Workshops
Workshop 1:Security, Privacy, Attacks, and Forensics

Title 1: Location Privacy-Preserving Spatial Crowdsourcing on Blockchains

Summary:
Block chain is a revolutionary computer bottom technology. As a brand-new information storage, dissemination and management mechanism, it realizes reliable transfer of data and value and is a master of cryptography, distributed systems and game theory. At present, block chain technology is in the process of accelerating evolution and development, from its initial application in digital cash to its present extension to digital finance, Internet of Things, intelligent manufacturing, supply chain management, digital asset transactions and other fields. 
The aim of this workshop is to bring together the research accomplishments provided by researchers from academia and the industry. The other goal is to show the latest research results in the field of Blockchains and Privacy-Preserving. We encourage prospective authors to submit related distinguished research papers on the subject of both: theoretical approaches and practical case reviews. Please name the title of the submission email with “paper title_workshop title”.

Keywords:Location Privacy, spatial Crowdsourcing, Blockchains, Decentralized Privacy Protection

Chair:
Prof. Junwei Zhang , Cyber Engineering, Xidian University, China
 

Junwei Zhang received a Ph. D in Computer Science and Technology from Xidian University. He worked as a professor at the School of Cyber Engineering, Xidian University. His research interests include Cryptography and Information Security.
He participated in the National Natural Science Foundation, National Key Projects, National Key Research and Development Project, Chinese National Programs for High Technology Research and Development, etc. Based on these projects, he published more than 50 papers in IEEE Trans, Science China and other journals/conferences.
---------------------------------------------------------------------------------------------------------------------------------------------------


Workshop 2:Systems Security

Title 1:Systems Security

Summary:
The workshop aims to bring together researchers, practitioners, system administrators, system programmers, and others interested in the latest advances in the security of computer systems and networks. The objective of the workshop is to discuss novel, practical, systems-oriented work. 

Keywords:Web Security , System Security Aspects of Privacy , Network Security , Operating System Security

Chair:
Prof. Hong Huang  Beijing University of science and technology, China


Hong Huang received his Ph. D in Information Security from Beijing University of science and technology University. He worked as a professor at the School of Computer Science and Engineering, Sichuan University of science and technology. His research interests include System Security and Security Big Data.
He participated in the National Natural Science Foundation, National Key Research and Development Project, Key Research and Development Projects of Sichuan Province, etc. Based on these projects, he published many academic papers.
---------------------------------------------------------------------------------------------------------------------------------------------------


Workshop 3:Network Intrusion, Detection and Prevention

Title 1: Fieldbus Data Acquisition, Automatic Analysis and Security Detection for Industrial Control System

Summary:
Digital control system (DCS) is the central nervous system of modern industrial control system which integrates computer, control, communication and other disciplines. Fieldbus is an important part of DCS. At present, the popular fieldbus protocols include CAN, 485, Hart, LonWorks, MODBUS, etc. which are widely distributed in the industrial control system. The research on the traffic characteristics of fieldbus is one of the important foundations to study the running state and performance of industrial network. Due to the increasing intelligence and concealment of attacks, it is difficult to deal with unknown attacks across the physical layer only from the perspective of communication network. In recent years, there have been more and more network physical attacks against digital control systems. Anomaly detection of industrial control systems is a greatly effective safety protection technology and has been extensively studied worldwide. The security analysis and deep protocol analysis of the industrial control protocol which lacks the security mechanism become the focus. The security analysis theory of the industrial control process has also become the research hotspot of anomaly detection and protection. 
This workshop aims to bring together the research accomplishments provided by researchers from academia and the industry. The other goal is to show the latest research results in the field of the data acquisition technology of fieldbus and the identification technology of network traffic. We encourage prospective authors to submit related distinguished research papers on the subject of both: theoretical approaches and practical case reviews. Please name the title of the submission email with “paper title_workshop title”.

