ATIS PROGRAM‎ > ‎

Technical Programme

Programme in PDF: 27/11, 28/11

 November 27 (Thursday), 2014 @ Building BC, Room North1, Burwood
 11:30-12:30
 ATIS-2014 Registration
 Location: Building T
 12:00-13:00  Lunch (Level 1, Building T)
 13:00-13:05  Opening Welcome by ATIS-2014 Chair: Prof. Lynn Batten
 

13:05-14:00
 Invited Talk (I)
 Speaker: Associate Professor Jinqiao Shi, National Engineering Laboratory for  Information Security Technologies, China
 Topic : Towards Protecting Service Accessibility of Anonymous Communication  Systems: Catch  Me if You Can!
 Introduced by: Prof. Lynn Batten, Deakin University
 14:00-15:10
 Session 1: Digital Forensics
 Session Chair: Andrei Kelarev
 14:00-14:25
 Testing Similarity Digests with Random Changes
 Jonathan Oliver, Scott Forman and Chun Cheng 
 Trend Micro, Australia
 14:25-14:40
 Research of Password Recovery Method For RAR based on Parallel Random Search
 Liang Ge and Lianhai Wang 
 Shandong Computer Science Center, China
  14:40-14:55
 Forensic Identification of Students Outsourcing Assignment Projects from Freelancer.com
 Michael Monnik, Lei Pan 
 Deakin University, Australia
  14:55-15:10
 A Novel Method for Detecting Double Compressed Facebook JPEG Images 
 Allan NG, Lei Pan and Yang Xiang 
 Deakin University, Australia
 15:10-15:35  Tea Break
 15:35-17:35
 Session 2: Applications (I)
 Session Chair: Lei Pan
 15:35-16:00
 Popularity Prediction of Tianya BBS Posts Based on User Behavior 
 Ge Li, Yue Hu and Yanyu Yu 
 University of Science and Technology Beijing, China
 16:00-16:25
 Design and Implementation of Network User Behaviors Analysis based on  Hadoop for Big Data 
 Jian-feng Guan, SU YAO, Changqiao Xu, Hongke Zhang 
 Beijing University of Posts and Telecommunications, China
 16:25-16:40
 The Research of Extraction Algorithm for Target Feature of Chest Bitmap  
 Tianshi Liu, RuiXiang Liu, Hongwei Wang 
 Xi'an Shiyou University, China
 16:40-16:55
 A Method for Detecting Trojan Based on Hidden Network Traffic Analysis 
 Zhiwen Chen, YiZheng Tao, Gongliang Li 
 Chinese Academy of Engineering Physics, China
 16:55-17:10  A survey on encrypted traffic classification
 Zigang Cao, BUPT; Gang Xiong, Yong Zhao, Zhenzhen Li, Qingyun Liu, Li Guo 
 Beijing University of Posts and Telecommunications, China
 17:10-17:35  A Competitive Three-Level Pruning Technique for Information Security
 Morshed Chowdhury, Jemal Abawajy, Andrei Kelarev, Kouichi Sakurai
 Deakin University, Kyushu University
 17:35  Information about the conference dinner and transportation
 November 28 (Friday), 2014 @ G129 Greenwood Park
 
