowledge Transfer with Collaborative Split Learning over Teacher Ensembles
Ziyao Liu (Nanyang Technological University), Jiale Guo (Nanyang Technological University), Mengmeng Yang (Data61, CSIRO), Wenzhuo Yang (Nanyang Technological University), Jiani Fan (Nanyang Technological University), Kwok-Yan Lam (Nanyang Technological University)

11:30 AM - 11:45 AM

Privacy-Preserving Distributed Machine Learning Made Faster
Zoe L. Jiang (Harbin Institute of Technology, Shenzhen & Peng Cheng Laboratory), Jiajing Gu (Harbin Institute of Technology, Shenzhen), Hongxiao Wang (University of Hong Kong); Yulin Wu (Harbin Institute of Technology, Shenzhen & Guangdong Provincial Key Laboratory of Novel Security Intelligence Technologies), Junbin Fang (Jinan University), Siu-Ming Yiu (The University of Hong Kong), Wenjian Luo (Harbin Institute of Technology, Shenzhen & Guangdong Provincial Key Laboratory of Novel Security Intelligence Technologies), Xuan Wang (Harbin Institute of Technology, Shenzhen & Guangdong Provincial Key Laboratory of Novel Security Intelligence Technologies)

---

[Session II: Security in On-device Machine Learning]
Session Chair: Ruoxi Sun

11:45 PM - 12:00 PM

Beyond the Model: Data Pre-processing Attack to Deep Learning Models in Android Apps
Ye Sang (Monash University), Yujin Huang (Monash University), Shuo Huang (Monash University), Helei Cui (Northwestern Polytechnical University)

12:00 PM - 12:15 PM

Energy-Latency Attacks to On-Device Neural Networks via Sponge Poisoning
Zijian Wang (Monash University), Shuo Hang (Monash University), Yujin Huang (Monash University), Helei Cui (Northwestern Polytechnical University)

---

[Session III: Attacks and Defences]
Session Chair: Tingmin (Tina) Wu

12:15 PM - 12:30 PM

Multi-class Detection for Off The Shelf transfer-based Black Box Attacks
Niklas Bunzel (Fraunhofer SIT/ ATHENE), Dominic Böringer (TU-Darmstadt)

12:30 PM - 12:45 PM

Membership Inference Vulnerabilities in Peer to Peer Federated Learning
Alka Luqman (Nanyang Technological University), Anupam Chattopadhyay (Nanyang Technological University), Kwok-Yan Lam (Nanyang Technological University)

---

[Session III: Adversarial Attacks in Physical World]
Session Chair: Huaming Chen

12:45 PM - 01:00 PM

Toward Evaluating the Robustness of Deep Learning Based Rain Removal Algorithm in Autonomous Driving
Yiming Qin (Monash University), Jincheng Hu (Loughborough University), Bang Wu (Monash University)

01:00 PM -01:15 PM

A First Look at the Security of EEG-based Systems and Intelligent Algorithms under Physical Signal Injections
Md Imran Hossen (University of Louisiana at Lafayette), Yazhou Tu (University of Louisiana at Lafayette), Xiali Hei (University of Louisiana at Lafayette)

---

01:15 PM - 01:25 PM
Conclusion

(12:50 PM - 05:00 PM)
Venue: Monash 2

---

12:50 PM - 01:00 PM
Workshop Opening (Sharif Abuadbba)

---

01:00 PM - 01:45 PM

Keynote: Temporal Evolution of Human Perceptions and Detection of Deepfakes: An Empirical Study
by Prof. Ganna Pogrebna
Session Chair: Sharif Abuadbba

---

[Full & Short Papers]

Session Chair: Kristen Moore

01:45 PM - 02:00 PM

On the Application of Synthetic Media to Penetration Testing
Nathalia Soares, Steven Seiden, Ibrahim Baggili and Andrew Webb

02:00 PM - 02:15 PM

Exploiting Inconsistencies in Object Representations for DeepFake Video Detection
Kishor Kumar Bhaumik and Simon S. Woo

02:15 PM - 02:30 PM

Deepfake in the Metaverse: Security Implications for Virtual Gaming, Meetings, and Offices
Shahroz Tariq, Alsharif Abuadbba and Kristen Moore

---

02:30 PM - 02:45 PM
Coffee Break

---

02:45 PM - 03:45 PM

Panel Discussion: Security Implications of Deepfakes and Potential Threats
Panel Members: Kendra Vant (Xero), Asher Flynn (Monash University), Rob Cover (RMIT University), Shahroz Tariq (CSIRO's Data61)
Moderator: Sharif Abuadbba