Keywords:Digital Control System, Fieldbus, Intrusion Detection System, SCADA, Network Security

Chair:
Prof. Guogen Wan , Chengdu University of information engineering, China


Guogen Wan received a doctor's degree in engineering from the school of computer science of UESTC in 2005. From 2008 to 2013, he worked at the Institute of network behavior of Tsinghua University. At present, he is a science and technology project evaluation expert of Sichuan Province, a science and technology project evaluation expert of Chengdu City, a senior member of China Electronics Society, and a member of electronic forensics expert committee of China Electronics Society. He has published more than 40 papers, presided over and participated in more than 4 national projects, 5 military projects, and 3 provincial science and technology projects. He won the second prize of the military science and technology progress award, the second prize of Sichuan Science and technology progress award, and the third prize(twice). Main research directions: network and information security, computer application technology, Internet of things technology, mobile Internet applications
---------------------------------------------------------------------------------------------------------------------------------------------------


Workshop 4 : Security Protocol & Safety certification & Quantum Information Processing

Title 1 : Security Protocol, Signature Scheme & Message Authentication

Summary :
Security protocol is a significant part of network security. It needs to authenticate between entities through authentication protocol, distribute keys or other secrets between entities safely, and confirm the non-repudiation of messages sent and received, etc. In recent years, authentication protocols are increasingly used to protect all kinds of transactions on the network and to protect access to computer systems. However, researches show that designing and analyzing a correct authentication protocol is difficult. Many of the schemes are known that it exist some security flaws based on various reasons. It has inspired many interesting works in recent years, e.g. the correct design guidelines of authentication protocol, effectively formalized tools for analyzing authentication protocol, the variety of attacks for authentication protocol type, etc.

Keywords : Security Protocol

Chair:
Prof. Xiaoping Lou , College of Information Science and Engineering, Hunan Normal University, China 


Xiaoping Lou was born in Hunan Province, China in 1982. She received the M.S. and Ph. D. degree from the College of Information Science and Engineering, Central South University, Changsha, China, in 2009 and 2014. She is now a professor in the College of Information Science and Engineering, Hunan Normal University, Changsha, China. Her current research interests include information security, classical cryptography, quantum cryptography, quantum information processing and quantum machine learning.
---------------------------------------------------------------------------------------------------------------------------------------------------


Workshop 5 :  Network Security 

Title 1:Network Security

Summary :
Network security means that the hardware, software, and data in the network system are protected from being damaged, changed, or leaked due to accidental or malicious reasons. The system operates continuously, reliably, and normally, and the network service is not interrupted. With the rapid development of computer technology, information network has become an important guarantee for social development. There is a lot of sensitive information, even state secrets. Therefore, it is inevitable to attract various man-made attacks from all over the world (such as information leakage, information theft, data tampering, data deletion, computer viruses, etc.). At the same time, network entities have to withstand tests such as floods, fires, earthquakes, electromagnetic radiation, etc.

Keywords : Information Security, Information Network, Network Security

Chair:
Prof. Yanrong Cui  Yangtze University, China


Yanrong Cui is a Professor, Doctor, Master Tutor, who graduated from China University of Geosciences with a bachelor's degree in computer application in 1992 and a doctor's degree in computer software and theory a Wuhan University in 2008. She presided over and participated in more than 20 projects of all levels and types and published more than 30 papers. She is the Editor-in-chief of the 21st-century college planning textbook "Introduction to the Internet of Things", which was published by Tsinghua University Publishing House, and the editor-in-chief of the college computer major planning textbook "Discrete Mathematics", which was published by Tsinghua University Publishing House. In 2009, 2010, and 2011, she won the Excellence Award for Teaching Quality of Yangtze University for three consecutive years and coached students to participate in the National Computer Simulation Competition and won one national first prize, second prize, and two third prizes.
She won second prize and third prize of the 2014 Outstanding Contribution Award for Teaching Work of Yangtze University. She won the first "Ren Dalong Award" of Yangtze University and was a famous teacher at Yangtze University
---------------------------------------------------------------------------------------------------------------------------------------------------


Workshop 6 : Blockchain in Education

Title 1 :Education and development of Blockchain Engineering

Summary :

Keywords :

Chair:
Prof. Weiqing Wan , Jiangxi University of Engineering, China


Prof. Wan, a senior engineer, obtained his master's degree from Nanchang University majoring in computer science and technology. He started his work in July 1995 and joined Jiangxi University of Engineering in September 2006. Since 2011, he has been the chief of the Academic Affairs Office in School of Internet of Things Engineering, and the associate dean of the School of Internet of Things Engineering, the School of Computer and Internet, and the School of Big Data and Computer. At present, Prof. Wan is the dean of the College of Blockchain and a director of the National University League on Artificial Intelligence and Big Data Innovation. He is mainly engaged in Java EE, Android software development and teaching researches of related courses. He has published 4 books, and more than 20 papers in international journals and conferences, including more than 6 papers indexed by Ei and papers on core journals. What’s more, he has obtained 12 software copyrights, 7 scientific research topics, 3 patents, and 14 provincial and above competition awards.
---------------------------------------------------------------------------------------------------------------------------------------------------


