Jump to the main content block

AsiaJCIS2024

:::

AsiaJCIS 2024 Program

Aug. 12, 2024 (Mon.)Aug. 13, 2024 (Tue.)Aug. 14, 2024 (Wed.)

Aug. 12, 2024 (Mon.)

18:00 – 20:00 Welcome Reception (Tokyia)

Aug. 13, 2024 (Tue.)

9:00 – 10:00 On-site Registration
10:00 – 10:15
  • Opening remark, Prof. Chun-I Fan (General Co-chair, National Sun Yat-sen University)
  • Welcoming remark (1), Mr. Koji Nakao (General Co-chair, NICT)
  • Welcoming remark (2), Prof. Heung Youl Youm (General Co-chair, Soonchunhyang University)
  • Welcoming remark (3), Prof. Yong Ding (General Co-chair, Guilin University of Electronic Technology)
10:15 – 11:05 Keynote (Session Chair: Chun-I Fan  (National Sun Yat-sen University)) 
Professor Felix Wu, National Cheng Kung University
Title: A Generative Approach for Analyzing Disinformation and Network Propaganda
11:05 – 11:10 Break
11:10 – 12:00 Invited Talk #1 (Session Chair: Iuon-Chang Lin  (NCHU))
Professor Meng Shen, Beijing Institute of Technology
Title: Real-Time Website Fingerprinting Defense via Traffic Cluster Anonymization
12:00 – 13:00 Lunch
13:00 – 14:40 SESSION 1: Cryptography
(Session Chair: Yun-Hsin Chuang (NCKU))
Bit-Based MILP Modelling of Non-Bit-Permutation Linear Layers for Linear Cryptanalysis (Regular Paper) Abhilash Das
Cryptanalysis of PiLike: An Impersonation Attack on the Lightweight Identity-Based Authentication Key Exchange Protocol Using Bi-ISIS (Regular Paper) Hao-Yi Hsu, Hsin-Yi Lin, Rayling Tso, Tao-Hsiang Chang and Jen-Chieh Hsu
A Study of Fully Homomorphic Encryption with Evaluation Control (Regular Paper) Kenneth-Kuan-Phing Ong, Bo-Yu Chen, Po-Wen Chi and Chao Wang
Consideration on Defining Field for Efficient Ring-LWE (Regular Paper) Rintaro Yamada, Shinya Okumura and Atsuko Miyaji
ID-Based Traitor Tracing with Relaxed Black-Box Setting for Group-Based Applications (Regular Paper) Yi-Fan Tseng, Raylin Tso, Shi-Sheng Sun, Zi Yuan Liu and You-Qian Chen
14:40 – 15:00 Break
15:00 – 16:25 SESSION 2: System Security
(Session Chair: Jason Lin  (NCHU))
An Identity Management System using Group Signatures with Message-Dependent Opening (Regular Paper) Yuto Imura and Keita Emura    
Evading IoT Intrusion Detection Systems with GAN (Regular Paper)     Mariama Mbow, Rodrigo Román, Takeshi Takahashi and Kouichi Sakurai
A Pull Firmware Update Mechanism for Industrial Control Based on IOTA Stream (Short Paper)  Iuon-Chang Lin and Ling Bo
Improving the Performance of IIoT Intrusion Detection System Using Hybrid Synthetic Data (Short Paper)  Chia-Mei Chen, Chi-Hsuen Hsu, Zheng-Xun Cai, Gu-Hsin Lai and Ya-Hui Ou   
CCADM: a Continuous Collection scheme for Anonymous Data Management (Short Paper) Yun-Hsin Chuang, Po-Wen Chi and Ming-Hung Wang     
16:25 – 16:35 Break
16:35 - 17:15 Poster Session (On-site)
18:00 - 20:00 Banquet

 

Aug. 12, 2024 (Mon.)Aug. 13, 2024 (Tue.)Aug. 14, 2024 (Wed.)

Aug. 14, 2024 (Wed.)

8:30 – 9:15 On-site Registration
9:15 – 10:05 Invited Talk #2 (Session Chair: Akira Fujita, NICT)
Professor D. Frank Hsu, Fordham University
Title: Enhancing ML-Based DoS Attack Detection Through Model Fusion and Cognitive Diversity
10:05 – 10:20 Break
10:20 – 12:00 SESSION 3: Network Security and Application Security (Session Chair: Jun Lee (KISTI)) Linear Retention Convolutional Network for Few-shot Network Threat Detection (Regular Paper) Yong Ding, Zhi Li, Changsong Yang, Hai Liang, Siyuan Jia and Zhenyu Li
Pairing-Free Identity-Based Encryption with Security Against the KGC (Short Paper) Yi-Fan Tseng, Jheng-Jia Huang, Guan-Yu Chen, Wei-Hsueh Wang and Yu-Hsuan Chang
An Effective Feature Selection Algorithm for Machine Learning-based Malicious Traffic Detection (Regular Paper) Chao Fei, Nian Xia, Pang-Wei Tsai, Yang Lu, Xiaonan Pan and Junli Gong

Secure and Portable Anonymous Credentials without Tamper-Resistant Hardware  (Regular Paper)          

Tianshu Yu and Kunpeng Bai

Security requirements for fully automated AI systems to exercise and ensure the rights of data subjects (Short Paper)         Junhyung Park, Gunsang You, Yeontae Ji and Heung Youl Youm
12:00 – 13:00 Lunch
13:00 – 13:50 Invited Talk #3 (Session Chair: Po-Wen Chi (NTNU))
Dr. Er-Shuo Zhuang, Information Security Research Center of National Sun Yat-sen University
Title: Multi-Keyword Searchable Identity-Based Proxy Re-Encryption from Lattices
13:50 – 14:00 Break
14:00 – 15:50 SESSION 4: Information Security and Blockchain (Session Chair: Misato Matsuda, NICT) Pairing based Multisignature with Message Flexibility (Regular Paper)     Kodai Hayashida and Atsuko Miyaji
Backdoored-input Detection by Trigger Embedding (Regular Paper) Akira Fujimoto, Shintaro Yamashita, Yuntao Wang and Atsuko Miyaji
Proposal for Key-Value Commitments with offline batch update (Regular Paper) Toshiyuki Mineta, Atsuko Miyaji and Hideaki Miyaji
The Reality and Feature Analysis of Information Diffusion in Japanese Disinformation Examples (Short Paper) Shuhei Ippa, Takao Okubo and Masaki Hashimoto
Color Image Steganography with Authentication via Scalable Index Encoding (Regular Paper)   Min-Yu Liang, Yun-Chieh Chang and Jason Lin 
Adaptive Machine Learning Model For Dynamic Field Selection (Short Paper)  Yu Chi Lin and Po-Wen Chi 
15:50 – 16:00 Best Paper Award Ceremony
16:00 – 16:10 Closing Remarks