---

[Poster and Discussion Papers]

Session Chair: Shahroz Tariq

03:45 PM - 04:00 PM

The Threat of Real Time Deepfakes
Guy Frankovits and Yisroel Mirsky

04:00 PM - 04:15 PM

Why Do Facial Deepfake Detectors Fail?
JBinh Le, Shahroz Tariq, Alsharif Abuadbba, Kristen Moore and Simon Woo

04:15 PM - 04:30 PM

GAN Discriminator based Audio Deepfake Detection
hien Phuc Doan, Kihun Hong and Souhwan Jung

---

04:30 PM - 05:00 PM
Closing Remarks (Kristen Moore) and Wrap-up

  • 02:00 PM - 02:05 PMWelcome
    02:05 PM - 02:50 PMKeynote: Post-Quantum Zero-Knowledge Proofs and Applications
    by Prof. Ron Steinfeld
    02:50 PM - 03:05 PMCoffee Break
    03:05 PM - 03:45 PMSession 1: Post-Quantum Cryptography
    03:05 PM - 03:25 PMSoK: On Efficacy of the BGF Decoder for QC-MDPC-based Quantum-Safe Cryptosystems
    Syed Wajid Ali Shah, Mohammad Nosouhi, Lei Pan and Robin Doss
    03:25 PM - 03:45 PMBreaking a Fifth-Order Masked Implementation of CRYSTALS-Kyber by Copy-Paste
    Elena Dubrova, Kalle Ngo, Joel Gärtner and Ruize Wang
    03:45 PM - 04:00 PMCoffee Break
    04:00 PM - 04:40 PMSession 2: Cryptographic Protocols
    04:00 PM - 04:20 PMDesignated Verifier Signature with Claimability
    Kyosuke Yamashita, Keisuke Hara, Yohei Watanabe, Naoto Yanai and Junji Shikata
    04:20 PM - 04:40 PMFew-helping-card Protocols for Some Wider Class of Symmetric Boolean Functions with Arbitrary Ranges
    Hayato Shikata, Daiki Miyahara and Takaaki Mizuki
    04:40 PM - 04:45 PMClosing Remarks

  • 02:00 PM - 02:10 PMWelcome
    02:10 PM - 03:00 PMKeynote: Privacy Compliance in Emerging Applications
    by Prof. Guangdong Bai
    03:00 PM - 03:15 PMCoffee Break
    03:15 PM - 03:55 PMPaper Session I
    Session Chair: TBA
    03:15 PM - 03:35 PMSECBlock-IIoT: A Secure Blockchain-enabled Edge Computing Framework for Industrial Internet of Things
    A. S. M. Sanwar Hosen, Pradip Kumar Sharma, Deepak Puthal, In-Ho Ra and Gi Hwan Cho
    03:35 PM - 03:55 PMWinkFuzz: model-based script synthesis for fuzzing
    Zian Liu, Chao Chen, Ejaz Ahmed, Jun Zhang and Dongxi Liu
    04:00 PM - 04:40 PMPaper Session II
    Session Chair: TBA
    04:00 PM - 04:20 PMA Blockchain-Based False Data Detection Architecture for the Autonomous Vehicular Systems
    Ziaur Rahman, Xun Yi, Ibrahim Khalil, Adnan Anwar and Shantanu Pal
    04:20 PM - 04:40 PMBDFL: A Blockchain-enabled FL Framework for Edge-based Smart UAV Delivery Systems
    Chengzu Dong, Zhiyu Xu, Frank Jiang, Shantanu Pal, Chong Zhang, Shiping Chen and Xiao Liu