Workshop 7 : Security, Privacy, Access Control and Data Sharing

Title 1: Sharing Sensitive Data Securely on Blockchain

Summary:
In the big data era, more and more sensitive data are generated from various applications, such as health data from smart medical care, financial data from online banks, location data from location-based services, and utilities from the smart grid as well. To provide users with personalized and intelligent services or meet the requirements of government regulation and management, these sensitive data are always required to be shared among multiple parties. For preserving users' privacy, sensitive data sharing must be secure. How to share sensitive data especially in an open environment is a challenging topic. As the distributed ledger, the blockchain has attracted many researchers to solve the security and/or privacy preserving problems on it. And it may provide several new solutions to sensitive data sharing. This workshop is to make a room for researchers to communicate the lasted research results on sensitive data sharing. We encourage the achievements on blockchain but are not limited to it.

Keywords : Sensitive Data Sharing, Privacy Preserving, Block-chain

Chair:
Prof. Xuanxia Yao , School of Computer and Communication Engineering, University of Science and Technology Beijing, China


Xuanxia Yao received the M.S. and Ph. D. degrees from University of Science and Technology Beijing(USTB), Beijing, China, in 2002 and 2009 respectively. She is now a professor with the School of Computer and Communications Engineering, USTB. Her current research interests include Blockchain, security and privacy issues in the Internet of Things, industrial control system, and cloud computing. She has participated in multiple National Natural Science Foundations and National Key Projects and hosted several enterprise projects related to security and privacy preserving. Based on these projects, she has published more than 50 papers in IEEE INTERNET OF THINGS JOURNAL, IEEE Trans on Industrial Informatics, Journal of Network and Computer Applications, and other journals and conferences.
---------------------------------------------------------------------------------------------------------------------------------------------------


Workshop 8 : Blockchain and New Economy and New Finance

Title 1 :

Summary:

Keywords : 

Chair:
Prof. Guang Sun , School of Hunan University of Finance and Economics, China


He received his PhD in Computer Science from Hunan University, CHN, in 2012. He is currently a Professor working for the Institute of Big Data at Hunan University of Finance and Economics, Changsha, HUNAN, CHN. He was a visiting scholar at the University of Alabama.
His research interests fall under the umbrella of practical big data and artificial intelligence, sensor networks security, information hiding (with a focus on software watermarking and software birth marking). His research has partially or fully supported by National Natural Science Foundation of China.
---------------------------------------------------------------------------------------------------------------------------------------------------


Workshop 9 : Privacy protection and data sharing based on Blockchain

Title 1 :Privacy protection, data sharing, cryptography

Summary:
Data sharing and security are important especially to the informatization construction of the hospitable. Data security including physical security and Manage and application security.
Hospitals are gradually adopting HER methods to record patients’ medical information, the privacy of medical data, and the differentiation of HER standards hinder the sharing of medical data between patients and hospitals. Privacy protection data-sharing model can be constructed based on consortium Blockchain.

Keywords : Privacy, Big Data, Security, Blockchain

Chair: 
Prof. Guangfu Wu, with the School of Information Engineering, Jiangxi University of Science and Technology, China


Guangfu Wu was born in Yushan, Jiangxi Province, China, in 1977. He received the B.S. degree in mathematics education from Wuyi University,Guangdong, in 2000, the M.S. degree from the School of Mathematical Sciences, Xiamen University, Xiamen, in 2008, and the Ph. D. degree from the School of Information Science and Engineering, Xiamen University, in 2012. Since 2016, he has been an Associate Professor with the School of Information Engineering, Jiangxi University of Science and Technology. He is the author of more than ten articles, and more than ten inventions. Dr. Wu became a member (M) of the Chinese Association for Cryptologic Research (CACR) in 2014. His research interests include coding theory and cryptography, blockchain, and artificial intelligence.
---------------------------------------------------------------------------------------------------------------------------------------------------


Workshop 10 : Blockchain, Big Data and AI 

Title 1 :Blockchain in Crowdsourcing and Crowdsensing

Summary:
Crowdsensing is an approach involving a large, spread-out group of participants using mobile devices with mass distribution, flexible mobility, and instant connectivity for large-scale perception. Crowdsourcing is the practice of obtaining needed services, ideas, or content by soliciting contributions from a large group of people and especially from the online community. Fusing explicit and implicit swarm intelligence to enhance understanding of perceived data. Blockchain in crowdsourcing and crowdsensing enhances the self-organization of swarm intelligence, information security, and traceability of perceived data. It has broad application prospects in energy security, public safety, emergency response, environmental monitoring, disaster relief, and other major national needs. 
This workshop focuses on research on self-organization, data security, and traceability while integrating blockchain and crowdsourcing or crowdsensing. The other goal is to encourage researchers to apply their latest results in the field to specific application scenarios. We encourage prospective authors to submit related distinguished research papers on the subject of both: theoretical approaches and practical case reviews. Please name the title of the submission email with “paper title_workshop title”.

