SpaCCS 2019 July 14 - July 17, 2019
Sunday 7/14/2019 
08:00-16:00 Registration (Room: in front of Room Georgia 1)  
Monday 7/15/2019 
08:00-16:00 Registration (Room: in front of Room Georgia 1)  
08:30-09:00 Opening (Room: Capitol North)  
09:00-10:00 Keynote 1 (Room: Capitol North )  
10:00-11:00 Keynote 2 (Room: Capitol North )  
11:00-11:20 Coffee Break (Room: Capitol Prefunction)  
11:20-12:40 SpaCCS-M1 (Atlanta 5) SpaCCS-M2 (Georgia 3)  
12:40-13:40 Lunch  
13:40-15:00 SpaCCS-M4 (Atlanta 5) SpaCCS-M3 (Georgia 3)  
15:00-15:30 Coffee Break (Room: Capitol Prefunction)  
15:30-17:00 SpaCCS-M5 (Atlanta 5) SpaCCS-M6 (Georgia 3)  
17:00-18:00 Cybermatics Panel (Room: Capitol North )  
Note: M(Main conference), S(Workshop/Symposium)
SpaCCS-M1: Security in Communication I
Session Chair: Maode Ma (Nanyang Technological University, Singapore);                       Room: Atlanta 5
1. Blockchain-based Mobility Management for LTE and Beyond Han Lee, and Maode Ma
2. Visualization of DNS Tunneling Attacks using Parallel Coordinates Technique Yasir F. Mohammed, and Dale R. Thompson
3. A Data-Driven Network Intrusion Detection Model based on Host Clustering and Integrated Learning: A Case Study on Botnet Detection Lena Ara, and Xiao Luo
4. TLShps: SDN-based TLS Handshake Protocol Simplification for IoT Lei Yan, Yan Ma, and Maode Ma
SpaCCS-M2: Privacy I
Session Chair: Dwight Makaroff (University of Saskatchewan, Canada);                       Room: Georgia 3
1. Distributed Privacy Preserving Platform for Ridesharing Services   Yevhenii Semenko, and Damien Saucez
2. EPT: EDNS Privacy Tunnel for DNS Lanlan Pan, Jie Chen, Anlei Hu, and Xuebiao Yuchi
3. End-to-end Encryption Schemes for Online Social Networks Fabian Schillinger, and Christian Schindelhauer
SpaCCS-M3: Privacy II
Session Chair: Dwight Makaroff (University of Saskatchewan, Canada);                       Room: Georgia 3
1. A Verifiable Encryption Scheme Supporting Fuzzy Search Ruwei Huang, Zhikun Li, and Siqi Chen
2. A Verifiable Fully Homomorphic Encryption Scheme Ruwei Huang, Zhikun Li, and Siqi Chen
3. A Study on Anonymous Protocol in a Permission Blockchain with Ensure Privacy for a Member Gyeong-Jin Ra, Daehee See, Md Zakirul Alam Bhuiyan, and Im-Yeong Lee
4. Information Leakage in Wearable Applications Babatunde Olabenjo, and Dwight Makaroff
SpaCCS-M4: Security in Computation I
Session Chair:  Yunpeng Zhang (University of Houston, USA);                          Room: Atlanta 5
1. A Lightweight Secure Communication Protocol for IoT devices using Physically Unclonable Function Priyanka Mall, Md Zakirul Alam Bhuiyan, and Ruhul Amin
2. Ensuring Data Integrity in Fog Computing Based Healthcare Systems Abdulwahab Alazeb, and Brajendra Panda
3. Modelling Security Requirements for Software Development with Common Criteria Amara Naseer, Zhiqui Huang, and Ali Awais
SpaCCS-M5: Security in Communication   II
Session Chair: Yunpeng Zhang (University of Houston, USA);                       Room: Atlanta 5
1. Using machine learning to find anomalies in fieldbus network traffic Peters Martin, Goltz Johannes, Wiedenmann Simeon, and Mundt Thomas
2. A New Intrusion Detection System Based on Gated Recurrent Unit(GRU) and Genetic Algorithm Mahdi Manavi, and Yunpeng Zhang
3. Topic Model Based Android Malware Detection Yucai Song, Yang Chen, Bo Lang, Hongyu Liu, and Shaojie Chen
4. Secure Communication in UAV Assisted HetNets: A Proposed Model Aabid Rashid, Diwankshi Sharma, Sumeet Gupta, and Sachin Kumar Gupta
SpaCCS-M6: Security in Storage
Session Chair: Damien Saucez (Inria, France);                       Room: Georgia 3
1. Ransomware Attack Protection: A Cryptographic Approach Anjali Kumari, Zakirul Alam Bhuiyan, Jigyasa Namdeo, Shipra Kanaujia, Ruhul Amin, and Satyanarayana Vollala
2. Paper Document Authentication Using Print-scan Resistant Image Hashing and Public-key Cryptography Fawad Ahmad, and Lee-Ming Cheng
