Workshops
+ 查看更多
Workshop 1:Systems Security
Title 1:Systems Security
Summary:
The workshop aims to bring together researchers, practitioners, system administrators, system programmers, and others interested in the latest advances in the security of computer systems and networks. The objective of the workshop is to discuss novel, practical, systems-oriented work.
Keywords:Web Security , System Security Aspects of Privacy , Network Security , Operating System Security
Chair:
Prof. Hong Huang , Beijing University of science and technology, China

Hong Huang received his Ph. D in Information Security from Beijing University of science and technology University. He worked as a professor at the School of Computer Science and Engineering, Sichuan University of science and technology. His research interests include System Security and Security Big Data.
He participated in the National Natural Science Foundation, National Key Research and Development Project, Key Research and Development Projects of Sichuan Province, etc. Based on these projects, he published many academic papers.
---------------------------------------------------------------------------------------------------------------------------------------------------
Workshop 2 : Network Security
Title 1:Network Security
Summary :
Network security means that the hardware, software, and data in the network system are protected from being damaged, changed, or leaked due to accidental or malicious reasons. The system operates continuously, reliably, and normally, and the network service is not interrupted. With the rapid development of computer technology, information network has become an important guarantee for social development. There is a lot of sensitive information, even state secrets. Therefore, it is inevitable to attract various man-made attacks from all over the world (such as information leakage, information theft, data tampering, data deletion, computer viruses, etc.). At the same time, network entities have to withstand tests such as floods, fires, earthquakes, electromagnetic radiation, etc.
Keywords : Information Security, Information Network, Network Security
Chair:
Prof. Yanrong Cui , Yangtze University, China

Yanrong Cui is a Professor, Doctor, Master Tutor, who graduated from China University of Geosciences with a bachelor's degree in computer application in 1992 and a doctor's degree in computer software and theory a Wuhan University in 2008. She presided over and participated in more than 20 projects of all levels and types and published more than 30 papers. She is the Editor-in-chief of the 21st-century college planning textbook "Introduction to the Internet of Things", which was published by Tsinghua University Publishing House, and the editor-in-chief of the college computer major planning textbook "Discrete Mathematics", which was published by Tsinghua University Publishing House. In 2009, 2010, and 2011, she won the Excellence Award for Teaching Quality of Yangtze University for three consecutive years and coached students to participate in the National Computer Simulation Competition and won one national first prize, second prize, and two third prizes.
She won second prize and third prize of the 2014 Outstanding Contribution Award for Teaching Work of Yangtze University. She won the first "Ren Dalong Award" of Yangtze University and was a famous teacher at Yangtze University
---------------------------------------------------------------------------------------------------------------------------------------------------
Workshop 3 : Security, Privacy, Access Control and Data Sharing
Title 1: Sharing Sensitive Data Securely on Blockchain
Summary:
In the big data era, more and more sensitive data are generated from various applications, such as health data from smart medical care, financial data from online banks, location data from location-based services, and utilities from the smart grid as well. To provide users with personalized and intelligent services or meet the requirements of government regulation and management, these sensitive data are always required to be shared among multiple parties. For preserving users' privacy, sensitive data sharing must be secure. How to share sensitive data especially in an open environment is a challenging topic. As the distributed ledger, the blockchain has attracted many researchers to solve the security and/or privacy preserving problems on it. And it may provide several new solutions to sensitive data sharing. This workshop is to make a room for researchers to communicate the lasted research results on sensitive data sharing. We encourage the achievements on blockchain but are not limited to it.
Keywords : Sensitive Data Sharing, Privacy Preserving, Block-chain
Chair:
Prof. Xuanxia Yao , School of Computer and Communication Engineering, University of Science and Technology Beijing, China

