2018 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/ 12th IEEE International Conference on Big Data Science and Engineering (TrustCom/BigDataSE 2018)

New York, New York, USA

31 July - 3 August 2018

Pages 1-650

IEEE Catalog Number: CFP18TRU-POD ISBN: 978-1-5386-4389-1

1/3

Copyright © 2018 by the Institute of Electrical and Electronics Engineers, Inc. All Rights Reserved

Copyright and Reprint Permissions: Abstracting is permitted with credit to the source. Libraries are permitted to photocopy beyond the limit of U.S. copyright law for private use of patrons those articles in this volume that carry a code at the bottom of the first page, provided the per-copy fee indicated in the code is paid through Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923.

For other copying, reprint or republication permission, write to IEEE Copyrights Manager, IEEE Service Center, 445 Hoes Lane, Piscataway, NJ 08854. All rights reserved.

*** This is a print representation of what appears in the IEEE Digital Library. Some format issues inherent in the e-media version may also appear in this print version.

IEEE Catalog Number: CFP18TRU-POD ISBN (Print-On-Demand): 978-1-5386-4389-1 ISBN (Online): 978-1-5386-4388-4 ISSN: 2324-898X

Additional Copies of This Publication Are Available From:

Curran Associates, Inc 57 Morehouse Lane Red Hook, NY 12571 USA Phone: (845) 758-0400 Fax: (845) 758-2633 E-mail: [email protected] Web: www.proceedings.com

2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering TrustCom/BigDataSE 2018

Table of Contents

Message from the IEEE TrustCom/BigDataSE 2018 General Chairs xli Message from the IEEE TrustCom 2018 Program Chairs xlii TrustCom 2018 Committee Members xliv TrustCom 2018 Technical Program Committee xlv Message from the BigDataSE 2018 Program Chairs xlviii BigDataSE 2018 Committee Members xlix

IEEE TrustCom 2018

Track 1: Trust Track 1

Engineering Trust: A Graph-Based Algorithm for Modeling, Validating, and Evaluating Trust 1 Scot Tucker (US Air Force Research Laboratory) A Novel Dynamic Cloud Service Trust Evaluation Model in Cloud Computing 10 Yubiao Wang (Chongqing University, China), Junhao Wen (Chongqing University, China), Wei Zhou (Shenzhen Institutes of Advanced Technology, China), and Fengji Luo (The University of Sydney, Australia) One Secure Access Scheme Based on Trusted Execution Environment 16 Yongkai Fan (China University of Petroleum), Shengle Liu (China University of Petroleum), Gang Tan (Penn State University), Xiaodong Lin (China University of Petroleum), Guanqun Zhao (China University of Petroleum), and Jianrong Bai (China University of Petroleum)

v Evaluation of Flexilink as Deterministic Unified Real-Time Protocol for Industrial Networks 22 Tianao Ma (Wuhan University of Science and Technology, China), Wei Hu (Wuhan University of Science and Technology, China), Yonghao Wang (DMT Lab, Birmingham City University, UK), Dalia El-Banna (DMT Lab, Birmingham City University, UK), John Grant (Nine Tiles Networks Ltd, Cambridge, UK), and Hongjun Dai (Shandong University, Jinan, P.R. China)

Track 1: Trust Track 2

Understanding Trust, Privacy and Financial Fears in Online Payment 28 Ghada El Haddad (University of Montreal, Montreal, Canada), Esma Aïmeur (University of Montreal, Montreal, Canada), and Hicham Hage (Notre Dame University, Zouk Mosbeh, Lebanon) DecentID: Decentralized and Privacy-Preserving Identity Storage System Using Smart Contracts 37 Sebastian Friebe (Karlsruhe Institute of Technology), Ingo Sobik (esentri AG), and Martina Zitterbart (Karlsruhe Institute of Technology) Reputation Prediction Using Influence Conversion 43 Monika Ewa Rakoczy (SAMOVAR, CNRS, Telecom SudParis), Amel Bouzeghoub (SAMOVAR, CNRS, Telecom SudParis), Alda Lopes Gancarski (SAMOVAR, CNRS, Telecom SudParis), and Katarzyna Wegrzyn-Wolska (Efrei Paris) Secure, Resilient, and Self-Configuring Fog Architecture for Untrustworthy IoT Environments 49 Mostafa Kahla (Alexandria University, Egypt), Mohamed Azab (Informatics Research Institute, Egypt), and Ahmed Mansour (Alexandria University, Egypt)

Track 1: Trust Track 3

Repoxy: Replication Proxy for Trustworthy SDN Controller Operation 55 Mohamed Azab (Informatics Research Institute, Egypt), Ahmed Hamdy (Department of Computer and Communications Engineering, Faculty of Engineering, Alexandria, Egypt), and Ahmed Mansour (Department of Electrical and Communication, Faculty of Engineering, Alexandria, Egypt) A Dynamic Trust Weight Allocation Technique for Data Reconstruction in Mobile Wireless Sensor Networks 61 Concepcion Sanchez Aleman (Florida International University), Niki Pissinou (Florida International University), Sheila Alemany (Florida International University), and Georges Kamhoua (Florida International University)

vi Encrypted Domain Mel-Frequency Cepstral Coefficient and Fragile Audio Watermarking 68 Jian Chen (Sun Yat-sen University, China), Ziyang Chen (Sun Yat-sen University, China), Peijia Zheng (Sun Yat-sen University, China), Jianting Guo (Sun Yat-sen University, China), Wei Zhang (Fudan University, China), and Jiwu Huang (Shenzhen University, China) TARAS: Trust-Aware Role-Based Access Control System in Public Internet-of-Things 74 Bumjin Gwak (KAIST), Jin-Hee Cho (Army Research Laboratory), Dongman Lee (KAIST), and Heesuk Son (KAIST)

Track 1: Trust Track 4

A Privacy-Preserving Multipurpose Watermarking Scheme for Audio Authentication and Protection 86 Jian Chen (Sun Yat-sen University, China), Peijia Zheng (Sun Yat-sen University, China), Jianting Guo (Sun Yat-sen University, China), Wei Zhang (Fudan University), and Jiwu Huang (Fudan University, China) Dynamic Survivable Path Routing for Fast Changing IoT Network Topologies 92 Manu Elappila (National Institute of Technology Rourkela) and Suchismita Chinara (National Institute of Technology Rourkela) BARS: A Blockchain-Based Anonymous Reputation System for Trust Management in VANETs 98 Zhaojun Lu (Huazhong University of Science and Technology, Wuhan, China), Qian Wang (University of Maryland, College Park), Gang Qu (University of Maryland, College Park), and Zhenglin Liu (Huazhong University of Science and Technology, Wuhan, China) Turning Trust Around: Smart Contract-Assisted Public Key Infrastructure 104 Abu Shohel Ahmed (Aalto University) and Tuomas Aura (Aalto University)

Track 1: Trust Track 5

N-Combat: A Nuisance Call Combating Framework for Internet Telephony 112 Ibrahim Javed (Institut Mines-Télécom, Télécom SudParis), Khalifa Toumi (Telecom SudParis, Institute Mines Telecom), and Noel Crespi (Telecom SudParis, Institute Mines Telecom) A Comprehensive Analysis of Packet Loss in MANETs 118 Muhammad Saleem Khan (COMSATS Institute of Information Technology, Islamabad, Pakistan), Saira Waris (COMSATS Institute of Information Technology, Islamabad, Pakistan), Idrees Ahmed (COMSATS Institute of Information Technology, Islamabad, Pakistan), and Majid Iqbal Khan (COMSATS Institute of Information Technology, Islamabad, Pakistan) Trust4App: Automating Trustworthiness Assessment of Mobile Applications 124 Sheikh Mahbub Habib (Technische Universitaet Darmstadt, Germany), Nikolaos Alexopoulos (Technische Universitaet Darmstadt, Germany), Md Monirul Islam (Technische Universitaet Darmstadt, Germany), Jens Heider (Fraunhofer SIT, Darmstadt, Germany), Stephen Marsh (University of Ontario -- Institute of Technology, Ontario, Canada), and Max Müehlhäeuser (Technische Universitaet Darmstadt, Germany)

vii Bionic Mechanism Based Dynamic Trust Evaluation Method in Cloud Environment 136 Shunan Ma (State Key Laboratory of Information Security, Institute of Information Engineering, CAS), Xunbo Shuai (PetroChina Research Institute of Petroleum Exploration & Development), Zhaohua Zhou (PetroChina Research Institute of Petroleum Exploration & Development), and Kechun Qiao (61516 Troops)

Track 1: Trust Track 6

A Universal Secret Sharing Scheme with General Access Structure Based on CRT 142 Keju Meng (University of Science and Technology of China), Fuyou Miao (University of Science and Technology of China), Yue Yu (University of Science and Technology of China), and Changbin Lu (University of Science and Technology of China) ESRQ: An Efficient Secure Routing Method in Wireless Sensor Networks Based on Q-Learning 149 Gaosheng Liu (Tianjin University), Xin Wang (Tianjin University), Xiaohong Li (Tianjin University), Jianye Hao (Tianjin University), and Zhiyong Feng (Tianjin University) Trust-Based Dynamic Linear Threshold Models for Non-competitive and Competitive Influence Propagation 156 Antonio Caliò (DIMES, University of Calabria, Italy) and Andrea Tagarelli (DIMES, University of Calabria, Italy) Securing the Internet of Things (IoT): A Security Taxonomy for IoT 163 Syed Rizvi (Pennsylvania State University), Andrew Kurtz (Pennsylvania State University), Joseph Pfeffer (Pennsylvania State University), and Mohammad Rizvi (PricewaterhouseCoopers (PWC))

Track 1: Trust Track 7

A Trust Energy-Efficient QoS Routing Scheme for Mobile Peer-to-Peer Networks 169 Dapeng Qu (Liaoning University), Dengyu Liang (Liaoning University), Songlin Wu (Liaoning University), Jie Li (University of Tsukuba), Weihong Xuan (Liaoning University), and Xingwei Wang (Northeastern University) Testing Sequence Generation Method Based on Unrelated Behaviors Serializing 177 Tao Sun (Inner Mongolia University), Xin Guo (Inner Mongolia University), and Ting Zhang (Inner Mongolia University) Manipulating Visibility of Political and Apolitical Threads on Reddit via Score Boosting 184 Mark Carman (University of South Australia), Mark Koerber (University of South Australia), Jiuyong Li (University of South Australia), Kim-Kwang Raymond Choo (University of Texas at San Antonio), and Helen Ashman (University of South Australia) Using Evolutionary Approaches to Manage Surveillance Cameras in Dynamic Environments 191 Ruidan Li (Wake Forest University) and Errin Fulp (Wake Forest University)

viii An Elite Clone Parallel Genetic Algorithm for Trust Monitoring Assignment Problem in Adaptive Wireless Sensor Networks 197 Jie Zhou (Shihezi University, China) and Min Tian (Shihezi University, China) Quality of Information as an indicator of Trust in the Internet of Things 204 Hamza Baqa (Easy Global Market Sophia Antipolis, France), Nguyen Binh Truong (John Moores University Liverpool, United Kingdom), Noel Crespi (Télécom SudParis, France), Gyu Myoung Lee (John Moores University Liverpool, United Kingdom), and Franck Le Gall (Easy Global Market Sophia Antipolis, France)