  • 09:00 AM - 09:10 AMWorkshop Opening
    09:10 AM - 09:50 AMKeynote: The Dumbo Protocol Family: Making Asynchronous Consensus Real
    by Dr. Qiang Tang
    Session Chair: Siqi Ma
    09:50 AM - 10:50 AMBSCI Session 1
    09:50 AM - 10:10 AMForTrac: A Secure NFT-based Forward Traceability System for Providing Data Accuracy and Completeness
    Fokke Heikamp (Deakin University, Australia), Lei Pan (Deakin University, Australia), Rolando Trujillo (Universitat Rovira i Virgili, Spain), Sushmita Ruj (UNSW, Australia) and Robin Doss (Deakin University, Australia)
    10:10 AM - 10:30 AMTrusted Sharing of Autonomous Vehicle Crash Data using Enterprise Blockchain and IPFS
    Akarsh Singh (Indian Institute of Technology Kharagpur, India), Shounak Sural (Carnegie Mellon University, USA), Tirthankar Sengupta (Indian Institute of Technology Kharagpur, India) and Shamik Sural (Indian Institute of Technology Kharagpur, India)
    10:30 AM - 10:50 AMLiquid Democracy in DPoS Blockchains
    Chao Li (Beijing Jiaotong University, China), Runhua Xu (Beihang University, China) and Li Duan (Beijing Jiaotong University, China)
    10:50 AM - 11:05 AMCoffee Break
    11:05 AM - 12:05 PMBSCI Session 2
    11:05 AM - 11:25 AMBlockchain-empowered Search over Encrypted Data with Forward and Backward Privacy
    Shaolong Tang (Beijing Institute of Technology, China), Jie Liu (Beijing Institute of Technology, China), Xiaoyao Luo (Beijing Institute of Technology, China), Peng Jiang (Beijing Institute of Technology, China), Keke Gai (Beijing Institute of Technology, China), Lei Xu (Beijing Institute of Technology, China) and Liehuang Zhu (Beijing Institute of Technology, China)
    11:25 AM - 11:45 AMA Framework for User-Centric Visualisation of Blockchain Transactions in Critical Infrastructure
    Samantha Tharani Jeyakumar (Griffith University, Australia), Ryan Ko (The University of Queensland, Australia) and Vallipuram Muthukkumarasamy (Griffith University, Australia)
    11:45 AM - 12:05 PMDCSS: A Smart Contract-based Data Continuous Storage Scheme
    Kun Wang (Beihang University, China), Qianhong Wu (Beihang University, China), Tianxu Han (Beihang University, China), Yujue Wang (Beihang University, China), Yingmiao Zhang (Beijing Jiaotong University, China) and Bo Qin (Renmin University of China, China)
    12:05 PM - 01:00 PMLunch
    01:00 PM - 02:00 PMBSCI Session 3
    01:00 PM - 01:20 PMDigital Twins and Blockchain for IoT Management
    Mayra Samaniego (University of Saskatchewan, Canada) and Ralph Deters (University of Saskatchewan, Canada)
    01:20 PM - 01:40 PMAvoiding the 1 TB Storage Wall: Leveraging Ethereum's DHT to Reduce Peer Storage Needs
    Jean-Philippe Eisenbarth (University of Luxembourg, France), Thibault Cholez (Universite de Lorraine, France) and Olivier Perrin (Universite de Lorraine, France)
    01:40 PM - 02:00 PMDecentralized Translator of Trust: Supporting Heterogeneous TEE for Critical Infrastructure Protection
    Rabimba Karanjai (University of Houston, USA), Rowan Collier (Kent State University, USA), Zhimin Gao (University of Houston, USA), Lin Chen (Texas Tech University, USA), Xinxin Fan (IoTex, USA), Taeweon Suh (Korea University, South Korea), Weidong Shi (University of Houston, USA) and Lei Xu (Kent State University, USA)
    02:00 PM - 02:15 PMCoffee Break
    02:15 PM - 03:35 PMBSCI Session 4
    02:15 PM - 02:35 PMA Blockchain-based Co-Simulation Platform for Transparent and Fair Energy Trading and Management
    Ye Chen (Santa Clara University, USA), Peilin Wu (Shenzhen University, China), Yuanliang Li (Concordia University, USA), Yuhong Liu (Santa Clara University, USA), Peng Zhang (Shenzhen University, China), Jun Yan (Concordia University, USA) and Mohsen Ghafouri (Concordia University, USA)
    02:35 PM - 02:55 PMAn Analysis of Important Factors Affecting the Success of Blockchain Smart Contract Security Vulnerability Scanning Tools
    Cynthia Yi Min Chee (Deakin University, Australia), Shantanu Pal (Deakin University, Australia), Lei Pan (Deakin University, Australia) and Robin Doss (Deakin University, Australia)
    02:55 PM - 03:15 PMEfficient Balancing A* Search for Multi-robot Collaboration With Blockchain Consensus
    Erteng Liu (Zhejiang University, China), Rui Shen (Zhejiang University, China), Tianchi Lu (Zhejiang University, China), Jianhai Chen (Zhejiang University, China) and Butian Huang (Hangzhou Yunphant Network Technology co. LTD, China)
    03:15 PM - 03:35 PMAn Asynchronous Chain and A Variable Bulk Arrival and Asynchronous Bulk Service Model
    Jongho Seol (Middle Geogia State University, USA) and Nohpill Park (Oklahoma State University, USA)
    03:35 PM - 04:15 PMBSCI Short Paper & Poster Session
    03:35 PM - 03:55 PMSmart contract symbol execution vulnerability detection method based on CFG path pruning
    Yichuan Wang (Xi'an University of Technology, China), Jingjing Zhao (Xi'an University of Technology, China), Yaling Zhang (Xi'an University of Technology, China), Xinhong Hei (Xi'an University of Technology, China) and Lei Zhu (Xi'an University of Technology, China)
    03:55 PM - 04:15 PM Fruits Detections Using Single Shot MultiBox Detector
    Md Ali (Rider University, USA), Chris Keller (Rider University, USA) and Michael Huang (Rider University, USA)
    04:15 PM - 04:20 PMClosing Remark

