PriCom 2019

The 5th International Symposium on Privacy Computing

19-21 August 2019, University of Kent, Canterbury, UK

Program

All sessions will take place at Sibson LT2 (on the 1st floor), located in the Sibson Building, on the Canterbury campus of the University of Kent. The buffet lunches will be served in the Sibson Atrium (on the ground floor).

There are two different types of talks: 30-min long talks and 10-min short talks. Long talks are allocated 30 mins including Q&A, so we recommend that the speaker should use 25 mins for the presentation and leave 5 mins for Q&A. Short talks are allocated 10 mins in total, and we recommend that the speaker should use 7-8 mins for the presentation and leave 2-3 mins for quick questions and answers. Session chairs are recommended to collect slides and load them to the computer in the lecture theatre before hand to help save time.

Day 1: 19th August, 2019

08:45-08:50Welcome Address by PriCom 2019 General Co-Chair Prof Shujun Li
08:50-09:50Keynotes (Chair: Shujun Li)
08:50-09:201. Privacy Computing: Concept, Computing Framework and Future Development Trends (Fenghua Li, Institute of Information Engineering, Chinese Academy of Sciences, China)
09:20-09:502. When EU GDPR (General Data Protection Regulation) Meets Blockchains (Lisa Dickson and Shujun Li, Univeresity of Kent, UK)
09:50-10:00Coffee Break
10:00-11:00Session 1: Privacy-Preserving Computing 1 (Chair: Fenghua Li)
10:00-10:301.1: A Location Privacy Preservation Approach towards to Content Sharing on Mobile Social Networks (Chao Li, Lihua Yin and Xiangtao Liu)
10:30-11:001.2: A Crowdsensing-based Auxiliary Monitoring with Privacy-Preserving Applied to Traffic Violation (Yuanyuan Zhang, Shaohua Tang, Jinbo Xiong and Xin'An Wei)
11:00-11:10Coffee Break
11:10-12:10Session 2: Privacy-Preserving Computing 2 (Chair: Weidong Qiu)
11:10-11:402.1: Privacy-Preserving Spatial Query over Encrypted Data in Outsourced Environment (Huijuan Lian, Weidong Qiu, Di Yan, Zheng Huang and Jie Guo)
11:40-12:102.2: Lattice-based Privacy-Preserving Group Handover Authentication Mechanism for Internet of Vehicles (Ruhui Ma, Jin Cao, Hui Li, Xingwen Zhao and Fenghua Li)
12:10-13:00Buffet Lunch
13:00-14:00Session 3: Differential Privacy (Chair: Deqing Zou)
13:00-13:303.1: High-Dimensional Gaussian Mechanism Based Differential Privacy in Linear Regression and Dynamic Allocation of Privacy Budget (Xiaoguang Li, Hui Li, Hui Zhu, Fenghua Li and Muyang Huang)
13:30-14:003.2: A Matrix Factorization-Based Method for Group Recommendation with Local Differential Privacy (Fenghua Li, Hanyi Wang, Ben Niu and Hui Li)
14:00-14:10Coffee Break
14:10-15:00Session 4: Short Papers 1 (Chair: Hui Li)
14:10-14:204.1: A Privacy-Preserving Scheme in Blockchain-Based Distributed Storage Systems (Shipu Sun and Feng Xia)
14:20-14:304.2: A Quantification Framework of Location Privacy in LBS (Zhihong Tian, Chao Li and Lihua Yin)
14:30-14:404.3: Uniform Privacy-Preserving Mutual Authentication and Key Agreement Mechanism for Roaming D2D Direct Communications (Yunqing Sun, Jin Cao, Hui Li, Xingwen Zhao and Ben Niu)
14:40-14:504.4: An LLVM-based IoT application code obfuscation method (Weina Niu, Yue Zhang, Xiaosong Zhang, Hongwei Li and Mingxing He)
14:50-15:004.5: Research on Searchable Public Key Encryption Blockchain Data Privacy Protection (Tao Feng, Xuan Chen and Chunyan Liu)
15:00-21:00Social Event
15:00-18:00Free activities
18:00-19:00Drink reception at Cathedral Lodge
19:00-21:00Conference dinner at Cathedral Lodge

Day 2: 20th August, 2019

09:00-10:00Session 5: AI and Security/Privacy (Chair: Shujun Li)
09:00-09:305.1: Anomalous Behavior Fusion Analysis of Electronic Invoices Based on User Privacy Information Protection (Peng Tang, Weidong Qiu, Shuang Chen, Min Yan and Huijuan Lian)
09:30-10:005.2: Data hiding and AI security (Weiming Zhang and Nenghai Yu)
10:00-10:10Coffee break
10:10-11:40Session 6: Attacks (Chair: Xiaosong Zhang)
10:10-10:406.1: A Just-In-Time Code Reuse Attack Defense Method in Cloud Environment (Weiming Li, Deqing Zou and Yueming Wu)
10:40-11:106.2: Dynamically Mitigating Multi-Step Attacks: A Probabilistic Attack Tree Approach (Fenghua Li, Yongjun Li, Han Zhang, Wei Jin, Yunchuan Guo and Zhen Wang)
11:10-11:406.3: When an attacker meets a cipher-image in 2018: A Year in Review (Chengqing Li)
11:40-12:30Buffet Lunch
12:30-13:30Session 7: Short Papers 2 (Chair: Ting Wu)
12:30-12:407.1: HSE-Voting: A Secure High-Efficiency Electronic Voting Scheme Based on Homomorphic Signcryption (Xingyue Fan, Ting Wu, Qiuhua Zheng, Yuanfang Chen, Muhammad Alam and Zhen Wang)
12:40-12:507.2: Security Analysis on One-to-Many Order Preserving Encryption based on Earth Mover's Distance (Jiachen Ding, Weiming Zhang and Nenghai Yu)
12:50-13:007.3: Lightweight Android Malware Classification Using Weighted Reachable API Paths (Yueming Wu, Weizhong Qiang, Xin Zhang and Kang Zhu)
13:10-13:207.4: A Gaming Theoretic Framework for Defending Against Memcached based Reflection Distributed Denial-of-Service Attacks (Lihua Yin and Zhihong Tian)
13:20-13:307.5: A National-Security-Based and Attack-Step-Based Method on APT Group Classification and Evaluation (Biao Wang, Ennan Zheng and Shuhan Fan)
13:30-14:00Coffee Break and Networking
14:20-16:00Poster Session
15:00-18:00Visit to KirCCS, School of Computing, and other departments of the University of Kent
19:00-21:00Conference Dinner at Café Du Soleil

Day 3: 21st August, 2019

The third day of the conference is designed to be a day for group discussion and brainstorming. Participants will be split into smaller "special interest groups" focusing on different sub-topics in order to encourage new collaborations between participants and to generate new research ideas. The conference will help facilitate such group discussions in a flexible and friendly settings. Some recommended sub-topics include (more are welcome from participants at the conference):

  • Privacy metrics and privacy risk assessment
  • Privacy-preserving computing
  • User-centric privacy protection
  • Privacy protection in blockchains and cryptocurrencies
  • Privacy in IoT
  • Privacy and AI
  • GDPR and beyond: legal aspects of privacy (data) protection
top