Track 2: Security Track 1

A Reinforcement Learning Approach for Attack Graph Analysis 212 Mehdi Yousefi (Glasgow Caledonian University), Nhamo Mtetwa (Glasgow Caledonain University), Yan Zhang (Glasgow Caledonain University), and Huaglory Tianfield (Glasgow Caledonain University) Research on Industrial Control Anomaly Detection Based on FCM and SVM 218 Wenli Shang (Shenyang Institute of Automation Chinese Academy of Sciences), Junrong Cui (Shenyang Institute of Automation Chinese Academy of Sciences), Chunhe Song (Shenyang Institute of Automation Chinese Academy of Sciences), Jianming Zhao (Shenyang Institute of Automation Chinese Academy of Sciences), and Peng Zeng (Shenyang Institute of Automation Chinese Academy of Sciences) Authorized Equality Test of Encrypted Data for Secure Cloud Databases 223 Sha Ma (South China Agricultural University)

Track 2: Security Track 2

Exploring the Feasibility of Physical Layer Key Generation for LoRaWAN 231 Weitao Xu (University of New South Wales), Sanjay Jha (University of New South Wales), and Wen Hu (University of New South Wales) DDoS Flooding Attack Detection Based on Joint-Entropy with Multiple Traffic Features 237 Jiewen Mao (East China Normal University), Weijun Deng (East China Normal University), and Fuke Shen (East China Normal University) Practical Decentralized Attribute-Based Delegation Using Secure Name Systems 244 Martin Schanzenbach (Fraunhofer AISEC), Christian Banse (Fraunhofer AISEC), and Julian Schütte (Fraunhofer AISEC) Abnormal Item Detection Based on Time Window Merging for Recommender Systems 252 Ling Tao Qi (Nanjing University of Posts and Telecommunications), Hai Ping Huang (Nanjing University of Posts and Telecommunications; Nanjing University of Aeronautics and Astronautics), Peng Wang (Nanjing University of Posts and Telecommunications), and Ru Chuan Wang (Nanjing University of Posts and Telecommunications)

ix Track 2: Security Track 3

Application of Visual Analysis to Detect and Analyze Patterns in VoIP Attack Traffic 260 Ekaterina Volodina (University of Duisburg-Essen), Adnan Aziz (University of Duisburg-Essen), Erwin P. Rathgeb (University of Duisburg-Essen), and Tobias Hossfeld (University of Duisburg-Essen) A Quality Evaluation Method of Cyber Threat Intelligence in User Perspective 269 Li Qiang (Institute of Information Engineering, Chinese Academy of Science), Jiang Zhengwei (Institute of Information Engineering, Chinese Academy of Science), Yang Zeming (Institute of Information Engineering, Chinese Academy of Science), Liu Baoxu (Institute of Information Engineering, Chinese Academy of Science), Wang Xin (Institute of Information Engineering, Chinese Academy of Science), and Zhang Yunan (Institute of Information Engineering, Chinese Academy of Science) Towards Better Ocular Recognition for Secure Real-World Applications 277 Reza M. Parizi (Kennesaw State University), Ali Dehghantanha (University of Sheffield), and Kim-Kwang Raymond Choo (University of Texas at San Antonio) Identifying Peer-to-Peer Botnets Through Periodicity Behavior Analysis 283 Pengfei Wang (Shandong University), Fengyu Wang (Shandong University), Fengbo Lin (Shandong University), and Zhenzhong Cao (Qufu Normal University)

Track 2: Security Track 4

LUCON: Data Flow Control for Message-Based IoT Systems 289 Julian Schuette (Fraunhofer AISEC) and Gerd Stefan Brost (Fraunhofer AISEC) Cache-Collision Attacks on GPU-Based AES Implementation with Electro-Magnetic Leakages 300 Yiwen Gao (Institute of Information Engineering, Chinese Academy of Sciences and School of Cyber Security, University of Chinese Academy of Sciences), Wei Cheng (Institute of Information Engineering, Chinese Academy of Sciences), Hailong Zhang (Institute of Information Engineering, Chinese Academy of Sciences), and Yongbin Zhou (Institute of Information Engineering, Chinese Academy of Sciences and School of Cyber Security, University of Chinese Academy of Sciences) An Improved Monte Carlo Graph Search Algorithm for Optimal Attack Path Analysis 307 Hui Xie (Beijing Institute of Tech), Kun Lv (Beijing Institute of Tech), and Changzhen Hu (Beijing Institute of Tech) Adversarial Gait Detection on Mobile Devices Using Recurrent Neural Networks 316 Devu Manikantan Shila (United Technologies Research Center) and Emeka Eyisi (United Technologies Research Center)

x Track 2: Security Track 5

AES Design Improvements Towards Information Security Considering Scan Attack 322 Liting Yu (Beihang University), Dongrong Zhang (Beihang University), Liang Wu (Beihang University), Shuguo Xie (Beihang University), Donglin Su (Beihang University), and Xiaoxiao Wang (Beihang University) Automated Breast Cancer Detection Using Machine Learning Techniques by Extracting Different Feature Extracting Strategies 327 Lal Hussain (University of Azad Jammu and Kashmir), Wajid Aziz (University of Azad Jammu and Kashmir), Sharjil Saeed (University of Azad Jammu and Kashmir), Saima Rathore (University of Pennsylvania), and Muhammad Rafique (University of Azad Jammu and Kashmir) Electronic Evidence Service Research in Cloud Computing Environment 332 Zhenya Chen (Shandong Provincial Key Laboratory of Computer Networks), Weifeng Liu (University of Jinan), Ying Yang (Shandong Provincial Key Laboratory of Computer Networks), Jizhi Wang (Shandong Provincial Key Laboratory of Computer Networks), Meng Guo (Shandong Provincial Key Laboratory of Computer Networks), Lijuan Chen (Shandong Provincial Key Laboratory of Computer Networks), Guang Yang (Shandong Provincial Key Laboratory of Computer Networks), and Jie Zhou (State Grid Shandong Electric Power Company)

Track 2: Security Track 6

STDC: A SDN-Oriented Two-Stage DDoS Detection and Defence System Based on Clustering 339 Shuang Wei (Peking University), Shuaifu Dai (CNCERT/CC), Xinfeng Wu (Peking University), and Xinhui Han (Peking University) Semantic-Based Policy Composition for Privacy-Demanding Data Linkage 348 Yang Lu (The University of Melbourne), Richard O. Sinnott (The University of Melbourne), and Karin Verspoor (The University of Melbourne) TempatMDS: A Masquerade Detection System Based on Temporal and Spatial Analysis of File Access Records 360 Jiarong Wang (Institute of Information Engineering, Chinese Academy of Sciences; School of Cyber Security, University of Chinese Academy of Sciences), Lijun Cai (Institute of Information Engineering, Chinese Academy of Sciences), Aimin Yu (Institute of Information Engineering, Chinese Academy of Sciences), Min Zhu (Institute of Information Engineering, Chinese Academy of Sciences), and Dan Meng (Institute of Information Engineering, Chinese Academy of Sciences) Effective Botnet Detection Through Neural Networks on Convolutional Features 372 Shao-Chien Chen (National Chiao-Tung University), Yi-Ruei Chen (National Chiao-Tung University), and Wen-Guey Tzeng (National Chiao-Tung University)

xi Track 2: Security Track 7

Online Allocation of Cloud Resources Based on Security Satisfaction 379 Talal Halabi (Ecole Polytechnique de Montreal), Martine Bellaiche (Ecole Polytechnique de Montreal), and Adel Abusitta (Ecole Polytechnique de Montreal) Enhancing Data Protection in a Distributed Storage Environment Using Structure-Wise Fragmentation and Dispersal of Encrypted Data 385 Katarzyna Kapusta (Telecom ParisTech) and Gerard Memmi (Telecom ParisTech) eBot: Approach Towards Modeling an Advanced P2P Botnet 391 Sumit Kumar Tetarave (Indian Institute of Technology Patna), Somanath Tripathy (Indian Institute of Technology Patna), Ezhil Kalaimannan (University of West Florida), and Caroline John (University of West Florida) A Practical Accountability Scheme for Oblivious RAM in Cloud Storage 397 Huikang Cao (Huazhong University of Science and Technology, China), Ruixuan Li (Huazhong University of Science and Technology, China), Wenlong Tian (Huazhong University of Science and Technology, China), Zhiyong Xu (Suffolk University, USA; Chinese Academy of Science, China), and Weijun Xiao (Virginia Commonwealth University, USA)

Track 2: Security Track 8

For Small Merchants: A Secure Smartphone-Based Architecture to Process and Accept NFC Payments 403 Nour El Madhoun (Sorbonne University), Emmanuel Bertin (Orange Labs), and Guy Pujolle (Sorbonne University) Outsourced Private Function Evaluation with Privacy Policy Enforcement 412 Noboru Kunihiro (The University of Tokyo), Wen-Jie Lu (University of Tsukuba), Takashi Nishide (University of Tsukuba), and Jun Sakuma (University of Tsukuba, RIKEN AIP, CREST) Universal Optimality of Apollonian Cell Encoders 424 Fabrizio Biondi (CentraleSupelec), Thomas Given-Wilson (Inria), and Axel Legay (Inria) An Evidential Clustering Based Framework for Cyber Terrorist Cells Topology Identification 436 Firas Saidi (National School of Computer Sciences RIADI Laboratory Campus of La Manouba Tunisia), Zouheir Trabelsi (College of Information Technology UAE University), and Henda Ben Ghazela (National School of Computer Sciences RIADI Laboratory Campus of La Manouba Tunisia)

Track 2: Security Track 9

On Designing a Questionnaire Based Honeyword Generation Approach for Achieving Flatness 444 Nilesh Chakraborty (Indian Institute of Technology Patna), Shreya Singh (National Institute of Technology Patna), and Samrat Mondal (Indian Institute of Technology Patna, University of Denver)

xii A Composite Malicious Peer Eviction Mechanism for Super-P2P Systems 456 Hatem Ismail (TU Darmstadt), Stefanie Roos (University of Waterloo), and Neeraj Suri (TU Darmstadt) S-Audit: Efficient Data Integrity Verification for Cloud Storage 465 Filipe Apolinário (INESC-ID / IST / INOV), Miguel Pardal (INESC-ID / IST), and Miguel Correia (INESC-ID / IST) Detecting Intruders and Preventing Hackers from Evasion by Tor Circuit Selection 475 Zechun Cao (University of Houston) and Shou-Hsuan Stephen Huang (University of Houston)

Track 2: Security Track 10

Good Vibrations: Artificial Ambience-Based Relay Attack Detection 481 Iakovos Gurulian (Royal Holloway University of London), Konstantinos Markantonakis (Royal Holloway University of London), Eibe Frank (University of Waikato), and Raja Naeem Akram (Royal Holloway University of London) Selecting System Specific Cybersecurity Attack Patterns Using Topic Modeling 490 Stephen Adams (University of Virginia), Bryan Carter (University of Virginia), Cody Fleming (University of Virginia), and Peter A Beling (University of Virginia) Digital Blues: An Investigation Into the Use of Bluetooth Protocols 498 William Ledbetter (Sandia National Laboratories), William Glisson (Sam Houston State University), Todd McDonald (University of South Alabama), Todd Andel (University of South Alabama), George Grispos (University of Nebraska at Omaha), and Kim-Kwang Choo (University of Texas at San Antonio) Inscription: Thwarting ActionScript Web Attacks From Within 504 Meera Sridhar (University of North Carolina at Charlotte), Abhinav Mohanty (University of North Carolina at Charlotte), Fadi Yilmaz (University of North Carolina at Charlotte), Vasant Tendulkar (University of North Carolina at Charlotte), and Kevin W. Hamlen (University of Texas at Dallas)