3. Method of Deep Web Collection for Mobile Application Store Based on Category Keyword Searching Guosheng Xu, Zhimin Wu, Lu Wang, Zhiyong Wang, Chengze Li, Jinghua Yan, Jing Yuan, and Hao Wu
4. Cyber Weapons Storage Mechanisms Muhammd Mudassar Yamin, Basel Katt, and Mazaher Kianpour   
Tuesday 7/16/2019 
08:00-16:00 Registration (Room: in front of Room Georgia 1)  
09:00-10:00 Keynote 3 (Room: Capitol North)  
10:00-11:00 Keynote 4 (Room: Capitol North)  
11:00-11:20 Coffee Break (Room: Capitol Prefunction)  
11:20-12:40 SpaCCS-M7 (Atlanta 5) SpaCCS-W1 (Georgia 3)  
12:40-13:40 Lunch  
13:40-15:00 SpaCCS-M8 (Atlanta 5) SpaCCS-W2 (Georgia 3)  
15:00-15:30 Coffee Break (Capitol Prefunction)  
15:30-16:30 SpaCCS-M9 (Atlanta 5) SpaCCS-W3 (Georgia 3)  
16:30-17:50 SpaCCS-M10 (Atlanta 5)  
Note: M(Main conference), S(Symposium)
SpaCCS-M7: Anonymity
Session Chair:  David Maimond (Georgia State University, USA);                       Room: Atlanta 5
1. Towards H-SDN Traffic Analytic Through Visual Analytics and Machine Learning Tze Chiang Tin, Saw Chin Tan, and Ching Kwang Lee
2. Characteristics of Bitcoin Transactions on Cryptomarkets Xucan Chen, Mohammad Al Hasan, Xintao Wu, Pavel Skums, Mohammad Javad Feizollahi, Marie Ouellet, Eric L. Sevigny, David Maimon, and Yubao Wu
3. A Closer Look At Anonymous Proxy Re-encryption Schemes Sharmila Deva Selvi, C. Pandu Rangan, Harish S., and Swethashree Dhanabal
SpaCCS-M8: Security in Communication III
Session Chair: Yubao Wu (Georgia State University);                       Room: Atlanta 5
1. Data Protection Labware for Secure Mobile Software Development Hossain Shahriar, Kai Qian, Md Arabin Talukder, Mike Whitman, Hongmei Chi, Mohammad Rahman, and Sheikh Ahamed
2. Python Scrapers for Scraping Cryptomarkets on Tor Yubao Wu, Fengpan Zhao, Xucan Chen, Pavel Skums, Eric L. Sevigny, David Maimon, Marie Ouellet, Monica Haavisto Swahn, Sheryl M Strasser, Mohammad Javad Feizollahi, Youfang Zhang, and Gunjan Sekhon
3. Effectiveness of Machine Learning based Intrusion Detection Systems Mohammed Alrowaily, Freeh Alenezi, and Zhuo Lu
4. DNS Flood Attack Mitigation Utilizing Hot-lists and Stale Content Updates Tasnuva Mahjabin, and Yang Xiao
SpaCCS-M9: Security in Communication  IV
Session Chair: Yubao Wu (Georgia State University);                       Room: Atlanta 5
1. Detection of Application-Layer Tunnels with Rules and Machine Learning Huaqing Lin, Gao Liu, and Zheng Yan
2. Automated Construction of Malware Families Krishnendu Ghosh, and Jeffery Mills
3. Approximate String Matching for DNS Anomaly Detection Roni Mateless, and Michael Segal
SpaCCS-M10: Security in Computation II
Session Chair:Yubao Wu (Georgia State University);                       Room: Atlanta 5
1. Attack-Aware Recovery Controller-Switch-Link Cost Minimization Placement Algorithm in Software-Defined Networking C Q Cheng, Tan Saw Chin, Ching Kwang Lee, Z. Yusoff., and R. Kaspin  
2. Challenges and Future Direction of Time-Sensitive Software-Defined Networking (TSSDN) in Automation industry Ng Kean Haur, and Tan Saw Chin
3. An Encryption based Approach to Protect Fog Federations from Rogue Nodes Mohammed Alshehri, and Brajendra Panda
4. Touch Analysis: An Empirical Evaluation of Machine Learning Classification Algorithms on Touch Data Melodee Montgomery, Prosenjit Chatterjee, and Kaushik Roy
SpaCCS-W1: Security and Privacy on Internet of Things
Session Chair: Shachar Siboni (Ben-Gurion University of the Negev);                       Room: Georgia 3
1. A Weighted Risk Score Model for IoT Devices Shachar Siboni, Chanan Glezer, Asaf Shabtai, and Yuval Elovici
2. Privacy-Preserving Big Data Analytics: From Theory to Practice Mohammad G. Raeini, and Mehrdad Nojoumian
3. Software Quality Optimization: Tools & Techniques Allah Bachayo Brohi, Pinial Khan Butt, Shaobo Zhang, and Faisal Ul Rehman Qureshi
4. PINGCHEGO: An Android Real-time Carlpooling System Xuesong Wang, Yizhi Liu, Zhengtao Jiang, You Peng, and Tianhao Yin