Keywords: Crowdsourcing, Crowdsensing, Swarm Intelligence, Self-organization, Data Security, Traceability

Chair:
Prof. Xin Liu, China University of Petroleum, China


Xin Liu , received a Ph. D. degree in Cyberspace Security from Nankai University, Tianjin, China, in 2012. She is currently an Associate Professor at China University of petroleum. Her research interests include Crowdsensing, Cyberspace Security, Blockchain, Social Computing, Knowledge Discovery, and Data Mining.She participated in the National Natural Science Foundation, National Key Research and Development Project, Natural Science Foundation of Shandong Province, Key Research and Development Project of Shandong Province. Based on these projects.She has published papers on IEEE Transactions on Computational Social Systems, Information Sciences, IEEE Transactions on Cybernetics, Personal and Ubiquitous Computing, ICWS, IWCMC, etc. Her papers have been cited hundreds of times. One paper received the award of outstanding paper on CyberCon 2019.
---------------------------------------------------------------------------------------------------------------------------------------------------


Workshop 11 : Blockchain Application Systems

Title 1 : Blockchain Application in Mobile Computing

Summary:
Due to the wide spread of mobile devices, various mobile computing application systems have arisen, including mobile crowdsensing, spatial crowdsourcing, mobile edge computing, intelligent transportation service, and so on. As a newly-emerging decentralized transaction recording technology, blockchain provides a promising solution for designing trustworthy mobile computing application systems, having attracted much attention recently.
The aim of this workshop is to show and share the latest research results in the field of blockchain application systems provided by researchers from academia and industry. We encourage prospective authors to submit related distinguished research papers on the subject of both: theoretical approaches and practical case reviews. Please name the title of the submission email with “paper title_workshop title”.

Keywords: Blockchain, Mobile Crowdsensing, Spatial Crowdsourcing, Edge Computing, Data Trading

Chair:
Prof. Mingjun Xiao, School of Computer Science and Technology, University of Science and Technology of China, China


Mingjun Xiao is a professor in the School of Computer Science and Technology at the University of Science and Technology of China (USTC). He received his Ph. D. from USTC in 2004. His research interests include mobile crowdsensing, blockchain technology and application, mobile edge computing, auction theory, data security and privacy. He has published more than 100 papers in referred journals and conferences, including TMC, TC, TPDS, TON, TKDE, INFOCOM, ICDE, etc. He served as the TPC member of INFOCOM’21, IJCAI’21, INFOCOM’20, etc. He is also on the reviewer board of several top journals such as TMC, TON, TPDS, TSC, TVT, TCC, etc.
---------------------------------------------------------------------------------------------------------------------------------------------------


Workshop 12 : Cloud Security & Privacy, Post-Quantum Cryptography

Title 1 : Security in Cloud and Post-Quantum Cryptography and their Applications

Summary:
To date cloud-based technology gives birth to the next generation of computing system, and with the assistance of cloud server, many costly computations can be performed with ease, meanwhile, cloud security involved in cloud computing has become a hot issue.In addition, the conventional number-theoretic problems (such as factoring and discrete logarithm problems) are vulnerable to quantum computers. As the old saying goes, not putting all your eggs in one basket, it is urgent to consider some alternative instantiations, post-quantum constructions, for a future post-quantum cryptography(PQC) era, e.g., based on lattice-based cryptosystem which is believed to be one of the most promising candidates for PQC. This workshop aims to bring together the latest research accomplishments in the field of cloud security & privacy and post-quantum cryptography. And we encourage the prospective authors to submit their distinguished research papers on the subjects. Please name the title of the submission email with “paper title_workshop title”.

