This event is endorsed
and organized by

9th EAI International Conference on Mobile Networks and Management

December 13–15, 2017 | Melbourne, Australia

Day 1, Wednesday, 13 December 2017

8:00 - 9:00

Registration

8:45 - 9:10

Opening

9:10 - 9:50

Keynote 1: Wanlei Zhou

9:50 - 10:30

Keynote 2: Joe Dong

10:30 - 10:50

Coffee Break

10:50 - 12:50

Session  Cyber Security Forensics:

 Chair: Prof. Chan Yeob Yeun, Khalifa University, UAE

1.       Efthimios Alepis, and Constantinos Patsakis, “Persistent vs Service IDs in Android: Session Fingerprinting from Apps.”

2.       Melchizedek Alipio, and Nestor Michael Tiglao, “A Cache-aware Congestion Control for Reliable Transport in Wireless Sensor Networks.”

3.       Nam Nhat Tran, Ruhul Sarker, and Jiankun Hu, AN APPROACH FOR HOST-BASED INTRUSION DETECTION SYSTEM DESIGN USING CONVOLUTIONAL NEURAL NETWORK.”

4.       Emna Baccour, Ala Gouissem, Sebti Foufou, Ridha Hamila, Zahir Tari, and Albert Y. Zomaya, “An Energy Saving Mechanism based on Vacation Queuing Theory in Data Center Networks.”

5. Zifan Liu, Qing Cai, Xiaolong Xu, Wanchun Dou, and Shui Yu, “A Cloud Service Enhanced Method Supporting Context-aware Applications.”

6.       Yen Hong TRAN, Quang Nhat TRAN, “Estimating public opinion in social media content using aspect-based opinion mining.”

12:50 - 13:50

Lunch Break

13:50 - 14:30

Keynote 3: Willy Susilo

14:30 - 15:50

Session Biometrics Security:

Chair: Dr. Wencheng Yang, Edith Cowan University, Australia

1.       Xuefei Yin, Yanming Zhu and Jiankun Hu, “A Robust Contactless Fingerprint Enhancement Algorithm.”

2.       Zhe Jin, Yen-Lung Lai, Jung Yeon Hwang, Soohyung Kim, Sangrae Cho and Andrew Beng Jin Teoh, “ A Cancellable Ranking based Hashing Method for Fingerprint Template Protection.”

3.       Wencheng Yang, Guanglou Zheng, Ahmed Ibrahim, Junaid Chaudhry, Song Wang, Jiankun Hu and Craig Valli1, “ Application of 3D Delaunay Triangulation in Fingerprint Authentication System.”

4.       Yanming Zhu, Xuefei Yin and Jiankun Hu, “Robust Fingerprint Matching Based on Convolutional Neural Networks.”

15:50 - 16:15

Coffee Break

16:15- 17:15

Session  Applied Cryptography I:

Chair: Prof. Hamid Usefi, Memorial University of Newfoundland, St. John’s, Canada 

1.       Hamid Usefi, and Sudharaka  Palamakumbura, “Homomorphic Evaluation of Database Queries.”

2.       Tiong-Sik Ng, Syh-Yuan Tan, and Ji-Jian Chin, “A Variant of BLS Signature With Tight Reduction.”

3. Kakumani K C Deepthi and Kunwar Singh, “Cryptanalysis of Salsa and ChaCha: Revisited.”

17:15- 18:15

Session Networking I

Chair: Dr. Lukas Ifflander, University of Würzburg, Germany

1.       Rizza T. Loquias, Nestor Michael C. Tiglao, Jhoanna Rhodette I. Pedrasa, Joel Joseph S. Marciano, “Factor Effects for Routing in a Delay-tolerant Wireless Sensor Network for Lake Environment Monitoring”

2.       Andrzej M Goscinski, Zahir Tari, Izzatdin A. Aziz, “Fog Computing as a Critical Link between a Central Cloud and IoT in Support of Discovery of New Hydrocarbon Reservoirs at A Higher Speed,”