  • 08:50 AM - 09:00 AM Opening
    09:00 AM - 10:00 AM Keynote I: Data security & privacy in IoT MGC Architectures
    by Prof. Robert Deng
    Session Chair: Jianying Zhou
    10:00 AM - 11:00 AM Keynote II: Digital twins: double insecurity for industrial scenarios
    by Prof. Cristina Alcaraz
    Session Chair: Jianying Zhou
    11:00 AM - 11:15 AM Coffee Break
    11:15 AM - 12:00 AM Session I: Intrusion Detection in Cyber-Physical Systems
    Session Chair: Rodrigo Roman
    11:15 AM - 11:30 AM PAID: Perturbed Image Attacks Analysis and Intrusion Detection Mechanism for Autonomous Driving Systems
    K. Z. Teng, T. Limbasiya, F. Turrin, Y. L. Aung, S. Chattopadhyay, J. Zhou and M. Conti
    11:30 AM - 11:45 AM A Practical Intrusion Detection System Trained on Ambiguously Labeled Data for Enhancing IIoT Security
    W. Yang, Z. Chu, J. Fan, Z. Liu and K. Y. Lam
    11:45 AM - 12:00 PM Anomaly Detection Framework for Securing Next Generation Networks of Platoons of Autonomous Vehicles in a Vehicle-to-Everything System
    S. Nazat and M. Abdallah
    12:00 PM - 12:45 PM Session II: Cybersecurity in Industrial Control Systems
    Session Chair: Jianying Zhou
    12:00 PM - 12:15 PM Blind Concealment from Reconstruction-based Attack Detectors for Industrial Control Systems via Backdoor Attacks
    T. Walita, A. Erba, J. H. Castellanos and N. O. Tippenhauer
    12:15 PM - 12:30 PM Preventing Reverse Engineering of Control Programs in Industrial Control Systems
    S. Banerjee, S. D. Galbraith, T. Khan, J. H. Castellanos and G. Russello
    12:30 PM - 12:45 PM ICSML: Industrial Control Systems ML Framework for native inference using IEC 61131-3 code
    C. Doumanidis, P. Rajput and M. Maniatakos
    12:45 PM - 01:00 PM Conclusion

