IEEE Conference on Communications and Network Security
30 May-1 June 2018 // Beijing // China

Accepted Poster List [Main Conference]

List of Accepted Posters in IEEE CNS 2018 Main Conference

Date: Thursday, May 31, 2018

Time: 17:00 - 18:00

Room: Grand Ballroom 1

Posters are listed as “Seq”,  “Title” and “Authors with affiliation and country”

  1. A Low Complexity Feature Extraction for the RF Fingerprinting Process
    Yushan Li and Liufei Chen (UESTC, P.R. China); Chen Jie and Feiyi Xie (University of Electronic Science and Technology of China, P.R. China); Song Lin Chen and Hong Wen (UESTC, P.R. China)
  2. A Search-based Firmware Code Analysis Method for IoT Devices
    Yifei Xu (Xi'an Jiaotong University, P.R. China); Ting Liu (Xi'an Jiaotong University, PRC, P.R. China); Pengfei Liu and Hong Sun (Xi'an Jiaotong University, P.R. China)
  3. Acceleration of Packet Classification via Inclusive Rules
    Takashi Harada and Ken Tanaka (Kanagawa University, Japan); Kenji Mikawa (Niigata University, Japan)
  4. Aggregated-Query-as-a-Secure-Service for RF Spectrum Database-Driven Opportunistic Wireless Communications
    Abdulhamid A. Adebayo, Danda B. Rawat and Moses Garuba (Howard University, USA); Laurent Njilla (Air Force Research Laboratory, USA)
  5. An Efficient Privacy-Preserving Dynamic Pricing-based Billing Scheme for Smart Grids
    Prosanta Gope (National University of Singapore (NUS), Singapore); Biplab Sikdar (National University of Singapore, Singapore)
  6. An ISO/IEC 15408-2 Compliant Security Auditing System with Blockchain Technology
    Shi-Cho Cha (National Taiwan University of Science and Technology, Taiwan); Kuo-Hui Yeh (National Dong Hwa University, Taiwan)
  7. Block Chain Based Secure Scheme For Mobile Communication
    Liufei Chen, Yushan Li, Hong Wen, Wenxin Lei and Wenjing Hou (UESTC, P.R. China); Chen Jie (University of Electronic Science and Technology of China, P.R. China)
  8. DOPA: Detecting Open Ports in Android OS
    Ali Alshehri, Hani Alshahrani, Abdulrahman Alzahrani, Raed Alharthi, Huirong Fu and Anyi Liu (Oakland University, USA); Ye Zhu (Cleveland State University, USA)
  9. Fine-grained Android Malware Detection based on Deep Learning
    Dongfang Li (Tsinghua University, P.R. China); Wang Zhaoguo (Tsinghua National Lab for Information Science and Technology, P.R. China); Yibo Xue (Tsinghua university, P.R. China)
  10. Physical Intrusion Detection for Industrial Control System
    Pengfei Liu (Xi'an Jiaotong University, P.R. China); Ting Liu (Xi'an Jiaotong University, PRC, P.R. China)
  11. Protecting Your Own Private Key in Cloud: Security, Scalability and Performance
    Wenqian Yu (Intel Asia-Pacific Research & Development Ltd. & Intel, P.R. China); Ping Yu (Intel, P.R. China); Junyuan Wang, Changzheng Wei and Lu Gong (Intel Asia-Pacific Research & Development Ltd., P.R. China); Weigang Li (Intel, P.R. China); Bo Cui (Intel Asia-Pacific Research & Development Ltd., P.R. China); Hari Tadepalli and Brian Will (Intel, USA)
  12. Secret Dispersion: Secure Data Delivery in Cyber Physical System
    Rui Hu and Yanmin Gong (Oklahoma State University, USA)
  13. SecureCASH: Securing Context-Aware Distributed Storage and Query Processing in Hybrid Cloud Framework
    Geremew Begna, Danda B. Rawat and Moses Garuba (Howard University, USA); Laurent Njilla (Air Force Research Laboratory, USA)
  14. Signature Miner: A fast Anti-Virus signature intelligence tool
    Ignacio Martín and José Alberto Hernández (Universidad Carlos III de Madrid, Spain); Sergio de Los Santos (Telefónica Digital, Spain)
  15. T-PAAD: Trajectory Privacy Attack on Autonomous Driving
    Abdelnasser Banihani, Abdulrahman Alzahrani, Raed Alharthi and Huirong Fu (Oakland University, USA); George Corser (Saginaw Valley State University & Oakland University, USA)

Patrons