3.       Lukas Ifflander, Christopher Metter, Florian Wamser, Phuoc Tran-Gia,and Samuel Kounev, “Performance Assessment of Cloud Migrations from Network and Application Point of View,”

18:30

Reception (Platform 28 )

Day 2, Thursday 14 December 2017

9:10 - 9:50

Keynote 4: Yongsheng Gao

9:50 - 10:30

Keynote 5: Kenny Paterson

10:30 - 11:00

Coffee Break

11:00 - 11:40

Keynote 6: Andrew Miller

11:40 - 14:00

Lunch Break

14:00 - 14:40

Keynote 7: Tsz Hon Yuen

14:40 - 16:30

Coffee Break

16:30 - 18:10 

Session Networking II

Chair: Prof. Jaison Paul Mulerikkal Rajagiri School of Engineering and Technology, India

1.       Sona C P and Jaison Paul Mulerikkal, “Performance Comparison of Distributed Pattern Matching Algorithms on Hadoop MapReduce Framework”.

2.       Ben Quinton and Neda Aboutorab, “Ooading of Fog Data Networks with Network Coded Cooperative D2D Communications.”

3.       Waqas haider, Jiankun Hu, Nour Muostafa, “Designing Anomaly Detection System for Cloud Servers by Frequency Domain Features of System Call Identi_ers and Machine Learning.”

4.       Nickilaos Koroniotis, Nour Moustafa, Elena Sitnikova, Jill Slay, “Towards Developing Network forensic mechanism for Botnet Activities in the IoT based on Machine Learning Techniques.”

 

5.       Thomas Marsden, Nour Moustafa, Elena Sitnikova, and Gideon Creech, “Probability Risk Identification Based Intrusion Detection System for SCADA Systems.”

19:00

Banquet (Gold Leaf at Docklands Harbour )

Day 3, Friday 15 December 2017

9:50 - 10:30

Keynote 8: Jie Lu

10:30 - 11:00

Coffee Break

11:00 - 11:40

Keynote 9: Yuliang Zheng

11:40 - 14:00

Lunch Break

14:00 - 14:40

Keynote 10: Shui Yu

14:40 - 16:00

Session  Applied Cryptography II

Chair: Prof. Chan Yeob Yeun, Khalifa University, UAE

1.       Mouza Ahmed Bani Shemaili1, Chan Yeob Yeun, Mohamed Jamal Zemerly, Khalid Mubarak1, Hyun Ku Yeun, Yoon Seok Chang, Basim Zafar, Mohammed Simsim, Yasir Salih, and Gaemyoung Lee, “A New Lightweight Mutual Authentication Protocol to Secure Real Time Tracking of Radioactive Sources.”

2.       Yandong Li, Liehuang Zhu, Meng Shen, Feng Gao, Baokun Zheng, and Xiaojiang Du,” CloudShare: Towards a Cost-Efficient and Privacy-Preserving Alliance Cloud Using Permissioned Blockchains.”

3.       Fei Li, Ying Guo, and Jiankun Hu, “Quantum authentication scheme based on finngerprint-encoded graph states”.

4. Binrui Zhu, Jiameng Sun, Jing Qin, Jixin Ma, “The Public Veri_ability of Public Key Encryption with Keyword Search.”

16:00 - 16:20

Coffee Break

16:20 - 17:20

Session Big Data and others

Chair: Sibghat Ullah, Massey University, New Zealand

1.       Sibghat Ullah Bazai, Julian Jang-Jaccard, Ruili Wang, “ Anonymizing k-NN Classification on MapReduce.”

2.       Abdelaziz Bouras, Houssem Gasmi,  and Fadi Ghemri, “Cooperative Information Security / Cybersecurity Curriculum Development.”

3.       Xue Tian, Peisong Shen, Tengfei Yang,  Chi Chen,Jiankun Hu, “ A Personalized Multi-Keyword Ranked Search Method over Encrypted Cloud Data.”