Keywords:Cloud, Post-quantum Cryptography, Security, Privacy

Chair:
Dr. Yanhua Zhang, College of Computer and Communication Engineering, Zhengzhou University of Light Industry, China


Yanhua Zhang received his Ph. D. degree in Cryptography from Xidian University, Xi’an, China in 2017. He was a joint Ph. D. student awarded the scholarship from CSC at Nanyang Technological University (NTU), Singapore, from July 2016 to August 2017. He is now a lecturer at Zhengzhou University of Light Industry (ZZULI), Zhengzhou. His current research interests include Lattice-Based Cryptography, Attribute-Based Cryptography, Cloud Security & Data Privacy. He has participated in multiple National Natural Science Foundations and now hosts the Key Foundation of Science and Technique Development of Henan Province and Guangxi Key Laboratory of Cryptography and Information Security. Up to now, he has published more than 20 papers as the first author or corresponding author in Journal of Information Security and Applications, Frontiers of Information Technology and Electronic Engineering, Chinese Journal of Computers, Journal of Computer Research and Development,Security and Communication Networks, ACNS, CANS, ISC, WISA, CSS, ICA3PP, China Crypt, etc. One paper won the award of outstanding paper at FCS 2019.
---------------------------------------------------------------------------------------------------------------------------------------------------


Workshop 13:Secret Sharing and Application


Title 1:Secret Sharing, Multiparty Secure Computation and Network Security  


Summary:

Secret Sharing and multiparty secure computing are cryptographic primitives and play important role in information secure storage, privacy preserve, group-oriented protocols, threshold cryptography etc. They have been widely used in network security, such as key management in IoT, e-voting, e-auction and so on. The workshop aims to bring together the latest accomplishments from academia and the industry. We encourage authors to submit novel research results in both theory and application of secret sharing, multiparty secure computation and network security. 


Keywords:Secret Sharing, Key Management, Network Security, Multiparty Secure Computation


Chair:

Prof. Fuyou Miao, School of Computer Science and Technology, University of Science and Technology of China, China



Fuyou Miao, Phd, Associate Prof. of the School of Computer Science and Technology, University of Science and Technology of China (USTC). He received his Ph.d degree of computer science in USTC, 2005. His research interests include information security, secret sharing, security in IoT and coding theory.
---------------------------------------------------------------------------------------------------------------------------------------------------


Workshop 14 : Energy and Power Blockchain Technology and Application

Title 1 : Energy and Power Blockchain Technology and Application

Summary:
With the deepening of the energy revolution, the energy and power industry is facing a series of challenges such as multi-agent coordination, open data sharing, and environmental fairness and justice. Blockchain technology has extremely high value in promoting the transformation and development of the energy and power industry.
We hope to conduct in-depth research on the blockchain industry from the perspective of blockchain technology development and scenario applications, for producing high-quality achievements, exploring development trends and providing reference value for the development of the industry. Among them, the development of blockchain technology mainly focuses on key blockchain technologies such as autonomous controllability, data collaboration, compliance supervision, privacy protection, and security. The scenario applications mainly focus on“dual-carbon” goal, new energy cloud, power trading, clean energy consumption, demand-side response, virtual power plant, integrated energy, cross-border energy trade, shared energy storage, energy big data center, financial technology, high-quality services, integrated energy, materials procurement, smart finance, smart law, data sharing, safe production and other scenarios construction.

Keywords:Energy,  Electric Power, Blockchain, Finance, Supply Chain, Data Sharing, Double-Carbon

Chair:
Prof. Dong Wang, the deputy director of the Network and Information Center of State Grid Electronic Commerce Co., Ltd., the director of the Blockchain Technology Laboratory of State Grid Corporation of China, and the general manager of State Grid Blockchain Technology (Beijing) Co., Ltd.


Dong Wang, born in May 1985, is a master, senior engineer, member of the National Blockchain and Distributed Accounting Technology Standardization Technical Committee, member of the State Grid Corporation of China Technical Standards Professional Working Group, member of the Blockchain Special Committee of the China Institute of Communications, Deputy Secretary-General of the Central Enterprise Blockchain Cooperation Innovation Platform, Chairman of the IEEE PES Power Information and Communication Blockchain Technology Subcommittee, and Expert of the Beijing Blockchain Special Class Smart City Group.
---------------------------------------------------------------------------------------------------------------------------------------------------


Workshop 15 : Protocols and Algorithms Based on Blockchain

Title 1 :Data access control scheme based on blockchain

Summary:
To solve the problems of data tampering,leakage and data ownership disputes in the process of data sharing between enterprises and departments. Combined with the characteristics of the blockchain traceability and hard to tamper with,this paper proposes a trusted data access control scheme based on blockchain, which deploys the access control strategy on the blockchain in the form of a smart contract. The access control strategy was realized by executing the smart contract deployed on the blockchain to ensure the decentralization, transparency, and traceability of the access control process. At the same time, this paper combines blockchain technology with distributed storage, and only stores the hash value of the data and the hash value of the ciphertext location, and other information on the blockchain, which solves the storage bottleneck of a blockchain system. Finally, experiments show that the proposed scheme can effectively protect the security and privacy of data owners, and realize the secure sharing of data.

