IEEE CNS 2017 Technical Program
Monday, October 9, 2017 | ||
9:45 – 11:15 | Session 1A: Privacy | |
Room: Social C | Session Chair: Linke Guo (Binghamton University) | |
Privacy-Preserving Inference in Crowdsourcing Systems Liyao Xiang and Baochun Li (University of Toronto, Canada); Bo Li (Hong Kong University of Science and Technology, Hong Kong) SPRIDE: Scalable and Private Continual Geo-Distance Evaluation for Precision Agriculture Qiben Yan (University of Nebraska-Lincoln, USA); Hao Yang (University of Nebraska Lincoln, USA); Mehmet Can Vuran and Suat Irmak (University of Nebraska-Lincoln, USA) Deanonymizing Mobility Traces With Co-Location Information Youssef Khazbak and Guohong Cao (The Pennsylvania State University, USA) PrivacyManager: An Access Control Framework for Mobile Augmented Reality Applications Sarah Lehman and Chiu C. Tan (Temple University, USA) |
||
9:45 – 11:15 | Session 1B: Cyber Deception | |
Room: Innovation | Session Chair: Yanmin Gong (Oklahoma State University) | |
CyberMoat: Camouflaging Critical Server Infrastructures with Large Scale Decoy Farms Jianhua Sun (College of William and Mary, USA); Kun Sun (George Mason University, USA); Qi Li (Tsinghua University, P.R. China) HoneyProxy: Design and Implementation of Next-Generation Honeynet via SDN Sukwha Kyung, Wonkyu Han, Naveen Tiwari, Vaibhav Dixit, Lakshmi Srinivas, Ziming Zhao, Adam Doupe and Gail-Joon Ahn (Arizona State University, USA) WebTrap: A Dynamic Defense Scheme Against Economic Denial of Sustainability Attacks Huangxin Wang, Zhonghua Xi, Fei Li and Songqing Chen (George Mason University, USA) |
||
11:30 – 13:00 | Session 2A: Wireless MIMO Security | |
Room: Social C | Session Chair: Ming Li (University of Arizona) | |
Fundamental Limits of Covert Communication over MIMO AWGN Channel Amr Abdelaziz (The Ohio State University & Military Technical College, USA); Can Emre Koksal (The Ohio State University, USA) Massive MIMO Pilot Distortion Attack and Zero-Startup-Cost Detection: Analysis and Experiments Xu Zhang and Edward W. Knightly (Rice University, USA) Pilot Contamination Attacks in Massive MIMO Systems Berk Akgun and Marwan Krunz (University of Arizona, USA); O. Ozan Koyluoglu (University of California, Berkeley, USA) Enabling Jamming-Resilient Communications in Wireless MIMO Networks Huacheng Zeng (University of Louisville, USA); Chen Cao (University of Lousiville, USA); Hongxiang Li (University of Louisville, USA); Qiben Yan (University of Nebraska-Lincoln, USA) |
||
11:30 – 13:00 | Session 2B: Malicious/Benign Inference | |
Room: Innovation | Session Chair: Chunyi Peng (Purdue University) | |
D-miner: A Framework for Mining, Searching, Visualizing, and Alerting on Darknet Events Heather Lawrence, Andrew Hughes, Robert Tonic and Cliff Zou (University of Central Florida, USA) OS Fingerprinting: New Techniques and a Study of Information Gain and Obfuscation Blake Anderson (Cisco Systems, Inc., USA); David McGrew (Cisco, USA) A Graph-Theoretic Approach to Virtual Access Point Correlation John Roth (Naval Postgraduate School, USA); Jeremy Martin (United States Naval Academy); Travis Mayberry (United States Naval Academy, USA) A Deep Belief Network Based Machine Learning System for Risky Host Detection Wangyan Feng and Shuning Wu (Symantec, USA); Xiaodan Li (Duke University, USA); Kevin Kunkle (Indiana University, USA) |
||
14:30 – 16:00 | Session 3A: System Security | |
Room: Social C | Session Chair: Ashraf Matrawy (Carleton University) | |
Secure Logging with Crash Tolerance Erik-Oliver Blass (Airbus Group Innovations, Germany); Guevara Noubir (Northeastern University, USA) Organizational Practices in Cryptographic Development and Testing Julie Haney (National Institute of Standards and Technology and Department of Defense); Simson L. Garfinkel (National Institute of Standards and Technology); Mary Theofanos (National Institute of Standards and Technology, USA) Data Verification in Information-Centric Networking with Efficient Revocable Certificateless Signature Qingji Zheng (Bosch Research and Technology Center, USA); Qi Li (Tsinghua University, P.R. China); Aytac Azgin (Huawei Research, USA); Jian Weng (Jinan University, P.R. China) Securing Cyber-Physical Systems with Adaptive Commensurate Response Zhiyuan Zheng (Texas A&M University, USA); Shan Jin (Texas A&M University, College Station, USA); Riccardo Bettati (Texas A&M University, USA); Narasimha Reddy (Texas A & M University, USA) |
||
14:30 – 16:00 | Session 3B: Attacks | |
Room: Innovation | Session Chair: Ming Li (University of Nevada) | |