09:00-09:55
 Invited Talk (II)
 Speaker: Associate Professor Lejla Batina, Radboud University Nijmegen, The  Netherlands
 Topic: Near-field Privacy 
 Introduced by: Dr Wenjia Niu, Chinese Academy of Sciences, China
 10:00-10:50
 Session 3: Applications (II)
 Session Chair: Lynn Batten
 10:00-10:25
 System-level Permission Management Mechanism of Android Device 
 Dali Zhu, Zheming Fan, Na Pang 
 Chinese Academy of Sciences, China
 10:25-10:50
 Enhancing Security of the Android Platform via Multi-Level Security Model 
 Ji-Soo Oh, Min-Woo Park and Tai-Myoung Chung 
 Sungkyunkwan University, Korea
 10:50-11:20  Tea Break (G130)
 11:20-12:50
 Session 4: Security Implementations
 Session Chair: Lejla Batina
 11:20-11:45  A New Sybil-Resist Algorithm Based on the Existing Work Sybil Defender in Social  Networks
 Wei Ma, Senzhe Hu, Qiong Dai, Tingting Wang, Yinfei Huang
 Chinese Academy of Sciences, Beijing Special Vehicle Institute, Shanghai Stock  Exchange, China
 11:45-12:10  PAITS: Detecting Masquerader via Short-lived Interventional Mouse Dynamics  Xiaojun Chen, Jinqiao Shi, Rui Xu, S.M. Yiu, Bingxing Fang, Fei Xu
 Chinese Academy of Sciences, China
 12:10-12:35  Social Engineering through Social Media: A Comprehensive Investigation on  Enterprise Security
 Rafiqul Islam, Maumita Bhattacharya
 Charles Sturt University, Australia
 12:35-12:50  Efficient key pre-Distribution for wireless sensor networks: a case study on  6LoWPAN networks running Contiki-OS
 Ruben Smeets, Kris Aerts, Dave Singelee, Nele Mentens
 KU Leuven
 12:50-13:50  Lunch (G130)
 13:50-14:15  ATIS-2014 Awards
 14:15-15:55
 Session 5: CyberCrime
 Session Chair: Gang Li
 14:15-14:40  An approach to Detect The Internet Water Army via Dirichlet Process Mixture Model  based GSP Algorithm
 Dan Li, Qian Li, Yue Hu, Wenjia Niu, Jianlong Tan, Li Guo
 Chinese Academy of Sciences, China
 14:40-15:05  Modeling and Analysis of Network Survivability Under Attack Propagation
 Su Yao, Jian-feng Guan, Hongke Zhang, HUA PAN, Fei Song
 Beijing University of Posts and Telecommunications, China
 15:05-15:30  A Scalable Approach for Vulnerability Discovery based on Security Patches
 Hongzhe Li, Hyuckmin Kwon, Jonghoon Kwon, Heejo Lee
 CCS Lab, Korea University, Korea
 15:30-15:55  Modeling the Effect of Infection Time on Active Worm Propagations
 Hui Liu, Xiaolong Ma, Bo Ding, Tianzuo Wang, Qiang Lu
 Aliyun, China
 15:55-16:20  Tea Break (G130)
 16:20-18:00
 Session 6: Data Privacy
 Session Chair: Bernard Colbert
 16:20-16:45  Location Privacy Preserving for Semantic-aware Applications
 Lefeng Zhang, Ping Xiong, Tianqing Zhu
 Zhongnan University of Economics and Law, China
 16:45-17:10  Analysis on the Reliability of Non-repairable and Repairable Network Storage  Systems
 Yin Mingyong, Chun Wu and Yizheng Tao
 Chinese Academy of Engineering Physics, China
 17:10-17:35  Homomorphic Cryptography-based Privacy-Preserving Network Communications  Christophe Bidan, Antoine Guellier, Nicolas Prigent
 Suplec/Inria, France
  17:35-18:00  The 0-1 knapsack polytope - a starting point for cryptanalysis of knapsack ciphers?  Vicky Mak-Hau
 Deakin University, Australia
 18:00
 Closing Remarks
 Chair: Prof. Lynn Batten


USEFUL INFORMATION


Address for Correspondence

Participation Identification
  • Meeting badges are essential for admission to the Meeting venue and to the academic sessions and social events. Therefore we would like to ask you to wear the badges at all times.
  • On 27/11/2014, Dinner tickets will be collected on the bus.

Coffee Breaks

Coffee breaks will take place at the conference meeting venue in Deakin University. Coffee, tea, soft drinks and juices will be served.


Prizes

There will be two prizes:
  • the Best Paper award
  • the Best Student Paper award
The winners of the prizes will be presented during the Closing session on Friday.


Internet Access

Wifi is available in each of the conference locations (Buildings T, BC and G). Look for:
  • Wifi name: Open Wireless Deakin
  • Password: openfree
It is recommended that academic visitors configure eduroam (see https://www.eduroam.org) at their home institutions before leaving for ATIS 2014.


Liability

Deakin University will not assume any responsibility for accident, loss or damage, or for
delays or modifications in the programme, caused by unforeseen circumstances. We will
not assume indemnities requested by contractors or participants in the case of cancellation of the Meeting or session due to unforeseen circumstances.

 
Ċ
Gang Li,
Nov 17, 2014, 6:00 PM
Ċ
Gang Li,
Nov 17, 2014, 6:01 PM