More information will be released.
Keynote Speakers of ICCIP 2020
Hitoshi KIYA, Prof. Dr., IEEE Fellow
Tokyo Metropolitan University, Japan
Dr. Hitoshi Kiya is the chair of the Department of Computer Science, and served as the chair of the Department of Information and communications, and as an associate dean of the Faculty of System Design, Tokyo Metropolitan University, Japan. He received his B.E and M.E. degrees from Nagaoka University of Technology, in 1980 and 1982 respectively, and his Dr. Eng. degree from Tokyo Metropolitan University in 1987. In 1982, he joined Tokyo Metropolitan University, where he became a Full Professor in 2000. From 1995 to 1996, he attended the University of Sydney, Australia as a Visiting Fellow. He is a Fellow of IEEE, IEICE and ITE. He currently serves as President of Asia-Pacific Signal and Information Processing Association (APSIPA), and He served as Regional Director-at-Large for Region 10 of the IEEE Signal Processing Society from 2016 to 2017. He was also President of the IEICE Engineering Sciences Society from 2011 to 2012, and he served there as a Vice President and Editor-in-Chief for IEICE Society Magazine and Society Publications. He was Editorial Board Member of eight journals, including IEEE Trans. on Signal Processing, Image Processing, and Information Forensics and Security, Chair of two technical committees and Member of nine technical committees including APSIPA Image, Video, and Multimedia Technical Committee (TC), and IEEE Information Forensics and Security TC. He has organized a lot of international conferences, in such roles as TPC Chair of IEEE ICASSP 2012 and as General Co-Chair of IEEE ISCAS 2019. He has received numerous awards, including ten best paper awards.
Progress and Challenges in Compressible and Learnable Image Encryption for Privacy-Preserving Image Encryption and Machine Learning
With the wide/rapid spread of distributed systems for information processing, such as cloud computing and social networking, not only transmission but also processing is done on the internet. However, cloud environments have some serious issues for end users, such as unauthorized access, data leaks, and privacy compromise, due to unreliability of providers and some accidents. Accordingly, we first focus on compressible image encryption schemes, which have been proposed for encryption-then-compression (EtC) systems, although the traditional way for secure image transmission is to use a compression-then encryption (CtE) system. EtC systems allow us to close unencrypted images to network providers, because encrypted images can be directly compressed even when the images are multiply recompressed by providers. Next, we address the issue of learnable encryption. Huge training data sets are required for machine learning and deep learning algorithms to obtain high performance. However, it requires large cost to collect enough training data while maintaining people’s privacy.
Wenjing Lou, Prof. Dr., IEEE Fellow
Virginia Polytechnic Institute, USA
Wenjing Lou is the W. C. English Endowed Professor of Computer Science at Virginia Tech and a Fellow of the IEEE. She holds a Ph.D. in Electrical and Computer Engineering from the University of Florida. Her research interests cover many topics in the cybersecurity field, with her current research interest focusing on wireless networks, privacy protection in machine learning systems, and security and privacy problems in the Internet of Things (IoT) systems. Prof. Lou is a highly cited researcher by the Web of Science Group. She received the Virginia Tech Alumni Award for Research Excellence in 2018, which is the highest university level faculty research award. She received the INFOCOM Test-of-Time paper award in 2020. She is the TPC chair for IEEE INFOCOM 2019 and ACM WiSec 2020. She was the Steering Committee Chair for IEEE CNS conference from 2013 to 2020. She is currently a steering committee member of IEEE INFOCOM and IEEE Transactions on Mobile Computing. She served as a program director at US National Science Foundation (NSF) from 2014 to 2017.
Consensus Protocols and Security of Blockchain
Blockchain, the technology behind Bitcoin, has emerged as a “secure by design” technology, showing great potential to enable a wide range of decentralized secure applications across a broad spectrum of industries. However, the security of blockchain is largely depending on a threshold assumption. Using the Bitcoin network as an example, a fundamental assumption is that the network is secure as long as adversaries cannot control more than 50% of the network’s gross computing power. In this talk, we will focus on the proof-of-work (PoW) blockchain consensus protocols and examine some fundamental security properties of blockchain. We show that while blockchain promises decentralization, irreversible record keeping, public verifiability, transparency, and user anonymity, etc., these security properties do not come for free and they are not guaranteed. Excessive overhead and performance deficits may place a fundamental limit on the use of blockchain in many applications. We also show that factors, such as mining strategies and network connectivity, could significantly reduce the fundamental 50% threshold value of blockchain security.
Prof. Weichao Wang
University of North Carolina Charlotte, USA
Dr. Weichao Wang is a full professor in the Department of Software and Information Systems at UNC Charlotte. He received the PhD degree in Computer Science from Purdue University in 2005, and the Master’s and Bachelor Degrees from Tsinghua University, China in 2000 and 1998, respectively. His research focuses on the security and resilience of mobile networks, cloud environments, Internet of Things, and cyber physical systems. His research has been funded by the US National Science Foundation, the Department of Labor, and Duke Energy.
Proof of Network Security Services: Enforcement of Security SLA through Outsourced Network Testing
Many companies outsource their network security functionality to third party service providers. To guarantee the quality of such services, a Security Service Level Agreement (SSLA) between the two parties often needs to be signed and enforced. Some mechanisms to verify the execution of the SSLA must be designed. In this paper, we propose a mechanism to allow a non-interest third party to help end customers verify the SSLA. Specifically, an end customer can carefully craft network traffic and conduct spontaneous and configurable verification of the SSLA with the help of a group of testers. While the basic idea is straightforward, multiple methods must be designed to guarantee the execution of the testing procedure. For example, we need to prevent the testing sites from being abused for network attacks. We describe our approaches in details. Our analysis and quantitative results show that our approach can effectively help end customers verify the execution of network security SLA.