AsiaJCIS 2024 Program
Aug. 12, 2024 (Mon.) | Aug. 13, 2024 (Tue.) | Aug. 14, 2024 (Wed.)
Aug. 12, 2024 (Mon.)
18:00 – 20:00 | Welcome Reception (Tokyia) |
---|
Aug. 13, 2024 (Tue.)
9:00 – 10:00 | On-site Registration | ||
---|---|---|---|
10:00 – 10:15 |
|
||
10:15 – 11:05 | Keynote (Session Chair: Chun-I Fan (National Sun Yat-sen University)) Professor Felix Wu, National Cheng Kung University Title: A Generative Approach for Analyzing Disinformation and Network Propaganda |
||
11:05 – 11:10 | Break | ||
11:10 – 12:00 | Invited Talk #1 (Session Chair: Iuon-Chang Lin (NCHU)) Professor Meng Shen, Beijing Institute of Technology Title: Real-Time Website Fingerprinting Defense via Traffic Cluster Anonymization |
||
12:00 – 13:00 | Lunch | ||
13:00 – 14:40 | SESSION 1: Cryptography (Session Chair: Yun-Hsin Chuang (NCKU)) |
Bit-Based MILP Modelling of Non-Bit-Permutation Linear Layers for Linear Cryptanalysis (Regular Paper) | Abhilash Das |
Cryptanalysis of PiLike: An Impersonation Attack on the Lightweight Identity-Based Authentication Key Exchange Protocol Using Bi-ISIS (Regular Paper) | Hao-Yi Hsu, Hsin-Yi Lin, Rayling Tso, Tao-Hsiang Chang and Jen-Chieh Hsu | ||
A Study of Fully Homomorphic Encryption with Evaluation Control (Regular Paper) | Kenneth-Kuan-Phing Ong, Bo-Yu Chen, Po-Wen Chi and Chao Wang | ||
Consideration on Defining Field for Efficient Ring-LWE (Regular Paper) | Rintaro Yamada, Shinya Okumura and Atsuko Miyaji | ||
ID-Based Traitor Tracing with Relaxed Black-Box Setting for Group-Based Applications (Regular Paper) | Yi-Fan Tseng, Raylin Tso, Shi-Sheng Sun, Zi Yuan Liu and You-Qian Chen | ||
14:40 – 15:00 | Break | ||
15:00 – 16:25 | SESSION 2: System Security (Session Chair: Jason Lin (NCHU)) |
An Identity Management System using Group Signatures with Message-Dependent Opening (Regular Paper) | Yuto Imura and Keita Emura |
Evading IoT Intrusion Detection Systems with GAN (Regular Paper) | Mariama Mbow, Rodrigo Román, Takeshi Takahashi and Kouichi Sakurai | ||
A Pull Firmware Update Mechanism for Industrial Control Based on IOTA Stream (Short Paper) | Iuon-Chang Lin and Ling Bo | ||
Improving the Performance of IIoT Intrusion Detection System Using Hybrid Synthetic Data (Short Paper) | Chia-Mei Chen, Chi-Hsuen Hsu, Zheng-Xun Cai, Gu-Hsin Lai and Ya-Hui Ou | ||
CCADM: a Continuous Collection scheme for Anonymous Data Management (Short Paper) | Yun-Hsin Chuang, Po-Wen Chi and Ming-Hung Wang | ||
16:25 – 16:35 | Break | ||
16:35 - 17:15 | Poster Session (On-site) | ||
18:00 - 20:00 | Banquet |
Aug. 12, 2024 (Mon.) | Aug. 13, 2024 (Tue.) | Aug. 14, 2024 (Wed.)
Aug. 14, 2024 (Wed.)
8:30 – 9:15 | On-site Registration | ||
---|---|---|---|
9:15 – 10:05 | Invited Talk #2 (Session Chair: Akira Fujita, NICT) Professor D. Frank Hsu, Fordham University Title: Enhancing ML-Based DoS Attack Detection Through Model Fusion and Cognitive Diversity |
||
10:05 – 10:20 | Break | ||
10:20 – 12:00 | SESSION 3: Network Security and Application Security (Session Chair: Jun Lee (KISTI)) | Linear Retention Convolutional Network for Few-shot Network Threat Detection (Regular Paper) | Yong Ding, Zhi Li, Changsong Yang, Hai Liang, Siyuan Jia and Zhenyu Li |
Pairing-Free Identity-Based Encryption with Security Against the KGC (Short Paper) | Yi-Fan Tseng, Jheng-Jia Huang, Guan-Yu Chen, Wei-Hsueh Wang and Yu-Hsuan Chang | ||
An Effective Feature Selection Algorithm for Machine Learning-based Malicious Traffic Detection (Regular Paper) | Chao Fei, Nian Xia, Pang-Wei Tsai, Yang Lu, Xiaonan Pan and Junli Gong | ||
Secure and Portable Anonymous Credentials without Tamper-Resistant Hardware (Regular Paper) |
Tianshu Yu and Kunpeng Bai |
||
Security requirements for fully automated AI systems to exercise and ensure the rights of data subjects (Short Paper) | Junhyung Park, Gunsang You, Yeontae Ji and Heung Youl Youm | ||
12:00 – 13:00 | Lunch | ||
13:00 – 13:50 | Invited Talk #3 (Session Chair: Po-Wen Chi (NTNU)) Dr. Er-Shuo Zhuang, Information Security Research Center of National Sun Yat-sen University Title: Multi-Keyword Searchable Identity-Based Proxy Re-Encryption from Lattices |
||
13:50 – 14:00 | Break | ||
14:00 – 15:50 | SESSION 4: Information Security and Blockchain (Session Chair: Misato Matsuda, NICT) | Pairing based Multisignature with Message Flexibility (Regular Paper) | Kodai Hayashida and Atsuko Miyaji |
Backdoored-input Detection by Trigger Embedding (Regular Paper) | Akira Fujimoto, Shintaro Yamashita, Yuntao Wang and Atsuko Miyaji | ||
Proposal for Key-Value Commitments with offline batch update (Regular Paper) | Toshiyuki Mineta, Atsuko Miyaji and Hideaki Miyaji | ||
The Reality and Feature Analysis of Information Diffusion in Japanese Disinformation Examples (Short Paper) | Shuhei Ippa, Takao Okubo and Masaki Hashimoto | ||
Color Image Steganography with Authentication via Scalable Index Encoding (Regular Paper) | Min-Yu Liang, Yun-Chieh Chang and Jason Lin | ||
Adaptive Machine Learning Model For Dynamic Field Selection (Short Paper) | Yu Chi Lin and Po-Wen Chi | ||
15:50 – 16:00 | Best Paper Award Ceremony | ||
16:00 – 16:10 | Closing Remarks |