Xuanxia Yao received the M.S. and Ph. D. degrees from University of Science and Technology Beijing(USTB), Beijing, China, in 2002 and 2009 respectively. She is now a professor with the School of Computer and Communications Engineering, USTB. Her current research interests include Blockchain, security and privacy issues in the Internet of Things, industrial control system, and cloud computing. She has participated in multiple National Natural Science Foundations and National Key Projects and hosted several enterprise projects related to security and privacy preserving. Based on these projects, she has published more than 50 papers in IEEE INTERNET OF THINGS JOURNAL, IEEE Trans on Industrial Informatics, Journal of Network and Computer Applications, and other journals and conferences.
---------------------------------------------------------------------------------------------------------------------------------------------------
Workshop 4 : Privacy protection and data sharing based on Blockchain
Title 1 :Privacy protection, data sharing, cryptography
Summary:
Data sharing and security are important especially to the informatization construction of the hospitable. Data security including physical security and Manage and application security.
Hospitals are gradually adopting HER methods to record patients’ medical information, the privacy of medical data, and the differentiation of HER standards hinder the sharing of medical data between patients and hospitals. Privacy protection data-sharing model can be constructed based on consortium Blockchain.
Keywords : Privacy, Big Data, Security, Blockchain
Chair:
Prof. Guangfu Wu, with the School of Information Engineering, Jiangxi University of Science and Technology, China

Guangfu Wu was born in Yushan, Jiangxi Province, China, in 1977. He received the B.S. degree in mathematics education from Wuyi University,Guangdong, in 2000, the M.S. degree from the School of Mathematical Sciences, Xiamen University, Xiamen, in 2008, and the Ph. D. degree from the School of Information Science and Engineering, Xiamen University, in 2012. Since 2016, he has been an Associate Professor with the School of Information Engineering, Jiangxi University of Science and Technology. He is the author of more than ten articles, and more than ten inventions. Dr. Wu became a member (M) of the Chinese Association for Cryptologic Research (CACR) in 2014. His research interests include coding theory and cryptography, blockchain, and artificial intelligence.
---------------------------------------------------------------------------------------------------------------------------------------------------
Workshop 5 : Energy and Power Blockchain Technology and Application
Title 1 : Energy and Power Blockchain Technology and Application
Summary:
With the deepening of the energy revolution, the energy and power industry is facing a series of challenges such as multi-agent coordination, open data sharing, and environmental fairness and justice. Blockchain technology has extremely high value in promoting the transformation and development of the energy and power industry.
We hope to conduct in-depth research on the blockchain industry from the perspective of blockchain technology development and scenario applications, for producing high-quality achievements, exploring development trends and providing reference value for the development of the industry. Among them, the development of blockchain technology mainly focuses on key blockchain technologies such as autonomous controllability, data collaboration, compliance supervision, privacy protection, and security. The scenario applications mainly focus on“dual-carbon” goal, new energy cloud, power trading, clean energy consumption, demand-side response, virtual power plant, integrated energy, cross-border energy trade, shared energy storage, energy big data center, financial technology, high-quality services, integrated energy, materials procurement, smart finance, smart law, data sharing, safe production and other scenarios construction.
Keywords:Energy, Electric Power, Blockchain, Finance, Supply Chain, Data Sharing, Double-Carbon
Chair:
Prof. Dong Wang, the deputy director of the Network and Information Center of State Grid Electronic Commerce Co., Ltd., the director of the Blockchain Technology Laboratory of State Grid Corporation of China, and the general manager of State Grid Blockchain Technology (Beijing) Co., Ltd.

Dong Wang, born in May 1985, is a master, senior engineer, member of the National Blockchain and Distributed Accounting Technology Standardization Technical Committee, member of the State Grid Corporation of China Technical Standards Professional Working Group, member of the Blockchain Special Committee of the China Institute of Communications, Deputy Secretary-General of the Central Enterprise Blockchain Cooperation Innovation Platform, Chairman of the IEEE PES Power Information and Communication Blockchain Technology Subcommittee, and Expert of the Beijing Blockchain Special Class Smart City Group.

Dr. Qinglei Guo works at Blockchain Technology Beijing Co., Ltd. of State Grid Corporation of China and his research areas include energy blockchain and power system automation. Besides, he presided over longitudinal and horizontal technology projects. Moreover, he published over 10 high-quality papers in blockchain and power system.
---------------------------------------------------------------------------------------------------------------------------------------------------
Workshop 6 : Security, Privacy, Attacks, and Forensics
Title 1 :Blockchain Data Security
Summary:
In the era of big data, blockchain technology is decentralized and difficult to change, which makes it very popular in the financial field and digital copyright field. With the popularity of blockchain technology, more and more people begin to discuss data security issues related to blockchain. Blockchain data security is related to information dissemination and privacy security, so it has become one of the hotspots of blockchain technology research.
The purpose of this workshop is to show the latest research results in the field of blockchain data security and to explore how to protect blockchain data security more effectively. We encourage prospective authors to submit related distinguished research papers on the subject of both: theoretical approaches and practical case reviews. Please name the title of the submission email with “paper title_workshop title”.
Keywords: Blockchain, Security Big Data, Sharing
Chair:
Assoc. Prof. Zhen Guo, School of Computer Science and Cyberspace Security, Hainan University, China