Track 2: Security Track 11

A Malicious Attack on the Machine Learning Policy of a Robotic System 516 George Clark (University of South Alabama), Michael Doran (Louisiana State University Shreveport), and William Glisson (Sam Houston State University) Continuous Authentication System Using Online Activities 522 Hidehito Gomi (Yahoo Japan Corporation), Shuji Yamaguchi (Yahoo Japan Corporation), Kota Tsubouchi (Yahoo Japan Corporation), and Naomi Sasaya (Yahoo Japan Corporation)

xiii Permission Analysis of Health and Fitness Apps in IoT Programming Frameworks 533 Mehdi Nobakht (UNSW, Sydney, Australia), Yulei Sui (University of Technology Sydney, Australia), Aruna Seneviratne (UNSW, Sydney, Australia), and Wen Hu (UNSW, Sydney, Australia) Black Hole Attack Prevention Method Using Multiple RREPs in Mobile Ad Hoc Networks 539 Taku Noguchi (Ritsumeikan University) and Mayuko Hayakawa (Ritsumeikan University)

Track 2: Security Track 12

TMDFI: Tagged Memory Assisted for Fine-Grained Data-Flow Integrity Towards Embedded Systems Against Software Exploitation 545 Tong Liu (School of Cyber Security University of Chinese Academy of Sciences), Gang Shi (Institute of Information Engineering Chinese Academy of Sciences), Liwei Chen (Institute of Information Engineering Chinese Academy of Sciences), Fei Zhang (School of Cyber Security University of Chinese Academy of Sciences), Yaxuan Yang (School of Cyber Security University of Chinese Academy of Sciences), and Jihu Zhang (Beijing Institute of Technology) Accessing Data from Multiple Sources Through Context-Aware Access Control 551 A. S. M. Kayes (La Trobe University, Melbourne, Australia), Wenny Rahayu (La Trobe University, Melbourne, Australia), Tharam Dillon (La Trobe University, Melbourne, Australia), and Elizabeth Chang (University of New South Wales, Canberra, Australia) Efficient Binary-Encoding Access Control Policy Combination for Large-Scale Collaborative Scenarios 560 Chunhua Li (Huazhong University of Science and Technology), Weirui Xie (Huazhong University of Science and Technology), and Ke Zhou (Huazhong University of Science and Technology) FlowHacker: Detecting Unknown Network Attacks in Big Traffic Data Using Network Flows 567 Luis Sacramento (INESC-ID, Instituto Superior Técnico, Universidade de Lisboa; Vodafone Portugal, Portugal), Ibéria Medeiros (LASIGE, Faculdade de Ciências, Universidade de Lisboa, Portugal), João Bota (Vodafone Portugal, Portugal), and Miguel Correia (INESC-ID, Instituto Superior Técnico, Universidade de Lisboa, Portugal)

Track 2: Security Track 13

Evaluation for Combination of Shuffle and Diversity on Moving Target Defense Strategy for Cloud Computing 573 Hooman Alavizadeh (Institute of Natural and Mathematical Sciences, Massey University, Auckland, New Zealand), Julian Jang-Jaccard (Institute of Natural and Mathematical Sciences, Massey University, Auckland, New Zealand), and Dong Seong Kim (Department of and Software Engineering)

xiv FRVM: Flexible Random Virtual IP Multiplexing in Software-Defined Networks 579 Dilli Prasad Sharma (University of Canterbury, New Zealand), Dong Seong Kim (University of Canterbury, New Zealand), Seunghyun Yoon (Gwangju Institute of Science and Technology, Republic of Korea), Hyuk Lim (Gwangju Institute of Science and Technology, Republic of Korea), Jin-Hee Cho (Army Research Laboratory, Adelphi MD, USA), and Terrence J. Moore (Army Research Laboratory, Adelphi MD, USA) Time Independent Security Analysis for Dynamic Networks Using Graphical Security Models 588 Simon Yusuf Enoch (University of Canterbury, New Zealand), Jin B. Hong (University of Western Australia, Australia), and Dong Seong Kim (University of Canterbury, New Zealand) Practical Location Validation in Participatory Sensing Through Mobile WiFi Hotspots 596 Andrea Saracino (IIT-CNR), Francesco Restuccia (Northeastern University, Boston), and Fabio Martinelli (IIT-CNR)

Track 2: Security Track 14

MASFOG: An Efficient Mutual Authentication Scheme for Fog Computing Architecture 608 Youcef Imine (Université de Technologie de Compiègne), Djamel Eddine Kouicem (Université de Technologie de Compiègne), Abdelmadjid Bouabdallah (Université de Technologie de Compiègne), and Lounis Ahmed (Université de Technologie de Compiègne) A Temporal and Spatial Constrained Attribute-Based Access Control Scheme for Cloud Storage 614 Zechao Liu (Harbin Institute of Technology Shenzhen Graduate School), Zoe L. Jiang (Harbin Institute of Technology Shenzhen Graduate School), Xuan Wang (Harbin Institute of Technology Shenzhen Graduate School), S. M. Yiu (The University of Hong Kong), Ruoqing Zhang (The University of Hong Kong), and Yulin Wu (Harbin Institute of Technology Shenzhen Graduate School) DroidPro: An AOTC-Based Bytecode-Hiding Scheme for Packing the Android Applications 624 Judong Bao (Peking University), Yongqiang He (Ardsec Company), and Weiping Wen (Peking University) Machine Learning for Reliable Network Attack Detection in SCADA Systems 633 Rocio Lopez Perez (University of Luxembourg, CSC), Florian Adamsky (University of Luxembourg, SnT), Ridha Soua (University of Luxembourg, SnT), and Thomas Engel (University of Luxembourg, SnT)

Track 2: Security Track 15

A Full-Scale Security Visualization Effectiveness Measurement and Presentation Approach 639 Jeffery Garae (The University of Waikato), Ryan K. L. Ko (The University of Waikato), and Mark Apperley (The University of Waikato) Beware of SMOMBIES: Verification of Users Based on Activities While Walking 651 Eric Klieme (Hasso Plattner Institute, University of Potsdam), Christian Tietz (Hasso Plattner Institute, University of Potsdam), and Christoph Meinel (Hasso Plattner Institute, University of Potsdam)

xv Data Mining Based Strategy for Detecting Malicious PDF Files 661 Samir G. Sayed (Helwan University) and Mohmed Shawkey (American University in Cairo) A National Mobile Identity Management Strategy for Electronic Government Services 668 Glaidson Menegazzo Verzeletti (Federal Institute of Santa Catarina), Emerson Ribeiro de Mello (Federal Institute of Santa Catarina), and Michelle Silva Wangham (University of Vale do Itajai)

Track 2: Security Track 16

Blockchain Based Secured Identity Authentication and Expeditious Revocation Framework for Vehicular Networks 674 Nisha Malik (University of Technology Sydney Australia), Priyadarsi Nanda (University of Technology Sydney, Australia), Arushi Arora (Indira Gandhi Delhi Technical University for Women (IGDTUW), New Delhi, India), Xiangjian He (University of Technology Sydney, Australia), and Deepak Puthal (University of Technology Sydney, Australia) Fully Decentralized Authentication and Revocation Scheme in Data Sharing Systems 680 Xiehua Li (Hunan University), Jie Jiang (Hunan University), and Yichen Chen (Hunan University) FloodShield: Securing the SDN Infrastructure Against Denial-of-Service Attacks 687 Menghao Zhang (Tsinghua University), Jun Bi (Tsinghua University), Jiasong Bai (Tsinghua University), and Guanyu Li (Tsinghua University) A Lightweight FourQ Primitive on ARM Cortex-M0 699 Wei Zhang (Institute of Information Engineering, Chinese Academy of Sciences; School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China), Dongdai Lin (Institute of Information Engineering, Chinese Academy of Sciences; School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China), Hailong Zhang (Institute of Information Engineering, Chinese Academy of Sciences; School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China), Xiaojun Zhou (Institute of Information Engineering, Chinese Academy of Sciences; School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China), and Yiwen Gao (Institute of Information Engineering, Chinese Academy of Sciences; School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China)

Track 2: Security Track 17

Pangr: A Behavior-Based Automatic Vulnerability Detection and Exploitation Framework 705 Danjun Liu (National University of Defense and Technology), Jingyuan Wang (National University of Defense and Technology), Zelin Rong (National University of Defense and Technology), Xianya Mi (National University of Defense and Technology), Fangyu Gai (National University of Defense and Technology), Yong Tang (National University of Defense and Technology), and Baosheng Wang (National University of Defense and Technology)

xvi Public Auditing for Network Coding Based Secure Cloud Storage 713 Xiang Liu (Southeast University, China), Jie Huang (Southeast University, China), and Guowen Zong (Southeast University, China) Securing Wireless Networks from Sinkhole and Sybil Attacks Using Secure Data Aggregation Protocol 721 Syed Rizvi (Penn State University), Joseph Gualdoni (Penn State University), and Abdul Razaque (New York Institute of Technology) A Novel Multi-source Fusion Model for Known and Unknown Attack Scenarios 727 Qiwen Wang (Institute of Information Engineering, Chinese Academy of Sciences/School of Cyber Security, University of Chinese Academy of Sciences), Jianguo Jiang (Institute of Information Engineering, Chinese Academy of Sciences), Zhixin Shi (Institute of Information Engineering, Chinese Academy of Sciences), Wen Wang (Institute of Information Engineering, Chinese Academy of Sciences), Bin Lv (Institute of Information Engineering, Chinese Academy of Sciences), Biao Qi (Institute of Information Engineering, Chinese Academy of Sciences/School of Cyber Security, University of Chinese Academy of Sciences), and Qieli Yin (Institute of Information Engineering, Chinese Academy of Sciences/School of Cyber Security, University of Chinese Academy of Sciences)

Track 2: Security Track 18

Adaptive Malicious URL Detection: Learning in the Presence of Concept Drifts 737 Guolin Tan (Institute of Information Engineering, CAS; University of Chinese Academy of Sciences), Peng Zhang (Institute of Information Engineering Chinese Academy of Sciences), Qingyun Liu (Institute of Information Engineering Chinese Academy of Sciences), Xinran Liu (National Computer Network Emergency Response and Coordination Center), Chunge Zhu (National Computer Network Emergency Response and Coordination Center), and Fenghu Dou (Institute of Information Engineering Chinese Academy of Sciences) Hierarchical Clustering Based Network Traffic Data Reduction for Improving Suspicious Flow Detection 744 Liya Su (Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China), Yepeng Yao (Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China), Ning Li (Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China), Junrong Liu (Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China), Zhigang Lu (Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China), and Baoxu Liu (Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China)

xvii BotCensor: Detecting DGA-Based Botnet Using Two-Stage Anomaly Detection 754 Biao Qi (Institute of Information Engineering, Chinese Academy of Sciences, BeiJing, China), Jianguo Jiang (Institute of Information Engineering, Chinese Academy of Sciences, BeiJing, China), Zhixin Shi (Institute of Information Engineering, Chinese Academy of Sciences, BeiJing, China), Rui Mao (Institute of Information Engineering, Chinese Academy of Sciences, BeiJing, China), and Qiwen Wang (Institute of Information Engineering, Chinese Academy of Sciences, BeiJing, China) A General and Expandable Insider Threat Detection System Using Baseline Anomaly Detection and Scenario-Driven Alarm Filters 763 Guang Yang (Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China), Lijun Cai (ORCID ID), Aimin Yu (Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China), and Dan Meng (Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China)