SpaCCS-W2: Sensor-Cloud Systems I
Session Chair: Shachar Siboni (Ben-Gurion University of the Negev);                       Room: Georgia 3
1. Limited Memory Eigenvector Recursive Principal Component Analysis in Sensor-Cloud Based Adaptive Operational Modal Online Identification Cheng Wang, Haiyang Huang, Tianshu Zhang, and Jianwei Chen
2. Optimization of optical Imaging MIMO-OFDM precoding matrix for underwater VLC Yanlong Li, Hongbing Qiu, Xiao Chen, Jielin Fu, Junyi Wang, and Yitao Zhang
3. Data collection scheme for Underwater Sensor Cloud System Based on Fog Computing Haitao Yu, Jiansheng Yao, and Xianhao Shen
4. A Survey on Fog Computing Rui Huang, Yu Sun, Chao Huang, Guang Zhao, and Ying Ma
SpaCCS-W3: Sensor-Cloud Systems II
Session Chair:David Maimond (Georgia State University, USA);                       Room: Georgia 3
1. An Approximate Data Collection Algorithm in Space-based Internet of Things Changjiang Fei, Baokang Zhao, Wanrong Yu, and Chunqing Wu
2. Outlier Detection of Internet of Vehicles Yingming Zeng, Huanlei Zhao, Haibin Zhang, and Qian Zhang
3. Review of Power Spatio-Temporal Big Data Technologies, Applications, and Challenges Ying Ma, Chao Huang, Yu Sun, Guang Zhao, and Yunjie Lei
4. Naïve Approach for Bounding Box Annotation and Object Detection towards Smart Retail Systems Pubudu Ekanayake, Chenhui Yang, Li Deng, and Xin Hong
5. Evaluation of Face Recognition Techniques Based on Symlet 2 Wavelet and Support Vector Machine Zhipeng Li, Xuesong Jiang, and Yewen Pang
6. CP-MCNN:Multi-label Chest X-ray Diagnostic based on Confidence Predictor and CNN Huazhen Wang, Junlong Liu, Sisi Lai, Nengguang Wu, and Jixiang Du
Wednesday 7/17/2019 
08:00-14:00 Registration (Room: in front of Room Georgia 1)  
09:00-10:00 Keynote 5 (Room: Capitol North)  
10:00-11:00 Keynote 6 (Room: Capitol North)  
11:00-11:20 Coffee Break (Room: Capitol Prefunction)  
11:20-12:40 SpaCCS-W4 (Atlanta 5) SpaCCS-W6 (Georgia 3)  
12:40-13:40 Lunch  
13:40-15:00 SpaCCS-W5 (Atlanta 5)    
Note: M(Main conference), (Workshop/Symposium)
SpaCCS-W4: Trust, Security and Privacy for Emerging Applications
Session Chair:Mark Quinlan (University of Oxford);                       Room:  Atlanta 5
1. Connected Vehicles: A Privacy Analysis Mark Quinlan, Jun Zhao, and Andrew Simpson
2. A Framework to Identify People in Unstructured Environments Incorporating Biometrics Janelle Mason, Prosenjit Chatterjee, Kaushik Roy, and Albert Esterline
3. Continuous Authentication Using Mouse Clickstream Data Analysis Sultan Almalki, Prosenjit Chatterjee, and Kaushik Roy
4. Presentation Attack detection using Wavelet Transform and Deep Residual Neural Net Prosenjit Chatterjee, Alex Yalchin, Joseph Shelton, Kaushik Roy, Xiaohong Yuan, and Kossi D. Edoh
SpaCCS-W5: UbiSafe Computing
Session Chair:Mark Quinlan (University of Oxford);                       Room: Atlanta 5
1. An Approach of ACARS Trajectory Reconstruction Based on Adaptive Cubic Spline Interpolation Zhijun Wu, Shan Tian, Yang Song, Lan Ma, and Meng Yue
2. Task scheduling for streaming applications in a cloud-edge system Fei Yin, Xinjia Li, Xin Li, and Yize Li
3. Lightweight Distributed Attribute Based Keyword Search System for Internet of Things Jiahuan Long, Xiaofen Wang, and Zhang Ke
4. Continuous Objects Detection Based on Optimized Greedy Algorithm in IoT Sensing Networks Jin Diao, Jine Tang, Deng Zhao, and Zhangbing Zhou
SpaCCS-W6: Cybersecurity Metrics and Risk Modeling 
Session Chair:Yubao Wu (Georgia State University) ;                       Room: Georgia 3
1. Web-based intelligence for IDS Christopher B. Freas, and Robert W. Harrison
2. Cost-Efficient Task Scheduling for Geo-distributed Data Analytics Linfeng Xie, Yang Dai, Yongjin Zhu, Xin Li, Xiangbo Li, and Zhuzhong Qian
3. Predictably Deterrable? The Case of System Trespassers David Maimon, Alexander Testa, Bertrand Sobesto, Michel Cukier, and Wuling Ren