Zhen Guo received a Ph. D. degree in Cryptography from Xidian University. She worked as an associate professor at Hainan University. Her research interests include Big Data Security, Blockchain, Privacy protection, Internet of Things Security. She participated in the National Natural Science Foundation, Natural Science Foundation of Hainan Province, etc.
---------------------------------------------------------------------------------------------------------------------------------------------------
Workshop 7: Blockchain theory technology and application challenges" professional seminar
Title 1 :Blockchain theory technology and application challenges
Summary:
"Blockchain theory technology and application challenges" professional seminar. The seminar is open to colleagues in academia and industry, mainly from the perspective of mathematical theory, cutting-edge technology and application challenge to discuss blockchain theory and technology and application challenges. Teachers, graduate students, and practitioners who are interested in the theoretical basis and application scenarios of blockchain are welcome to participate in high-speed consensus, cross-chain mechanism design, data governance, blockchain economic game analysis, multi-party computing, and privacy protection, blockchain finance Services, financial technology, blockchain supply chain management, blockchain-driven service computing and other related topics, submit papers, and roundtable topics.
Keywords: Blockchain, Data Governance and Transaction, Cloud-side-to-end Computing, Mobile Group Intelligence Perception, User Recruitment
Chair:
Prof. Weijin Jiang, School of Computer Science and Information Engineering, Hunan Technology and Business University, China

Weijin Jiang is a second-level professor at the School of Computer Science and Information Engineering, Hunan Technology and Business University. He received a doctorate. He received his Ph. D. from the Wuhan University of Technology in 2010. His research interests include blockchain technology and applications, mobile edge computing, mobile group intelligence perception, social computing, data security, and privacy. He has published more than 150 papers in related journals and conferences including SSI, CMC, CJE, CHINA COMMUNICATIONS, IASC, ADMA, ICDM, etc. He has served as a TPC member or chairman of SMMA'18, ICIS'21, WISA'21, etc. He is also a reviewer for several authoritative journals such as JCST, CJE, IEEE/CAA Journal of Automatica Sinica (JAS), CJC, JOS, etc.
---------------------------------------------------------------------------------------------------------------------------------------------------
Workshop 8: Blockchain and Digital Economy
Title 1 :Blockchain Model and Its Theory in Cross-border Data Flows
Summary:
Cross-border data flows are a key factor to drive the development of the digital economy. currently, blockchain technology provides an opportunity to extend the theoretical research and enrich methods on cross-border data flow. Distributed ledger technologies and blockchains stem from an ideological open-source movement and facilitate the sharing and exchange of data via a complementary technical layer on top of the internet. However, despite these opportunities hopefully changing our lives, there still exit challenges addressed including technical issues such as scalability, security and interoperability. Therefore, through the research on data sovereignty, peer management, privacy protection, cross-domain authentication and efficient supervision in cross-border data flow, it will enrich the existing theories and methods of cross-border data flow, and significantly promote secure data flow and cooperative global data supervision.
This workshop aims to bring together the research accomplishments provided by researchers from academia and the industry. The other goal is to show the latest blockchain research results in the new digital economy, such as cross-border paperless trade, cross-border e-government, cross-border e-commerce, cross-border payment or settle and so on. We encourage prospective authors to submit related distinguished research papers on the subject: theoretical approaches and models in data flow; blockchain and digital economy. Please name the title of the submission email with “paper title_workshop title”.
Keywords: Blockchain, Digital Economy, Cross-border Data Flow, Privacy-preserving Technology, Data Sharing and Interchange, Digital Governance, Heterogeneous Identity Authentication
Chair 1:
Prof. Yimin Yu, Information Management Center,University of Finance and Economics of Yunnan, China