Track 2: Security Track 19

Provably Secure Password Reset Protocol: Model, Definition, and Construction 774 Satsuya Ohata (AIST, Japan), Takahiro Matsuda (AIST, Japan), and Kanta Matsuura (The University of Tokyo) VegaStar: An Illegal Domain Detection System on Large-Scale Video Traffic 783 Xiang Tian (Institute of Information Engineering, Chinese Academy of Sciences), Yujia Zhu (Institute of Information Engineering, Chinese Academy of Sciences), Zhao Li (Institute of Information Engineering, Chinese Academy of Sciences), Chao Zheng (Institute of Information Engineering, Chinese Academy of Sciences), Yong Sun (Institute of Information Engineering, Chinese Academy of Sciences), and Qingyun Liu (Institute of Information Engineering, Chinese Academy of Sciences) An Experimental Flow Secure File System 790 Shyamasundar Rudrapatna (Indian Institute of Technology Bombay), NV Narendra Kumar (Indian Institute of Technology Bombay), Abhijit Taware (Coriolis Technologies Pvt. Ltd.), and Parjanya Vyas (Indian Institute of Technology Bombay) VMPBL: Identifying Vulnerable Functions Based on Machine Learning Combining Patched Information and Binary Comparison Technique by LCS 800 Danjun Liu (National University of Defense and Technology), Yao Li (National University of Defense and Technology), Yong Tang (National University of Defense and Technology), Baosheng Wang (National University of Defense and Technology), and Wei Xie (National University of Defense and Technology)

Track 2: Security Track 20

NTPDroid: A Hybrid Android Malware Detector Using Network Traffic and System Permissions 808 Anshul Arora (Indian Institute of Technology Roorkee) and Sateesh K Peddoju (Indian Institute of Technology Roorkee)

xviii Energy Exhaustion Attack on Barrett's Reduction 814 Mohannad Mostafa (University of Waterloo), Tanushree Banerjee (University of Waterloo), and M. Anwar Hasan (University of Waterloo) Authentication of IoT Device and IoT Server Using Secure Vaults 819 Trusit Shah (University of Texas at Dallas) and S Venkatesan (University of Texas at Dallas) Using Feature Selection to Identify Chains of Insecure Software Configuration Parameters 825 Errin Fulp (Wake Forest University) and H. Donald Gage (Wake Forest University) Reinforcing IoT-Enforced Security Policies 831 Nouha Oualha (CEA, LIST)

Track 2: Security Track 21

Enhancing Security and Scalability in Software Defined LTE Core Networks 837 Ruichun Gu (Inner Mongolia University of Science and Technology, Baotou, China), Xiaolong Zhang (Inner Mongolia University, Hohhot, China), Lei Yu (Inner Mongolia University, Hohhot, China), and Junxing Zhang (Inner Mongolia University, Hohhot, China) Uninterrupted Video Surveillance in the Face of an Attack 843 Jagannadh Vempati (University of North Texas), Ram Dantu (University of North Texas), and Mark Thompson (University of North Texas) Enhancing the Naive Bayes Spam Filter Through Intelligent Text Modification Detection 849 Wuxu Peng (Texas State University), Linda Huang (Texas State University), Julia Jia (Texas State University), and Emma Ingram (Texas State University) A Case Study of Accelerating Apache Spark with FPGA 855 Junjie Hou (Shanghai Jiao Tong University, Shanghai, China), Yongxin Zhu (Shanghai Advanced Research Institute, Chinese Academy of Sciences, Shanghai, China), Linghe Kong (Shanghai Jiao Tong University, Shanghai, China), Zhe Wang (Shanghai Jiao Tong University, Shanghai, China), Sen Du (Shanghai Jiao Tong University, Shanghai, China), Shijin Song (Shanghai Jiao Tong University, Shanghai, China), and Tian Huang (University of Cambridge, UK) A Multiple Layer Sercurity Architecture for Internet of Things into MVC Design 861 Hongbo Chen (Shandong University), Hongjun Dai (Shandong University), and Meikang Qiu (Shenzhen University)

Track 2: Security Track 22

Lightweight ECC with Fragile Zero-Watermarking for Internet of Things Security 867 Kinza Sarwar (Auckland University of Technology (AUT), New Zealand), Sira Yongchareon (Auckland University of Technology (AUT), New Zealand), and Jian Yu (Auckland University of Technology (AUT), New Zealand)

xix Signature Renewal for Low Entropy Data 873 Atighehchi Kevin (Normandie Univ, UNICAEN, ENSICAEN, CNRS, GREYC, France) and Barbier Morgan (Normandie Univ, UNICAEN, ENSICAEN, CNRS, GREYC, France)

Track 2: Security Track 23

Profiling Network Traffic Behavior for the Purpose of Anomaly-Based Intrusion Detection 885 Manmeet Singh Gill (Concordia University of Edmonton), Dale Lindskog (Concordia University of Edmonton), and Pavol Zavarsky (Concordia University of Edmonton) Steganographic Transports: A Vector for Hidden Secret Internets? 891 Bernd Troegeler (Accenture) and Paul Watters (La Trobe University) Efficient Cross-User Deduplication of Encrypted Data Through Re-Encryption 897 Xin Tang (University of International Relations, China,), Linna Zhou (University of International Relations, China), Yongfeng Huang (Tsinghua University, China), and Chin-Chen Chang (Feng Chia University) Detecting Data Leakage from Databases on Android Apps with Concept Drift 905 Gökhan Kul (University at Buffalo, SUNY), Shambhu Upadhyaya (University at Buffalo, SUNY), and Varun Chandola (University at Buffalo, SUNY)

Track 3: Privacy Track 1

Acies: A Privacy-Preserving System for Edge-Based Classification 914 Wanli Xue (UNSW, Data61- CSIRO), Yiran Shen (Data61- CSIRO), Chengwen Luo (Shenzhen University), Wen Hu (UNSW, Data61- CSIRO), and Aruna Seneviratne (UNSW,Data61- CSIRO) PAIRS: Privacy-Aware Identification and Recommendation of Spatio-Friends 920 Shuo Wang (University of Melbourne), Richard Sinnott (University of Melbourne), and Surya Nepal (CSIRO) Lightweight Verification for Searchable Encryption 932 Boyang Wang (University of Cincinnati) and Xinxin Fan (Bosch Research and Technology Center) Privacy Parameter Variation Using RAPPOR on a Malware Dataset 938 Peter Aaby (Edinburgh Napier University), Juanjo Mata De Acuna (Edinburgh Napier University), Richard Macfarlane (Edinburgh Napier University), and William J Buchanan (Edinburgh Napier University)

Track 3: Privacy Track 2 reclaimID: Secure, Self-Sovereign Identities Using Name Systems and Attribute-Based Encryption 946 Martin Schanzenbach (Fraunhofer AISEC), Georg Bramm (Fraunhofer AISEC), and Julian Schütte (Fraunhofer AISEC)

xx PUSC: Privacy-Preserving User-Centric Skyline Computation Over Multiple Encrypted Domains 958 Ximeng Liu (Singapore Management University / Fuzhou University), Kim-Kwang Raymond Choo (The University of Texas at San Antonio), Robert H. Deng (Singapore Management University), Yang Yang (Fuzhou University), and Yinghui Zhang (Singapore Management University) Capstone: Mobility Modeling on Smartphones to Achieve Privacy by Design 964 Vaibhav Kulkarni (UNIL-HEC Lausanne), Arielle Moro (UNIL-HEC Lausanne), Bertil Chapuis (UNIL-HEC Lausanne), and Benoit Garbinato (UNIL-HEC Lausanne) P-GENT: Privacy-Preserving Geocoding of Non-Geotagged Tweets 972 Shuo Wang (University of Melbourne), Richard Sinnott (University of Melbourne), and Surya Nepal (CSIRO)

Track 3: Privacy Track 3

A Flow-Level Architecture for Balancing Accountability and Privacy 984 Yuxiang Ma (Computer Network Information Center, Chinese Academy of Sciences), Yulei Wu (University of Exeter), Jingguo Ge (Institute of Information Engineering, Chinese Academy of Sciences), and Jun Li (Computer Network Information Center, Chinese Academy of Sciences) Asymmetric Commutative Encryption Scheme Based Efficient Solution to the Millionaires' Problem 990 Meng Liu (Shandong University, Weihai, China), Priyadarsi Nanda (University of Technology Sydney, Australia), Xuyun Zhang (University of Auckland, New Zealand), Chi Yang (University of Wollongong, Australia), Shui Yu (Deakin University, Burwood, Australia), and Jianxin Li (University of Western Australia, Australia) AuthStore: Password-Based Authentication and Encrypted Data Storage in Untrusted Environments 996 Clemens Zeidler (University of Auckland) and Muhammad Rizwan Asghar (University of Auckland) SDLI: Static Detection of Leaks Across Intents 1002 Rocco Salvia (University of Utah), Pietro Ferrara (JuliaSoft SRL), Fausto Spoto (Università di Verona), and Agostino Cortesi (Università Ca’ Foscari)

Track 3: Privacy Track 4

Software System Representation Methods Based on Algebraic Component 1008 Zijun Yu (Beijing Institute of Technology), Chun Shan (Beijing Institute of Technology), Limin Mao (China Aerospace Science and Industry Corporation Limited), Changzhen Hu (Beijing Institute of Technology), and Wenjie Xiong (Beijing Institute of Technology)

xxi A Lightweight Multi-precision Squaring on Embedded Processors for ECC 1014 Wei Zhang (Institute of Information Engineering, Chinese Academy of Sciences; School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China), Dongdai Lin (Institute of Information Engineering, Chinese Academy of Sciences; School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China), Hailong Zhang (Institute of Information Engineering, Chinese Academy of Sciences; School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China), Xiaojun Zhou (Institute of Information Engineering, Chinese Academy of Sciences; School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China), Yiwen Gao (Institute of Information Engineering, Chinese Academy of Sciences; School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China), and Cong Chen (Institute of Information Engineering, Chinese Academy of Sciences; School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China)