  • 08:50 AM - 09:00 AM Opening
    09:00 AM - 10:00 AM Keynote I: Attacking Machine Learning Models
    by Prof. Yang Zhang
    Session Chair: Jason Xue
    10:00 AM - 11:00 AM Keynote II: Adversarial Attacks and Defenses in Deep Learning: from a Perspective of Cybersecurity
    by Prof. Tianqing Zhu
    Session Chair: Shangqi Lai
    11:00 AM - 11:15 AM Coffee Break
    11:15 AM - 11:45 AM Session I: Privacy-Preserving Machine Learning
    Session Chair: Xiaoning (Maggie) Liu
    11:15 AM - 11:30 AM Privacy-Enhanced Knowledge Transfer with Collaborative Split Learning over Teacher Ensembles
    Ziyao Liu (Nanyang Technological University), Jiale Guo (Nanyang Technological University), Mengmeng Yang (Data61, CSIRO), Wenzhuo Yang (Nanyang Technological University), Jiani Fan (Nanyang Technological University), Kwok-Yan Lam (Nanyang Technological University)
    11:30 AM - 11:45 AM Privacy-Preserving Distributed Machine Learning Made Faster
    Zoe L. Jiang (Harbin Institute of Technology, Shenzhen & Peng Cheng Laboratory), Jiajing Gu (Harbin Institute of Technology, Shenzhen), Hongxiao Wang (University of Hong Kong); Yulin Wu (Harbin Institute of Technology, Shenzhen & Guangdong Provincial Key Laboratory of Novel Security Intelligence Technologies), Junbin Fang (Jinan University), Siu-Ming Yiu (The University of Hong Kong), Wenjian Luo (Harbin Institute of Technology, Shenzhen & Guangdong Provincial Key Laboratory of Novel Security Intelligence Technologies), Xuan Wang (Harbin Institute of Technology, Shenzhen & Guangdong Provincial Key Laboratory of Novel Security Intelligence Technologies)
    11:45 AM - 12:15 PM Session II: Security in On-device Machine Learning
    Session Chair: Ruoxi Sun
    11:45 PM - 12:00 PM Beyond the Model: Data Pre-processing Attack to Deep Learning Models in Android Apps
    Ye Sang (Monash University), Yujin Huang (Monash University), Shuo Huang (Monash University), Helei Cui (Northwestern Polytechnical University)
    12:00 PM - 12:15 PM Energy-Latency Attacks to On-Device Neural Networks via Sponge Poisoning
    Zijian Wang (Monash University), Shuo Hang (Monash University), Yujin Huang (Monash University), Helei Cui (Northwestern Polytechnical University)
    12:15 PM - 12:45 PM Session III: Attacks and Defences
    Session Chair: Tingmin (Tina) Wu
    12:15 PM - 12:30 PM Multi-class Detection for Off The Shelf transfer-based Black Box Attacks
    Niklas Bunzel (Fraunhofer SIT/ ATHENE), Dominic Böringer (TU-Darmstadt)
    12:30 PM - 12:45 PM Membership Inference Vulnerabilities in Peer to Peer Federated Learning
    Alka Luqman (Nanyang Technological University), Anupam Chattopadhyay (Nanyang Technological University), Kwok-Yan Lam (Nanyang Technological University)
    12:45 PM - 01:15 PM Session III: Adversarial Attacks in Physical World
    Session Chair: Huaming Chen
    12:45 PM - 01:00 PM Toward Evaluating the Robustness of Deep Learning Based Rain Removal Algorithm in Autonomous Driving
    Yiming Qin (Monash University), Jincheng Hu (Loughborough University), Bang Wu (Monash University)
    01:00 PM -01:15 PM A First Look at the Security of EEG-based Systems and Intelligent Algorithms under Physical Signal Injections
    Md Imran Hossen (University of Louisiana at Lafayette), Yazhou Tu (University of Louisiana at Lafayette), Xiali Hei (University of Louisiana at Lafayette)
    01:15 PM - 01:25 PM Conclusion

  • 12:50 PM - 01:00 PMWelcome (Sharif Abuadbba)
    01:00 PM - 01:45 PMKeynote: Temporal Evolution of Human Perceptions and Detection of Deepfakes: An Empirical Study
    by Prof. Ganna Pogrebna
    Session Chair: Sharif Abuadbba
    01:45 PM - 02:30 PMFull & Short Papers
    Session Chair: Shahroz Tariq
    01:45 PM - 02:00 PMOn the Application of Synthetic Media to Penetration Testing
    Nathalia Soares, Steven Seiden, Ibrahim Baggili and Andrew Webb
    02:00 PM - 02:15 PMExploiting Inconsistencies in Object Representations for DeepFake Video Detection
    Kishor Kumar Bhaumik and Simon S. Woo
    02:15 PM - 02:30 PMDeepfake in the Metaverse: Security Implications for Virtual Gaming, Meetings, and Offices
    Shahroz Tariq, Alsharif Abuadbba and Kristen Moore
    02:30 PM - 02:45 PMCoffee Break
    02:45 PM - 03:45 PMPanel Discussion: Security Implications of Deepfakes and Potential Threats
    Panel Members: Kendra Vant (Xero), Asher Flynn (Monash University), Rob Cover (RMIT University), Shahroz Tariq (CSIRO's Data61)
    Moderator: Sharif Abuadbba
    03:45 PM - 04:30 PMPoster and Discussion Papers
    Session Chair: Kristen Moore
    03:45 PM - 04:00 PMThe Threat of Real Time Deepfakes
    Guy Frankovits and Yisroel Mirsky
    04:00 PM - 04:15 PMWhy Do Facial Deepfake Detectors Fail?
    Binh Le, Shahroz Tariq, Alsharif Abuadbba, Kristen Moore and Simon Woo
    04:15 PM - 04:30 PMGAN Discriminator based Audio Deepfake Detection
    Thien Phuc Doan, Kihun Hong and Souhwan Jung
    04:30 PM - 05:00 PMClosing Remarks (Kristen Moore) and Networking 

Venue Map