Yimin Yu is the director of the Information Management Center of Yunnan University of Finance and Economics(YNUFE). He received his Ph. D. from University of Electronic Science and Technology of China in 2010. His research interests include blockchain, e-government, e-commerce, information security. He has published more than 20 papers in referred journals and conferences. He published 2 academic monographs. Moreover, He has 10 national patents and 18 software copyrights.
Chair 2:
Dr. Zhiming Song, University of Finance and Economics of Yunnan, China

Zhiming Song is an engineer at University of Finance and Economics of Yunnan (YNUFE). Before joining YNUFE, he had been working at Chinese Academy of Sciences. He received his Ph. D. from University of Chinese Academy of Sciences in 2020. His research interests include blockchain, cryptography, information security. Moreover, he presided over a youth fund project of national natural science foundation of China and published some corresponding papers in referred international journals and conferences.
---------------------------------------------------------------------------------------------------------------------------------------------------
Workshop 9 : Blockchain Technology,Data Sharing & Privacy,AI Security
Title 1 :Blockchain Technology,Data Sharing & Privacy,AI Security
Summary:
Blockchain is currently considered the next big wave after the Internet. Based on blockchain technology, we explore edge computing, copyright protection, data sharing, artificial intelligence security and other information security practices.
This workshop aims to bring together the latest research accomplishments in the field of Blockchain, Data Sharing, Privacy and AI Security. And we encourage the prospective authors to submit their distinguished research papers on the subjects. Please name the title of the submission email with “paper title_workshop title”.
Keywords: Blockchain, Data Sharing, Privacy, AI Security
Chair:
Prof. Sheng Hong, School of Cyber Science and Technology, Beihang University, China

Sheng Hong is an associate professor and doctoral supervisor in the School of Cyber Science and Technology at the Beihang University (BUAA). He engaged in network and information security, complex system security research, completed several related scientific research projects in the field of network security, Presided over the national key basic research and development plan projects, national key research and development project, industrial Internet innovation and development project, technical basic project, pre-research project, National Natural Science Foundation of China There are more than 10 national, provincial and ministerial-level topics, and more than 10 horizontal topics in key industries such as industrial Internet, intelligent manufacturing, State Grid, and avionics systems. He is the editorial board member of several international journals and conferences, including "Information Network Security", "Information Technology and Network Security" and "Aeronautical Engineering Progress". In the national key research and development plan, he established a multi-level industrial network security protection model, through dangerous targets, key targets, cloud detection and other protection strategies and protective measures to ensure the network from the aspects of environmental credibility, situational knowledge, and controllable operation. Security; in the industrial Internet innovation and development project, he proposed a system security enhancement protection technology for the industrial Internet; in the National Natural Science Foundation, he broke through the critical phase change mechanism of fault propagation by focusing on the coupling, chaos and spreading characteristics of dynamic network faults The bottleneck of the maintenance control strategy provides a new solution for the prevention of complex dynamic network fault propagation and fault-tolerant control. In the open topic of the Shanghai industrial control system safety innovation functional platform, he aimed at the industrial Internet network suffered from virus attacks and equipment paralysis. The actual problems of the research network virus transmission mechanism and protection strategies. He has published more than 50 papers, including 26 papers indexed by SCI, one co-authored academic book, and 14 national invention patents.
---------------------------------------------------------------------------------------------------------------------------------------------------
Workshop 10 : Protocols and Algorithms Based on Blockchain
Title 1 :Consensus Algorithm, Architecture, Performance Analysis on Blockchain
Summary:
Consensus algorithm is the core technology in blockchain, which describes how peers in blockchain network achieve data consistency and directly determines the operating efficiency of the entire blockchain system. At the same time, the architecture is also the key to the blockchain application. However, the existing consensus algorithm and architecture are different to meet the performance and security requirements of blockchain applications. So, studying the new consensus algorithm and architecture have important significance for the actual application of blockchain.
Keywords:Consensus Algorithm, Architecture, Performance Analysis
Chair:
Assoc. Prof. Xiaohong Deng, College of Applied Science, Jiangxi University of Science and Technology University, China