Track 3: Privacy Track 5

A Systematic Method on PDF Privacy Leakage Issues 1020 Yun Feng (Institute of Information Engineering, Chinese Academy of Sciences; School of Cyber Security, University of Chinese Academy of Sciences), Baoxu Liu (Institute of Information Engineering, Chinese Academy of Sciences; School of Cyber Security, University of Chinese Academy of Sciences), Xiang Cui (Cyberspace Institute of Advanced Technology, Guangzhou University), Chaoge Liu (Institute of Information Engineering, Chinese Academy of Sciences; School of Cyber Security, University of Chinese Academy of Sciences), Xuebin Kang (Antiylabs), and Junwei Su (Institute of Information Engineering, Chinese Academy of Sciences; School of Cyber Security, University of Chinese Academy of Sciences) Website Fingerprinting by Power Estimation Based Side-Channel Attacks on Android 7 1030 Yi Qin (Colorado School of Mines) and Chuan Yue (Colorado School of Mines) Do You Like What I Like? Similarity Estimation in Proximity-Based Mobile Social Networks 1040 Felix Beierle (Technische Universität Berlin) Countering Intrusiveness Using New Security-Centric Ranking Algorithm Built on Top of Elasticsearch 1048 Fadi Mohsen (University of Michigan-Flint), Hamed Abdelhaq (An-Najah National University), Halil Bisgin (University of Michigan-Flint), Andrew Jolly (University of Michigan-Flint), and Michael Szczepanski (University of Michigan-Flint)

Track 3: Privacy Track 6

A Concept and Evaluation of Usable and Fine-Grained Privacy-Friendly Cookie Settings Interface 1058 Oksana Kulyk (Karlsruhe Institute of Technology), Peter Mayer (Karlsruhe Institute of Technology), Melanie Volkamer (Karlsruhe Institute of Technology), and Oliver Käfer (Technische Universität Darmstadt)

xxii Highly Efficient Privacy-Preserving Key Agreement for Wireless Body Area Networks 1064 Haibat Khan (Royal Holloway, University of London), Benjamin Dowling (Royal Holloway, University of London), and Keith M. Martin (Royal Holloway, University of London) Privacy Preserving Distributed Deep Learning and Its Application in Credit Card Fraud Detection 1070 Yang Wang (University of Virginia), Stephen Adams (University of Virginia), Peter Beling (University of Virginia), Steven Greenspan (CA Technologies), Sridhar Rajagopalan (CA Technologies), Maria Velez-Rojas (CA Technologies), Serge Mankovski (CA Technologies), Steven Boker (University of Virginia), and Donald Brown (University of Virginia) Privacy-Preserving Access Control in Electronic Health Record Linkage 1079 Yang Lu (The University of Melbourne), Richard O. Sinnott (The University of Melbourne), Kain Verspoor (The University of Melbourne), and Udaya Parampalli (The University of Melbourne)

Track 3: Privacy Track 7

Track me if you can? Query Based Dual Location Privacy in VANETs for V2V and V2I 1091 Muhammad Arif (Guangzhou University Guangzhou, China), Guojun Wang (Guangzhou University Guangzhou, China), and Tao Peng (Guangzhou University Guangzhou, China) QueryGuard: Privacy-Preserving Latency-Aware Query Optimization for Edge Computing 1097 Runhua Xu (University of Pittsburgh), Balaji Palanisamy (University of Pittsburgh), and James Joshi (University of Pittsburgh) PMDA: Privacy-Preserving Multi-functional Data Aggregation Without TTP in Smart Grid 1107 Zheng He (State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China; School of Cyber Security, University of Chinese Academy of Sciences, Beijing China), Shiran Pan (State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China; School of Cyber Security, University of Chinese Academy of Sciences, Beijing China), and Dongdai Lin (State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China; School of Cyber Security, University of Chinese Academy of Sciences, Beijing China) Understanding the Performance and Challenges of DNS Query Name Minimization 1115 Zheng Wang (National Institute of Standards and Technology)

Track 3: Privacy Track 8

Toward a Secure Access to 5G Network 1121 Fuwen Liu (China Mobile Research Institute), Jin Peng (China Mobile Research Institute), and Min Zuo (China Mobile Research Institute)

xxiii Fast Time Series Discords Detection with Privacy Preserving 1129 Chunkai Zhang (Harbin Institute of Technology, Shenzhen), Ao Yin (Harbin Institute of Technology, Shenzhen), Yulin Wu (Harbin Institute of Technology, Shenzhen), Yingyang Chen (Harbin Institute of Technology, Shenzhen), and Xuan Wang (Harbin Institute of Technology, Shenzhen) An Efficient Blacklistable Anonymous Credential System with Reputation Using Pairing-Based Accumulator 1140 Toru Nakanishi (Hiroshima University) and Takeshi Kanatani (Hiroshima University) Privacy-Preserving Data Synchronization Using Tensor-Based Fully Homomorphic Encryption 1149 Keke Gai (Beijing Institute of Technology), Yulu Wu (Beijing Institute of Technology), Liehuang Zhu (Beijing Institute of Technology), and Meikang Qiu (Columbia University)

Track 3: Privacy Track 9

Towards Domain-Specific and Privacy-Preserving Qualified eID in a User-Centric Identity Model 1157 Thomas Lenz (Institute of Applied Information Processing and Communications (IAIK)) and Vesna Krnjic (Institute of Applied Information Processing and Communications (IAIK)) RZKPB: A Privacy-Preserving Blockchain-Based Fair Transaction Method for Sharing Economy 1164 Bin Li (National University of Defense Technology) and Yijie Wang (National University of Defense Technology) Towards a User-Friendly and Secure Hand Shaking Authentication for Smartphones 1170 Jinpei Yan (Xi'an Jiaotong University), Yong Qi (Xi'an Jiaotong University), Qifan Rao (Xi'an Jiaotong University), and Saiyu Qi (Xidian University) A Flexible Mix-Zone Selection Scheme Towards Trajectory Privacy Protection 1180 Zhenyu Chen (Institute of Software Chinese Academy of Sciences), Yanyan Fu (Institute of Software Chinese Academy of Sciences), Min Zhang (Institute of Software Chinese Academy of Sciences), Zhenfeng Zhang (Institute of Software Chinese Academy of Sciences), and Hao Li (Institute of Software Chinese Academy of Sciences) PHeDHA: Protecting Healthcare Data in Health Information Exchanges with Active Data Bundles 1187 Wesam Fadheel (Western Michigan University), Raed Salih (Western Michigan University), and Leszek Lilien (Western Michigan University)

Track 4: Forensics and Analytics Track 1

Monero Ring Attack: Recreating Zero Mixin Transaction Effect 1196 Dimaz Ankaa Wijaya (Monash University), Joseph Liu (Monash University), Ron Steinfeld (Monash University), and Dongxi Liu (Data61 CSIRO)

xxiv PANDORA: Preserving Privacy in PRNU-Based Source Camera Attribution 1202 Manoranjan Mohanty (The University of Auckland), Ming Zhang (University of Auckalnd), Muhammad Rizwan Asghar (University of Auckalnd), and Giovanni Russello (University of Auckland) Identifying Passive Message Fingerprint Attacks via Honey Challenge in Collaborative Intrusion Detection Networks 1208 Wenjuan Li (City University of Hong Kong), Weizhi Meng (Technical University of Denmark), Yu Wang (Guangzhou University), Lam For Kwok (City University of Hong Kong), and Rongxing Lu (University of New Brunswick) Testing Cryptographically Secure Pseudo Random Number Generators with Artificial Neural Networks 1214 Tilo Fischer (Fraunhofer Institute for Applied and Integrated Security)

Track 4: Forensics and Analytics Track 2

IRTED-TL: An Inter-Region Tax Evasion Detection Method Based on Transfer Learning 1224 Xulyu Zhu (Xi'an Jiaotong University), Zheng Yan (Xidian University), Jianfei Ruan (Xi'an Jiaotong University), Qinghua Zheng (Xi'an Jiaotong University), and Bo Dong (Xi'an Jiaotong University) One Intrusion Detection Method Based On Uniformed Conditional Dynamic Mutual Information 1236 Liangfu Lu (Tianjin University), Xinhe Zhu (Tianjin Polytechinic University), Xuyun Zhang (University of Auckland), Junhan Liu (Tianjin University), Md Zakirul Alam Bhuiyan (Fordham University , USA), and Guangtai Cui (Hohai University) Cyber Identity: Salient Trait Ontology and Computational Framework to Aid in Solving Cybercrime 1242 Mary C. Michel (Florida Institute of Technology), Marco Carvalho (Florida Institute of Technology), Heather Crawford (Florida Institute of Technology), and Albert C. Esterline (NC A&T University)

Track 4: Forensics and Analytics Track 3

Enabling Trust in Deep Learning Models: A Digital Forensics Case Study 1250 Aditya K (University College, Dublin), Slawomir Grzonkowski (Symantec Corporation), and NhienAn Lekhac (University College, Dublin) Bluetooth Low Energy Used for Memory Acquisition from Smart Health Care Devices 1256 Tina Wu (University of ) and Andrew Martin ()

xxv Track 4: Forensics and Analytics Track 4

Resilient Bipartite Consensus for Multi-agent Networks with Antagonistic Interactions 1262 Hongbin Liu (Hangzhou Dianzi University), Ming Xu (Hangzhou Dianzi University), Yiming Wu (Hangzhou Dianzi University), Ning Zheng (Hangzhou Dianzi University), Yuangfang Chen ([email protected]), and Md Zakirul Alam Bhuiyan (Fordham University) An Efficient Distributed Approach on High Dimensional Data Similarity Searchable Encryption 1270 Cheng Guo (Dalian University of Technology, China), Xinyu Tang (Dalian University of Technology, China), Yuanfang Chen (Hangzhou Dianzi University, China), Pengxu Tian (Dalian University of Technology, China), and Md Zakirul Alam Bhuiyan (Fordham University, USA) Autoblog Forensics and Attribution 1276 Aaron Koehl (College of William and Mary)

Track 5: Emerging Tech Track 1

Managed Blockchain Based Cryptocurrencies with Consensus Enforced Rules and Transparency 1287 Peter Mell (National Institute of Standards and Technology) A Lightweight Path Authentication Protocol for RFID-Based Supply Chains 1297 Yuyin Qian (East China Normal University), Peng Zeng (East China Normal University), Zuming Shen (East China Normal University), and Kim-Kwang Raymond Choo (University of Texas at San Antonio) A Blockchain-Based Decentralized Data Storage and Access Framework for PingER 1303 Saqib Ali (Guangzhou University), Guojun Wang (Guangzhou University), Bebo White (Stanford Linear Accelerator Center, Stanford University), and Roger Leslie Cottrell (Stanford Linear Accelerator Center, Stanford University) Learning and Applying Ontology for Machine Learning in Cyber Attack Detection 1309 Huangjie Zheng (Shanghai Jiao Tong University), Yuchen Wang (Shanghai Jiao Tong University), Chen Han (Shanghai Jiao Tong University), Fangjie Le (Shanghai Jiao Tong University), Ruan He (Tencent), and Jialiang Lu (Shanghai Jiao Tong University)