Cyber Attacks on Remote Relays in Smart Grid Jiapeng Zhang and Yingfei Dong (University of Hawaii, USA) Ghost Telephonist Impersonates You: Vulnerability in 4G LTE CS Fallback Yuwei Zheng, Lin Huang, Haoqi Shan, Jun Li and Qing Yang (360 Technology); Wenyuan Xu (Zhejiang University, P.R. China) Evaluating Private Modes in Desktop and Mobile Browsers and Their Resistance to Fingerprinting Wu Yuanyi (Shanghai Tech University, P.R. China); Hao Chen (UC Davis, USA); Dongyu Meng (Shanghai Tech University, P.R. China) Backdoor Attacks against Learning Systems Yujie Ji, Xinyang Zhang and Ting Wang (Lehigh University, USA) |
||
16:30 – 18:00 | Session 4A: VANET Security | |
Room: Social C | Session Chair: Huacheng Zeng (University of Louisville) | |
QnQ: A Reputation Model to Secure Mobile Crowdsourcing Applications from Incentive Losses Shameek Bhattacharjee, Nirnay Ghosh, Vijay K. Shah and Sajal K. Das (Missouri University of Science and Technology, USA) A Data Trust Framework for VANETs Enabling False Data Detection and Secure Vehicle Tracking Mingshun Sun and Ming Li (University of Arizona, USA); Ryan Gerdes (Virginia Tech, USA) Protecting Vehicular Networks Privacy in the Presence of a Single Adversarial Authority Chang-Wu Chen (National Central University, Taiwan); Sang-Yoon Chang (University of Colorado Colorado Springs, USA); Yih-Chun Hu (University of Illinois at Urbana-Champaign, USA); Yen-Wen Chen (National Central University, Taiwan) |
||
16:30 – 18:00 | Session 4B: Cloud Security | |
Room: Innovation | Session Chair: Yao Liu (University of South Florida) | |
CAPIA: Cloud Assisted Privacy-preserving Image Annotation Yifan Tian (Embry-Riddle Aeronautical University, USA); Yantian Hou (Boise State University, USA); Jiawei Yuan (Embry-Riddle Aeronautical University, USA) Secure and Efficient Outsourcing of Large-Scale Nonlinear Programming Wei Du (University Of Arkansas, USA); Qinghua Li (University of Arkansas, USA) Secure Multi-Client Data Access with Boolean Queries in Distributed Key-Value Stores Xu Yuan (University of Toronto, Canada); Xingliang Yuan (City University of Hong Kong, Hong Kong); Baochun Li (University of Toronto, Canada); Cong Wang (City University of Hong Kong, Hong Kong) |
||
Tuesday, October 10, 2017 | ||
10:30 – 12:00 | Session 5A: DSA Security | |
Room: Social B | Session Chair: Xu Yuan (University of Louisiana at Lafayette) | |
Secure and Optimized Unauthorized Secondary User Detection in Dynamic Spectrum Access Xiaonan Zhang, Qi Jia and Linke Guo (Binghamton University, USA) When the Hammer Meets the Nail: Multi-Server PIR for Database-Driven CRN with Location Privacy Assurance Mohamed Grissa, Attila Altay Yavuz and Bechir Hamdaoui (Oregon State University, USA) Differential Location Privacy for Crowdsourced Spectrum Sensing Zonghao Huang and Yanmin Gong (Oklahoma State University, USA) Practical Privacy-Preserving Spectrum Query Schemes for Database-Driven CRNs with Multiple Service Providers Jiajun Xin and Ming Li (University of Nevada, Reno, USA); Linke Guo (Binghamton University, USA); Pan Li (Case Western Reserve University, USA) |
||
10:30 – 12:00 | Session 5B: Wireless Security | |
Room: Social C | Session Chair: Rui Zhang (University of Delaware) | |
An OFDM-based Dual Radar/Communication System Facing Uncertain Jamming Power Andrey Garnaev and Wade Trappe (WINLAB, Rutgers University, USA) Learning to Detect and Mitigate Cross-layer Attacks in Wireless Networks: Framework and Applications Liyang Zhang, Francesco Restuccia and Tommaso Melodia (Northeastern University, USA); Scott M Pudlewski (Air Force Research Laboratory, USA) Manipulatable Wireless Key Establishment Song Fang, Ian Markwood and Yao Liu (University of South Florida, USA) Secret Key Distribution Leveraging Color Shift Over Visible Light Channel Hongbo Liu (Indiana University-Purdue University Indianapolis, USA); Bo Liu, Cong Shi and Yingying Chen (Stevens Institute of Technology, USA) |
||
15:30 – 17:00 | Session 6: Mobile and IoT Security | |
Room: Social B | Session Chair: Qiben Yan (University of Nebraska-Lincoln) | |
ViViSnoop: Someone is Snooping Your Typing Without Seeing It! Kun Jin and Si Fang (The Ohio State University, USA); Chunyi Peng (Purdue University, USA); Zhiyang Teng (Singapore University of Technology and Design, Singapore); Xufei Mao (Tsinghua University, P.R. China); Lan Zhang and Xiang-Yang Li (University of Science and Technology of China, P.R. China) MTRA: Multiple-Tier Remote Attestation in IoT Networks Hailun Tan (UNSW, Australia); Sanjay Jha (University of New South Wales (UNSW), Australia); Gene Tsudik (University of CA, Irvine, USA) Composition Policies for Gesture Passwords: User Choice, Security, Usability and Memorability Gradeigh Clark and Janne Lindqvist (Rutgers University, USA); Antti Oulasvirta (Aalto University, Finland) Towards Physical Layer Identification of Cognitive Radio Devices Seth Andrews (Virgina Tech, USA); Ryan Gerdes (Virginia Tech, USA); Ming Li (University of Arizona, USA) |