Xiaohong Deng received a Ph. D. degree in Computer Application Technology from Central South University. He worked as an associate professor at the College of Applied Science, Jiangxi University of Science and Technology University. His research interests include Blockchain and Information Security.
He participated in the National Natural Science Foundation, Natural Science Fund Project in Jiangxi province, etc. Based on these projects, he published more than 50 papers in important academic publications at home and abroad. At present, he is a peer reviewer of some academic journals on Blockchain and its application.
---------------------------------------------------------------------------------------------------------------------------------------------------
Workshop 11 : Blockchain Technologies that support Federal Learning
Title 1 :Learning, Exchange, Contract and Modelling
Summary:
Federal learning (federated learning) is a new artificial intelligence basic technology to carry out high efficiency machine learning between multi-participants or multi-computing nodes under the premise of ensuring information security, protecting terminal data and personal data privacy, and ensuring legal compliance. Unlike distributed machine learning, federal learning requires a decentralized distribution system to ensure user privacy and security. Effective machine learning is carried out under the premise of ensuring data security, exchange and training efficiency. As a decentralized, data-encrypted, non-tampering distributed shared database, blockchain can provide data confidentiality for federated learning data exchange to guarantee user privacy and ensure data security between participants. It can also ensure that the value-driven incentive mechanism of multi-participants providing data for model training increase the enthusiasm of participants to provide data and update network model parameters. Both federal learning and blockchain need multi-party participation, and the trusted network of multi-party cooperation is realized through technical consensus, which has good complementarity. From the perspective of application goals, federal learning aims to create value, while blockchain aims to represent and transfer value.
Keywords:Federated Learning, Data Privacy, Big Data Exchange Security, Artificial intelligence, Machine Learning
Chair:
Prof. Jian Zhang ,Cyber Security, Central South University, China

Jian Zhang received a Ph. D. degree in information science and engineering from Central South University and a Ph. D. degree in Economics and Management from Tsinghua University. He worked as a professor at the School of Computer Science, Central South University. His research interests include cyber security, cognitive communication, target detection and recognization.
He presided over the National Natural Science Foundation, National Key Research and Development Project, Chinese National Programs for High Technology Research and Development, etc. Based on these projects, he published more than 30 papers in IEEE Trans, Science China and other journals/conferences, Application and authorization of 17 national patents.
---------------------------------------------------------------------------------------------------------------------------------------------------
Workshop 12 : Data privacy security and Blockchain
Title 1 : Data Privacy, Information Security and Blockchain
Keywords : Blockchain, Date Privacy, Information Security, Differential Privacy
Summary:
In recent years, data privacy security has gradually become a research hotspot and is more widely used in banks, exchanges and other financial and insurance industries. Among them, relevant algorithms, protocols, smart contracts and other technologies to enhance data privacy and security centered on blockchain technology are receiving increasing attention from peers.
The main purpose of this symposium is to present and share relevant research results on data privacy protection, data security and blockchain technology from relevant researchers in academia and industry. We encourage potential authors to submit relevant and outstanding research papers on topics including theoretical approaches and practical case reviews. Please use the name "paper title_Date Security and Blockchain" in the submission email.
Chair:
Researcher Feng Liu, Institute of Artificial Intelligence and Change Management, Shanghai University of International Business and
Economics(SUIBE), China

Researcher Feng Liu is a researcher in Institute of Artificial Intelligence and Change Management, data security and privacy. He has published more than 20 papers in referred journals and conferences, including 20 blockchain-related papers, among which, many high-level papers are included in CCF-A, CCF-B and above searches, applied for more than 20 blockchain-related invention patents. He is also on the reviewer board of several journals such as ICMR, Computing Science etc.
---------------------------------------------------------------------------------------------------------------------------------------------------
Workshop 13 : Blockchain in the Internet of Things (IoT)
Title 1 : IoT Security and Trust with Blockchain
Summary:
Current Internet of Things (IoT) are increasingly becoming pervasive, complex, and ever-evolving due to factors like enormous growth in the number of connected devices and users, continuous appearance of network applications, increasing amount of data transferred, and diversity of data structure and usage. Understanding data traffic and pattens in such networks is a difficult yet vital task for availability and validity of the network, but recently also for its security. IoT Security can, for example, enable the detection of the malicious software and attacks to connected vehicles or help to understand the patterns of various network threats including those that exploit users’ behaviour and other user’s sensitive information. On the other hand, Trust with Blockchain can help to build a new but reliable infrastructure for IoT applications and devices, with blockchain technology, one can have more robust trust measures for connected devices or users.
The workshop aims to bring together the research accomplishments provided by researchers from academia and the industry. The other goal is to show the latest research results in the field of IoT cybersecurity and blockchain technology. We encourage prospective authors to submit related distinguished research papers on the subject of both: IoT Security and Trust with Blockchain.
Please name the title of the submission with “paper title_IoT Security and Trust with Blockchain” and email tohaoxi@cuit .edu.cnor icbctis@126.com.
Keywords : Cyber Security, Internet of Things, Trust, Big Data, Artificial intelligence, Blockchain
Chair:
Assoc. Prof. Haoxi Zhang, Chengdu University of Information Technology, China