Track 5: Emerging Tech Track 2

Practical K Nearest Neighbor Query Scheme with Two-Party Guarantees in Road Networks 1316 Changli Zhou (Huaqiao University), Tian Wang (Huaqiao University), Wenxian Jiang (Huaqiao University), and Hui Tian (Huaqiao University) Privacy-Preserving Method for Temporarily Linking/Revoking Pseudonym Certificates in VANETs 1322 Marcos Antonio Simplicio Junior (Universidade de Sao Paulo), Eduardo Lopes Cominetti (Universidade de Sao Paulo), Harsh Kupwade Patil (LG Electronics), Jefferson Ricardini (Universidade de Sao Paulo), Leonardo Ferraz (Universidade de Sao Paulo), and Marcos Vinicius Silva (Universidade de Sao Paulo)

xxvi Blockchain as a Notarization Service for Data Sharing with Personal Data Store 1330 Mohammad Jabed Morshed Chowdhury (Swinburne University of Technology), Alan Colman (Swinburne University of Technology), Muhammad Ashad Kabir (Charles Sturt University), Jun Han (Swinburne University of Technology), and Paul Sarda (Swinburne University of Technology) Superscalar Encrypted RISC: The Measure of a Secret Computer 1336 Peter Breuer (Hecusys), (London South Bank University), Esther Palomar (Birmingham City University), and Zhiming Liu (Southwest University)

Track 5: Emerging Tech Track 3

Fair and Transparent Blockchain Based Tendering Framework - A Step Towards Open Governance 1342 Freya Sheer Hardwick (ISG-SCC, Royal Holloway, University of London, Egham, United Kingdom), Raja Naeem Akram (ISG-SCC, Royal Holloway, University of London, Egham, United Kingdom), and Konstantinos Markantonakis (ISG-SCC, Royal Holloway, University of London, Egham, United Kingdom) Blockchain Versus Database: A Critical Analysis 1348 Mohammad Jabed Morshed Chowdhury (Swinburne University of Technology), Alan Colman (Swinburne University of Technology), Muhammad Ashad Kabir (Charles Sturt University), Jun Han (Swinburne University of Technology), and Paul Sarda (Swinburne University of Technology) A Privacy-Preserving Principal Component Analysis Outsourcing Framework 1354 Xinbo Liu (Hunan University), Yaping Lin (Hunan University), Qin Liu (Hunan University), and Xin Yao (Hunan University) Detecting Domain Generation Algorithms with Convolutional Neural Language Models 1360 Ji Huang (Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China), Pei Wang (National Computer Network Emergency Response Technical Team/Coordination Center of China, Beijing, China), Tianning Zang (Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China), Qian Qiang (National Computer Network Emergency Response Technical Team/Coordination Center of China, Beijing, China), Yipeng Wang (Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China), and Miao Yu (Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China)

Track 5: Emerging Tech Track 4

FPPB: A Fast and Privacy-Preserving Method Based on the Permissioned Blockchain for Fair Transactions in Sharing Economy 1368 Bin Li (National University of Defense Technology), Yijie Wang (National University of Defense Technology), Peichang Shi (National University of Defense Technology), Huan Chen (National University of Defense Technology), and Li Cheng (National University of Defense Technology)

xxvii On the Design of a Blockchain-Based System to Facilitate Healthcare Data Sharing 1374 Anastasia Theodouli (Informatics and Telematics Institute / Centre for Research and Technology Hellas), Stelios Arakliotis (Informatics and Telematics Institute / Centre for Research and Technology Hellas), Konstantinos Moschou (Informatics and Telematics Institute / Centre for Research and Technology Hellas), Konstantinos Votis (Informatics and Telematics Institute / Centre for Research and Technology Hellas), and Dimitrios Tzovaras (Informatics and Telematics Institute / Centre for Research and Technology Hellas) Consumer Centric Data Control, Tracking and Transparency – A Position Paper 1380 James Tapsell (Royal Holloway, University of London), Raja Naeem Akram (Royal Holloway, University of London), and Konstantinos Markantonakis (Royal Holloway, University of London) Achieving Secure and Effective Search Services in Cloud Computing 1386 Qin Liu (Hunan University, P. R. China), Shuyu Pei (Hunan University, P. R. China), Kang Xie (Ministry of Public Security, P. R. China), Jie Wu ( Temple University), Tao Peng (Guangzhou University, P. R. China), and Guojun Wang (Guangzhou University, P. R. China)

Track 5: Emerging Tech Track 5

Node Immunization in Networks with Uncertainty 1392 Yizhi Ren (Hangzhou Dianzi University), Mengjin Jiang (Hangzhou Dianzi University), Ye Yao (Hangzhou Dianzi University), Ting Wu (Hangzhou Dianzi University), Zhen Wang (Hangzhou Dianzi University), Mengkun Li (Capital Normal University), and Kim-Kwang Raymond Choo (The University of Texas at San Antonio) Effective Mobile Web User Fingerprinting via Motion Sensors 1398 Zhiju Yang (Colorado School of Mines), Rui Zhao (Colorado School of Mines and University of Nebraska Omaha), and Chuan Yue (Colorado School of Mines) Qualified eID Derivation Into a Distributed Ledger Based IdM System 1406 Andreas Abraham (eGovernment Innovation Center (EGIZ), Graz University of Technology), Kevin Theuermann (eGovernment Innovation Center (EGIZ), Graz University of Technology), and Emanuel Kirchengast (Institute of Applied Information Processing and Communications (IAIK), Graz University of Technology) A Hybrid Recommendation Algorithm Based on Heuristic Similarity and Trust Measure 1413 Chao Yang (Hunan University, Changsha, China), Xinghe Chen (Hunan University, Changsha, China), Tingting Song (Hunan University, Changsha, China), Bin Jiang (Hunan University, Changsha, China), and Qin Liu (Hunan University, Changsha, China) SPARQL Multi-Query Optimization 1419 Jiaqi Chen (Peking University), Fan Zhang (Peking University), and Lei Zou (Peking University)

xxviii Track 5: Emerging Tech Track 6

Identifying WeChat Red Packets and Fund Transfers Via Analyzing Encrypted Network Traffic 1426 Feipeng Yan (Hangzhou Dianzi University, HangZhou, China), Ming Xu (Hangzhou Dianzi University, HangZhou, China), Tong Qiao (Hangzhou Dianzi University, HangZhou, China), Ting Wu (Hangzhou Dianzi University, HangZhou, China), Xue Yang (Hangzhou Dianzi University, HangZhou, China), Ning Zheng (Hangzhou Dianzi University, HangZhou, China), and Kim-Kwang Raymond Choo ( The University of Texas at San Antonio) Are Your Neighbors Swingers or Kinksters? Feeld App Forensic Analysis 1433 Nicholas Mata (University of Texas at San Antonio), Nicole Beebe (University of Texas at San Antonio), and Kim-Kwang Raymond Choo (University of Texas at San Antonio) Browser Analysis of Residual Facebook Data 1440 Taylor Cloyd (University of Texas at San Antonio), Trey Osborn (University of Texas at San Antonio), Brian Ellingboe (University of Texas at San Antonio), William Bradley Glisson (Sam Houston State University), and Kim-Kwang Raymond Choo (University of Texas at San Antonio) A Forensic Investigation Framework for Smart Home Environment 1446 Arnoud Goudbeek (Fiscal Information and Investigation Service, The Netherlands), Kim-Kwang Raymond Choo (University of Texas at San Antonio, USA), and Nhien-An Le-Khac (University College Dublin, Ireland)

Track 6: Hardware Security Track 1

A Co-training Based Hardware Trojan Detection Technique by Exploiting Unlabeled ICs and Inaccurate Simulation Models 1452 Mingfu Xue (Nanjing University of Aeronautics and Astronautics), Rongzhen Bian (Nanjing University of Aeronautics and Astronautics), Jian Wang (Nanjing University of Aeronautics and Astronautics), and Weiqiang Liu (Nanjing University of Aeronautics and Astronautics) Building Trusted Golden Models-Free Hardware Trojan Detection Framework Against Untrustworthy Testing Parties Using a Novel Clustering Ensemble Technique 1458 Rongzhen Bian (Nanjing University of Aeronautics and Astronautics), Mingfu Xue (Nanjing University of Aeronautics and Astronautics), and Jian Wang (Nanjing University of Aeronautics and Astronautics) A Compact, Lightweight and Low-Cost 8-Bit Datapath AES Circuit for IoT Applications in 28nm CMOS 1464 Minyi Lu (Southeast University), Ao Fan (Southeast University), Jiaming Xu (Southeast University), and Weiwei Shan (Southeast University)

xxix Differential Power Analysis of 8-Bit Datapath AES for IoT Applications 1470 Jiaming Xu (National ASIC System Engineering Research Center Southeast University Nanjing, China), Ao Fan (National ASIC System Engineering Research Center Southeast University Nanjing, China), Minyi Lu (National ASIC System Engineering Research Center Southeast University Nanjing, China), and Weiwei Shan (National ASIC System Engineering Research Center Southeast University Nanjing, China)

Track 6: Hardware Security Track 2

A Power Analysis Attack Countermeasure Based on Random Execution 1474 Shenghua Chen (Southeast University), Wei Ge (Southeast University), Jinjiang Yang (Southeast University), Bo Liu (Southeast University), and Jun Yang (Southeast University) RNS-Based Embedding Scheme for Data Hiding in Digital Images 1480 Yi Yao (University of Electronic Science and Technology of China), Jun Zhou (University of Electronic Science and Technology of China), Bo Yan (University of Electronic Science and Technology of China), and Yuqian Li (University of Electronic Science and Technology of China) Partial Scan Design Against Scan-Based Side Channel Attacks 1484 Xi Chen (Univ. of Maryland), Zhaojun Lu (Univ. of Maryland), Gang Qu (Univ. of Maryland), and Aijiao Cui (Harbin Institute of Technology Shenzhen Graduate School)

IEEE TrustCom Short Papers

Behavioral Based Trust Metrics and the Smart Grid 1490 James Obert (Sandia National Labs), Adrian Chavez (Sandia National Labs), and Jay Johnson (Sandia National Labs) Differential Power Attack on SM4 Block Cipher 1494 Guoqiang Bai Bai (Institute of Microelectronics, Tsinghua University), Hailiang Fu (Institute of Microelectronics, Tsinghua University), Wei Li (Institute of Microelectronics, Tsinghua University), and Xingjun Wu (Institute of Microelectronics, Tsinghua University) Cryptanalysis of a Chaotic Ring Oscillator Based Random Number Generator 1498 Salih Ergün (ERGTECH Research Center - Ergunler San. Tic. Ltd. Sti.) Concepts for Trust Propagation in Knowledge Processing Systems - A Brief Introduction and Overview 1502 Markus Jäger (Johannes Kepler University (JKU), Linz, Austria), Stefan Nadschläger (Johannes Kepler University (JKU), Linz, Austria), and Josef Küng (Johannes Kepler University (JKU), Linz, Austria) Towards Trustworthy Information Sharing by Creating Cyber Security Alliances 1506 Ameneh Deljoo (University of Amsterdam), Tom van Engers (University of Amsterdam), Ralph Koning (University of Amsterdam), Leon Gommans (Air-France KLM), and Cees de Laat (University of Amsterdam)

xxx Track 2: Security Track 1

An Approach of Security Protection for VSAT Network 1511 Zhijun Wu (Civil Aviation University of China), Qingbo Pan (Civil Aviation University of China), Meng Yue (Civil Aviation University of China), and Shaopu Ma (Civil Aviation University of China) Monitoring of Temperature and Pressure Through Brillouin Optical Sensors for Disasters Systems 1517 Amira Zrelli (Enit) and Tahar Ezzedine (Enit) An Implementation of Hierarchical Intrusion Detection Systems Using Snort and Federated Databases 1521 Sarvjot kaur Kang (Concordia University Of Edmonton), Dale Lindskog (Concordia University Of Edmonton), and Hamman Samuel (Concordia University Of Edmonton) Low-Cost Energy-Efficient Side-Channel Attacks Resistant AES S-Box with Power-Aware Hiding Inverter in GF(2^4) 1526 Chaoqun Yang (Beijing Information Science and Technology University), Xiangyu Li (Tsinghua University), and Shujuan Yin (Beijing Information Science and Technology University) A Novel Identity Authentication for FPGA Based IP Designs 1531 Yin Huang (Hunan university of Science and Technology), Wei Liang (Hunan university of Science and Technology;Xiamen University of Technology), Jing Long (Hunan University), Jianbo Xu (Hunan university of Science and Technology), and Kuan-Ching Li (Providence University;Hubei University of Education)