Haoxi Zhang is an Associate Professor from the Chengdu University of Information Technology, Chengdu, China. He received his Ph. D. degree in Knowledge Engineering from the University of Newcastle in 2013, and the master’s degree in Software Engineering from the University of Electronic Science and Technology of China. His research interests focus on experience-oriented intelligent systems, knowledge engineering, cyber security, Internet of Things, and Deep Learning. He has published more than 30 reputed journal and conference papers, including IEEE Internet of Things Journal, KBS, Neurocomputing, Future Generation Computer Systems, etc.
---------------------------------------------------------------------------------------------------------------------------------------------------
Workshop 14 : Security, Privacy, Attacks, and Forensics
Title 1 :Internet Measurement and Data Security
Summary:
The ultimate purpose of network research is to establish efficient, stable, safe, interoperable, predictable and controllable network, and network measurement is the most effective means to obtain first-hand network behavior indicators and parameters. It is an effective way to understand network behavior to build a network behavior model on the basis of network measurement and test, and to build a bridge from theory to practice with simulation method. Besides, data security refers to the ability to ensure the effective protection and legal use of data by taking necessary measures, and keep the data in a safe state continuously.
The objective of this workshop is to collect and analyze the performance status of network protocol operation, and detect the problems of affecting network service quality such as DoS, data tampering, data leakage; also focuses on data security, including privacy, identity authentication and data encryption transmission. Please name the title of the submission email with “paper title_workshop title”.
Keywords : Internet Measurement, Privacy Protection, Identity Authentication, Encrypted Transmission
Chair:
Prof. Zhaoxin Zhang , Faculty of Computing, Harbin Institute of Technology, China

Zhaoxin Zhang received Ph. D. degree from School of Computer Science and Technology of Harbin Institute of Technology, Harbin, China in 2007. Currently, he works as a professor in Faculty of Computing, Harbin Institute of Technology, Harbin, China. Besides, he is the research director of the Network and Information Security Technology Research Center at Weihai of Harbin Institute of Technology. His research interests include Network and Information Security, Network Simulation and Domain Name System Security.
---------------------------------------------------------------------------------------------------------------------------------------------------
Workshop 15 : Intrusion Detection and Cloud Security
Title 1 : Intrusion Detection and Cloud Security
Summary:
Malicious attacks have become more sophisticated in today’s world. Furthermore, security threat such as APT attack which exploits vulnerabilities to perform persistent and aggressive attack and zero-day attacks aiming at internet users shows an increase in risk. The security threat not only exists in local host and traditional network, but also exists in the cloud. It is increasingly critical and a big challenge to detect intrusion behavior.
This workshop aims to bring together academic researchers, industrial practitioners, and individuals working on intrusion detection and cloud security to share their new ideas, latest findings, and state-of-the-art results.
Keywords : Intrusion Detection, Cloud Security, Anomaly Detection
Chair:
Prof. Yulai Xie , School of Cyber Science and Engineering, Huazhong University of Science and Technology, China

Yulai Xie received the BE and Ph. D. degrees in computer science from the Huazhong University of Science and Technology(HUST),Wuhan, China, in 2007 and 2013, respectively. He is currently an associate professor with the School of Cyber Science and Engineering, HUST, China. His current research interests include provenance-aware data storage and security, intrusion detection, digital forensic, social computing, distributed file systems, cloud storage and cloud security.
He currently serves as the web editor of IEEE Letters of the Computer Society. He is also an editoral board member of GSL Journal of Forensic Research and International Journal of Next-Generation Networks. He has been selected in the WuHan Yellow Crane Talents Program. He has been also selected in the CCF-venusterch program and CCF-NSFOCUS program. He is a member of ACM and IEEE, and a senior member of China Computer Federation (CCF).
---------------------------------------------------------------------------------------------------------------------------------------------------
To be updated.