Track 2: Security Track 2

Detection and Prevention of Routing Attacks in Internet of Things 1537 Sarika Choudhary (University of Rajasthan) and Nishtha Kesswani (University of Rajasthan) Low Delay and Low Cost Audio Surveillance System via a New Optimum FIR Digtal Filter 1541 Rongxuan Ma (Wuhan University of Science and Technology, China), Wei Hu (Wuhan University of Science and Technology, China), and Yonghao Wang (Birmingham City University, UK) UCAM: Usage, Communication and Access Monitoring Based Detection System for IoT Botnets 1547 Syed Muhammad Sajjad (Riphah Institute of Systems Engineering, Riphah International University, Islamabad Pakistan) and Muhammad Yousaf (Riphah Institute of Systems Engineering, Riphah International University Islamabad Pakistan) Proposal of Multi-channel Operation Technique Using PingPong256 1551 KiHwan Kim (Dongseo university) and HoonJae Lee (Dongseo University) A Reversible Data Hiding Scheme with High Security and Improved Embedding Capacity 1555 Gyan Singh Yadav (PDPM IIITDM Jabalpur) and Aparajita Ojha (PDPM IIITDM Jabalpur)

xxxi Track 2: Security Track 3

Behavioral-Based Classification and Identification of Ransomware Variants Using Machine Learning 1560 Hajredin Daku (Concordia University of Edmonton), Pavol Zavarsky (Concordia University of Edmonton), and Yasir Malik (Concordia University of Edmonton) ALDD: A Hybrid Traffic-User Behavior Detection Method for Application Layer DDoS 1565 Jianguo Jiang (Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China), Qian Yu (School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China), Min Yu (Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China), Gang Li (Deakin University, VIC, Australia), Jiuming Chen (School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China), Kunying Liu (Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China), Chao Liu (Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China), and Weiqing Huang (Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China) Migrating Data Between Physical Server and Cloud: Improving Accuracy and Data Integrity 1570 Mimouna Alkhonaini (Bowie State University) and Hoda El-Sayed (Bowie State University) OAuth-SSO: A Framework to Secure the OAuth-Based SSO Service for Packaged Web Applications 1575 Nazmul Hossain (Jessore University of Science & Technology , Bangladesh), Md. Alam Hossain (Jessore University of Science & Technology, Bangladesh), Md. Zobayer Hossain (Jessore University of Science & Technology, Bangladesh), Md. Hasan Imam Sohag (Jessore University of Science & Technology, Bangladesh), and Shawon Rahman (University of Hawaii-Hilo Hilo, Hawaii) Energy Efficiency Analysis of Elliptic Curve Based Cryptosystems 1579 Tanushree Banerjee (University of Waterloo) and M. Anwar Hasan (University of Waterloo)

Track 2: Security Track 4

Research on Information Security Perception of Sina Weibo Users Based on KISCAP Model 1584 Daniel Tse (City University of Hong Kong), Xuan Weng (City University of Hong Kong), Xin Wan (City University of Hong Kong), Lan Yao (City University of Hong Kong), and Wensong Zhang (City University of Hong Kong) Evaluating the Risk Management Plan and Addressing Factors for Successes in Government Agencies 1589 Henry Okonofua (HOD Consulting LLC, College Park, MD) and Shawon Rahman (University of Hawaii-Hilo Hilo, Hawaii) Hierarchical Polynomial-Based Key Management Scheme in Fog Computing 1593 Ashwag Albakri (University of Missouri- Kansas City), Mahesh Maddumala (University of Missouri- Kansas City), and Lein Harn (University of Missouri- Kansas City)

xxxii Who Would you Like to be Today?: Impersonation by Fake Azure Active Directory Identity Federation 1598 Nestori Syynimaa (University of Jyväskylä, Finland) On the Incremental Digital Signatures 1605 Kevin Atighehchi (ENSICAEN, GREYC, France)

Track 3: Privacy Track

Optimized Data de-Identification Using Multidimensional k-Anonymity 1610 Kai-Cheng Liu (Industrial Technology Research Institute), Chuan-Wei Kuo (Industrial Technology Research Institute), Wen-Chiuan Liao (Industrial Technology Research Institute), and Pang-Chieh Wang (Industrial Technology Research Institute) Measuring Personal Privacy Breaches Using Third-Party Trackers 1615 Erica Shuford (University of Baltimore), Tara Kavanaugh (University of Baltimore), Brian Ralph (University of Baltimore), Ebrima Ceesay (Johns Hopkins University), and Paul Watters (La Trobe University) Quantifying Information Exposure in Internet Routing 1619 Peter Mell (National Institute of Standards and Technology), Assane Gueye (University Alioune Diop of Bambey), and Christopher Schanzle (National Institute of Standards and Technology) Malicious Entities are in Vain: Preserving Privacy in Publish and Subscribe Systems 1624 Shujie Cui (The Univeristy of Auckland), Sana Belguith (The University of Auckland), Pramodya De Alwis (The University of Auckland), Muhammad Rizwan Asghar (University of Auckland), and Giovanni Russello (University of Auckland) Differentially Private Matrix Completion via Distributed Matrix Factorization 1628 Haotian Zhou (Huazhong University of Science and Technology, Wuhan, China), Xiao-Yang Liu (Columbia University), Cai Fu (Huazhong University of Science and Technology, Wuhan, China), Chen Shang (Northeast University), and Xinyi Chang (Huazhong University of Science and Technology, Wuhan, China)

Track 1&3: Trust & Privacy Track

The Challenges of Big Data Governance in Healthcare 1632 Daniel Tse (City University of Hong Kong), Chung-kin Chow (City University of Hong Kong), Ting-pong Ly (City University of Hong Kong), Chung-yan Tong (City University of Hong Kong), and Kwok-wah Tam (City University of Hong Kong) Double-Blind Reputation vs. Intelligent Fake VIP Attacks in Cloud-Assisted Interactions 1637 Jerzy Konorski (Gdansk University of Technology, Poland) Analyzing HTTP-Based Information Exfiltration of Malicious Android Applications 1642 Soham Kelkar (Wright State University), Timothy Kraus (New Mexico State University), Daria Morgan (Southern Connecticut State University), Junjie Zhang (Wright State University), and Rui Dai (University of Cincinnati)

xxxiii Privacy-Preserving Sensory Data Recovery 1646 Cai Chen (University of Electronic Science and Technology of China), Manyuan Zhang (University of Electronic Science and Technology of China), Huanzhi Zhang (University of Electronic Science and Technology of China), Zhenyun Huang (University of Electronic Science and Technology of China), and Yong Li (Chengdu University of Technology) Detecting Swimming Pools in 15-Minute Load Data 1651 Sebastian Burkhart (Salzburg University of Applied Sciences), Andreas Unterweger (Salzburg University of Applied Sciences), Günther Eibl (Salzburg University of Applied Sciences), and Dominik Engel (Salzburg University of Applied Sciences)

Track 4: Forensics and Analytics Track

C2R Net: The Coarse to Refined Network for Image Forgery Detection 1656 Yang Wei (Chongqing University of Posts and Telecommunications, China), Xiuli Bi (Chongqing University of Posts and Telecommunications, China), and Bin Xiao (Chongqing University of Posts and Telecommunications, China) An Adaptive Sliding Window Algorithm for Mining Frequent Itemsets in Computer Forensics 1660 Anping Xiong (Chongqing University of Posts and Telecommunications, Chongqing, China), Yi Huang (Chongqing University of Posts and Telecommunications, Chongqing, China), Yunsong Wu (Chongqing University, Chongqing, China), Jun Zhang (New York University, New York, United States), and Linbo Long (Chongqing University of Posts and Telecommunications, Chongqing, China) Towards Privacy-Preserving Forensic Analysis for Time-Series Medical Data 1664 Xiaoning Liu (Monash University), Xingliang Yuan (Monash University), and Joseph Liu (Monash University) The Process of Reverse Engineering GPU Malware and Provide Protection to GPUS 1669 Yazeed Albabtain (Purdue University) and Baijian Yang (Purdue University) Deduplicated Disk Image Evidence Acquisition and Forensically-Sound Reconstruction 1674 Xiaoyu Du (University College Dublin), Paul Ledwith (University College Dublin), and Mark Scanlon (University College Dublin)

Track 5: Emerging Tech Track

Towards Malware Detection via CPU Power Consumption: Data Collection Design and Analytics 1680 Robert Bridges (Oak Ridge National Laboratory), Jarilyn Hernández Jiménez (West Virginia University), Jeffrey Nichols (Oak Ridge National Laboratory), Katerina Goseva-Popstojanova (West Virginia University), and Stacy Prowell (Oak Ridge National Laboratory)

xxxiv Customized Machine Learning-Based Hardware-Assisted Malware Detection in Embedded Devices 1685 Hossein Sayadi (George Mason University), Hosein Mohammadi Makrani (George Mason University), Onkar Randive (George Mason University), Sai Manoj P D (George Mason University), Setareh Rafatirad (George Mason University), and Houman Homayoun (George Mason University) The Blockchain for Domain Based Static Sharding 1689 HyunKyung Yoo (Electronics and Telecommunications Research Institute (ETRI)), Jongchoul Yim (Electronics and Telecommunications Research Institute (ETRI)), and Sunme Kim (Electronics and Telecommunications Research Institute (ETRI)) A Practical Machine Learning Approach for Dynamic Stock Recommendation 1693 Hongyang Yang (Columbia University), Xiao-Yang Liu (Columbia University), and Qingwei Wu (Columbia University) A Controllable Efficient Content Distribution Framework Based on Blockchain and ISODATA 1698 Yangxin Wu (Sun Yat-Sen University), Peijia Zheng (Sun Yat-Sen University), Jianting Guo (Sun Yat-Sen University), Wei Zhang (Fudan University), and Jiwu Huang (Shenzhen University)

Track 4 & 5: Forensics and Analytics & Emerging Tech Track

A Novel Method for Detecting Image Forgery Based on Convolutional Neural Network 1702 Na Huang (Faculty of Information Technology, Beijing University of Technology), Jingsha He (Faculty of Information Technology, Beijing University of Technology), and Nafei Zhu (Faculty of Information Technology, Beijing University of Technology) Forensic Analysis of Wear Leveling on Solid-State Media 1706 Ashar Neyaz (Sam Houston State University), Narasimha Shashidhar (Sam Houston State University), and Umit Karabiyik (Sam Houston State University) Providing Context-Aware Security for IoT Environments Through Context Sharing Feature 1711 Everton de Matos (PUCRS), Ramão Tiago Tiburski (PUCRS), Leonardo Albernaz Amaral (PUCRS), and Fabiano Hessel (PUCRS) Securing Insulin Pump System Using Deep Learning and Gesture Recognition 1716 Usman Ahmad (Beijing Institute of Technology, China), Hong Song (Beijing Institute of Technology, China), Awais Bilal (National University of Sciences and Technology (NUST), Pakistan), Shahzad Saleem (National University of Sciences and Technology (NUST), Pakistan), and Asad Ullah (Beijing Institute of Technology, China)

IEEE TrustCom Poster Papers

Reducing Traffic Congestion for Machine to Machine Type Communication Over 4G-LTE Network by Decreasing Total Bytes Transmitted 1720 Jitto Joseph (Concordia University of Edmonton), Ron Ruhl (Concordia University of Edmonton), and Hamman Samuel (Concordia University of Edmonton)

xxxv A Public Key Based EDNS Privacy Tunnel for DNS 1722 Lanlan Pan (Geely Automobile Research Institute, China), Xuebiao Yuchi (Chinese Academy of Sciences, China), Jian Wang (Geely Automobile Research Institute, China), and Anlei Hu (China Internet Network Information Center, China) Anomaly-Based Network Intrusion Detection Model Using Deep Learning in Airports 1725 Behrooz Sezari (Clausthal University of Technology Clausthal, Germany), Dietmar P. F. Möller (Clausthal University of Technology Clausthal, Germany), and Andreas Deutschmann (German Aerospace Center (DLR), Germany)

IEEE BigDataSE 2018

IEEE BigDataSE 1

Towards Dynamic and Optimal Big Data Placement 1730 Kyriakos Kritikos (ICS-FORTH) Effective Integration of Geotagged, Ancilliary Longitudinal Survey Datasets to Improve Adulthood Obesity Predictive Models 1738 Saptashwa Mitra (Colorado State University), Yu Qiu (Colorado State University), Haley Moss (Colorado State University), Kaigang Li (Colorado State University), and Sangmi Lee Pallickara (Colorado State University) On MapReduce Scheduling in Hadoop Yarn on Heterogeneous Clusters 1747 Meng Wang (Northwest University, China), Chase Q. Wu (New Jersey Institute of Technology), Huiyan Cao (New Jersey Institute of Technology), Yang Liu (Northwest University, China), Yongqiang Wang (Northwest University, China), and Aiqin Hou (Northwest University, China) Towards a Multi-model Cloud Workflow Resource Monitoring, Adaptation, and Prediction 1755 Mohamed Adel Serhani (UAE University), Hadeel T. El Kassabi (UAE University), Nabeel Al Qirim (UAE University), and Alramzana N. Navaz (UAE University)

IEEE BigDataSE 2

Emotion Artificial Intelligence Derived from Ensemble Learning 1763 Anasse Bari (NYU) and Goktug Saatcioglu (NYU) AMI Smart Meter Big Data Analytics for Time Series of Electricity Consumption 1771 Rashid Mohammad (94975786) An Effective Method to Generate Simulated Attack Data Based on Generative Adversarial Nets 1777 Huihui Xie (Beijing Institute of Technology Beijing,China), Kun Lv (Beijing Institute of Technology Beijing,China), and Changzhen Hu (Beijing Institute of Technology Beijing,China)

xxxvi Prediction Algorithm Based on Weather Forecast for Energy-Harvesting Wireless Sensor Networks 1785 Hengyi Ren (Nanjing University of Posts and Telecommunications), Jian Guo (Nanjing University of Posts and Telecommunications), Lijuan Sun (Nanjing University of Posts and Telecommunications), and Chong Han (Nanjing University of Posts and Telecommunications) Large Scale and Parallel Sentiment Analysis Based on Label Propagation in Twitter Data 1791 Yibing Yang (Carleton University) and M. Omair Shafiq (Carleton University)

IEEE BigDataSE Short Papers

Improved Weighted Label Propagation Algorithm in Social Network Computing 1799 Yu Zheng (Shanghai Jiao Tong University), Yongxin Zhu (Shanghai Advanced Research Institute, Chinese Academy of Sciences; Shanghai Jiao Tong University), Shijin Song (Shanghai Jiao Tong University), Peng Xiong (Shanghai Jiao Tong University), Zihao Cao (Shanghai Jiao Tong University), and Junjie Hou (Shanghai Jiao Tong University) Reducing Relational Database Performance Bottlenecks Using 3D XPoint Storage Technology 1804 Jinfeng Yang (University of Minnesota, Twin Cities) and David J. Lilja (University of Minnesota, Twin Cities) A Critical Analysis of the V-Model of Big Data 1809 Alaa Alsaig (Concordia University), Vangular Alagar (Concordia University), and Olga Ormandjieva (Concordia University)

IEEE SPTIoT 2018

IEEE SPTIoT 1

Let me Join Two Worlds! Analyzing the Integration of Web and Native Technologies in Hybrid Mobile Apps 1814 Shahrooz Pouryousef (University of Massachusets Amherst), Mariam Rezaiee (Sharif University of Technology), and Ata Chizari (University of Twente) VeraGreg: A Framework for Verifiable Privacy-Preserving Data Aggregation 1820 Jakub Klemsa (Czech Technical University in Prague), Lukáš Kencl (Czech Technical University in Prague), and Tomáš Vank (Czech Technical University in Prague) Obstacles to Implementation of Information Security Governance 1826 William LIdster (Capella University) and Shawon S. M. Rahman (Capella University)

xxxvii IEEE SPTIoT 2

A CSI Frequency Domain Fingerprint-Based Method for Passive Indoor Human Detection 1832 Qingqing Tan (Nanjing University of Posts and Telecommunications), Chong Han (Nanjing University of Posts and Telecommunications), Lijuan Sun (Nanjing University of Posts and Telecommunications), Jian Guo (Nanjing University of Posts and Telecommunications), and Hai Zhu (Nanjing University of Posts and Telecommunications) Model-Based Trust Assessment for Internet of Things Networks 1838 Stephen Adams (University of Virginia), Peter A. Beling (University of Virginia), Steven Greenspan (CA Technologies), Maria Velez-Rojas (CA Technologies), and Serge Mankovski (CA Technologies)

IEEE SPTIoT 3

Privacy Preserving Distributed Attribute Computation for Usage Control in the Internet of Things 1844 Gianpiero Costantino (IIT-CNR), Antonio La Marra (IIT-CNR), Fabio Martinelli (IIT-CNR), Paolo Mori (IIT-CNR), and Andrea Saracino (IIT-CNR) Check-ins and Photos: Spatiotemporal Correlation-Based Location Inference Attack and Defense in Location-Based Social Networks 1852 Abdur R. Shahid (Florida International University), Niki Pissinou (Florida International University), S.S. Iyengar (Florida International University), and Kia Makki (Technological University of America)

IEEE PSTCI 2018

IEEE PSTCI 1

Blockchain for Fraud Prevention: A Work-History Fraud Prevention System 1858 Paul Sarda (Swinburne University of Technology), Mohammad Jabed Morshed Chowdhury (Swinburne University of Technology), Alan Colman (Swinburne University of Technology), Muhammad Ashad Kabir (Charles Sturt University), and Jun Han (Swinburne University of Technology)

IEEE PSTCI 2

Improving Email Security with Fuzzy Rules 1864 Sudarshan Chawathe (University of Maine) Monitoring Blockchains with Self-Organizing Maps 1870 Sudarshan Chawathe (University of Maine) Unauthorized Access Point Detection Using Machine Learning Algorithms for Information Protection 1876 Doyeon Kim (Sejong University), Dongil Shin (Sejong University), and Dongkyoo Shin (Sejong University)

xxxviii Using Artificial Neurons in Evidence Based Trust Computation 1879 Çiçek Güven (Eindhoven University Of Technology), Mike Holenderski (Eindhoven University of Technology), Tanir Özçelebi (Eindhoven University of Technology), and Johan Lukkien (Eindhoven University of Technology)

IEEE PSTCI 3

Intrusion-Resilient Classifier Approximation: From Wildcard Matching to Range Membership 1885 Giovanni Di Crescenzo (Perspecta Labs), Lisa Bahler (Perspecta Labs), Brian Coan (Perspecta Labs), Kurt Rohloff (New Jersey Institute of Technology), and Yury Polyakov (New Jersey Institute of Technology)

IEEE HSAT 2018

IEEE HSAT 1

Hardware Trojan Detection Utilizing Machine Learning Approaches 1891 Kento Hasegawa (Waseda University), Youhua Shi (Waseda University), and Nozomu Togawa (Waseda University) Correlation-Based Electromagnetic Analysis Attack Using Haar Wavelet Reconstruction with Low-Pass Filtering on an FPGA Implementaion of AES 1897 Aiguo Bu (Southeast University), Wentao Dai (Southeast University), Minyi Lu (Southeast University), Hao Cai (Southeast University), and Weiwei Shan (Southeast University)

IEEE HSAT 2

A New Wavelet Thresholding Method Based on Cyclostationarity for Enhancing the Interception of Computer Video Leakage Signals 1901 Jun Shi (China Academy of Electronics and Information Technology), Bo Lv (China Academy of Electronics and Information Technology), Yangyang Li (China Academy of Electronics and Information Technology), Yue Jia (China Academy of Electronics and Information Technology), Rui Wang (China Academy of Electronics and Information Technology), and Yong Liao (China Academy of Electronics and Information Technology)

IWCPSA18

Secure, Decentralized Energy Resource Management Using the Ethereum Blockchain 1907 Casimer DeCusatis (Marist College) and Kulvinder Lotay (Marist College)

xxxix 3FTFBSDIPO.BMJDJPVT$PEF)PNPMPHZ"OBMZTJT.FUIPE#BTFEPO5FYUVSF'JOHFSQSJOU $MVTUFSJOH  ;IBP9JBPMJO #FJKJOH*OTUJUVUFPG5FDIOPMPHZ $IJOB ;IBOH:JNBO  #FJKJOH*OTUJUVUFPG5FDIOPMPHZ $IJOB -J9VIVJ #FJKJOH*OTUJUVUF PG5FDIOPMPHZ $IJOB BOE$IFO2VBOCBP #FJKJOH*OTUJUVUFPG 5FDIOPMPHZ $IJOB )BOEMJOH$BQBCJMJUJFTJO4FDVSJUZ1PMJDJFT  .PVTMJN5PMCB 645)#6OJWFSTJUZ 4BMFN#FOGFSIBU $3*-$/34 6.3 6OJWFSTJUÊEh"SUPJT ,BSJN5BCJB $3*-$/34 6.3 6OJWFSTJUÊ Eh"SUPJT BOE"CEFMLBEFS#FMLIJS 645)#6OJWFSTJUZ 0O.JUJHBUJPO*OFGGJDJFODZPG4FMGJTI*OWFTUNFOUJO/FUXPSL3FDPWFSZGSPN)JHI-PTT4*4 *OGFDUJPO  7MBEJNJS.BSCVLI /*45   8$4'

4FDVSF$MPVE"O&ODSZQUFE 4DBMBCMF4UPSBHFGPS$MPVE'PSFOTJDT  .BYJNJMJBO6QIPGG 6OJWFSTJUZPG%VJTCVSH&TTFO .BUUIÅ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

YM