Keywords: Blockchain,  Data Access Control,  Smart Contract,  Inter-Planetary File System(IPFS)

Chair:
Prof. Hui Li, Department of Communication Engineering, Shenyang University of Technology, China


Hui Li received her Ph. D. degree in instrument science and technology from Shenyang University of Technology in 2015. She is an associate professor in the Department of Communication Engineering, Shenyang University of Technology. Her research interests include wireless sensor network and security, Blockchain,steganography and steganalysis, and big data mining. She has published four books and over 30 research papers on wireless sensor network, communications and security.
---------------------------------------------------------------------------------------------------------------------------------------------------


Workshop 16 : Security, Privacy, Attacks, and Forensics

Title 1 :Blockchain Data Security

Summary:
In the era of big data, blockchain technology is decentralized and difficult to change, which makes it very popular in the financial field and digital copyright field. With the popularity of blockchain technology, more and more people begin to discuss data security issues related to blockchain. Blockchain data security is related to information dissemination and privacy security, so it has become one of the hotspots of blockchain technology research.
The purpose of this workshop is to show the latest research results in the field of blockchain data security and to explore how to protect blockchain data security more effectively. We encourage prospective authors to submit related distinguished research papers on the subject of both: theoretical approaches and practical case reviews. Please name the title of the submission email with “paper title_workshop title”.

Keywords: Blockchain, Security Big Data, Sharing

Chair:
Assoc. Prof.  Zhen Guo, School of Computer Science and Cyberspace Security, Hainan University, China


Zhen Guo received a Ph. D. degree in Cryptography from Xidian University. She worked as an associate professor at Hainan University. Her research interests include Big Data Security, Blockchain, Privacy protection, Internet of Things Security. She participated in the National Natural Science Foundation, Natural Science Foundation of Hainan Province, etc.
---------------------------------------------------------------------------------------------------------------------------------------------------


Workshop 17: AI Security

Title 1 :AI Security: Adversarial Examples and Deep Fake

Summary:
The continuous breakthrough of Deep Learning in recent years promotes the rapid development of Artificial Intelligence (AI) technology, which has been widely applied and achieved tremendous performance on image classification, speech recognition, and Natural Language Processing (NLP), etc. However, on one hand, the existing AI models are still not robust enough. It has been proved that AI-based approaches are vulnerable against Adversarial Examples, which bring potential security risks when deployed in safety-critical scenarios. On the other hand, the abuse of AI techniques also raises various threats, especially the recent advent of Deep  Fake, utilizing the advances of Generative Adversarial Networks (GAN) to synthesize and to manipulate multimedia (e.g., images, videos, voices), leading to the prevalence of misinformation and more negative effects to the stability of society. Therefore more far-reaching researches still need to be set up.

This workshop aims to bring together related researches and achievements from academia and industry in the field of AI Security. On one hand, we focus on technology in the field of Adversarial Examples from aspects of both attack and defense, to explain the limitation of current AI models and discuss constructive improving strategies to enhance the robustness. On the other hand, we focus on researches about both generation and defense approaches of Deep Fake, to promote the positive application of AI forgery technology and mitigate the threats it poses. We encourage prospective authors to submit eminent research papers from both theoretical and practical perspectives. Please name the title of the submission email with “paper title_workshop title”.

Keywords:Deep Learning, Artificial Intelligence Security, Adversarial Examples, Deep Fake

Chair:
Assoc. Prof. Run Wang, School of Cyber Science and Engineering, Wuhan University, China


Run Wang received his Ph. D. in Information Security from Wuhan University in 2018 and then worked as a postdoctoral research fellow (2019-2021) in the School of Computer Science and Engineering at Nanyang Technological University, Singapore. His research interests include AI Security, Multimedia Security, and Software and Systems Security, and he has published papers in TMC, IJCAI, ACM MM, and other top-tier journals and conferences.
---------------------------------------------------------------------------------------------------------------------------------------------------


Workshop 18: Blockchain theory technology and application challenges" professional seminar

Title 1 :Blockchain theory technology and application challenges

Summary:
"Blockchain theory technology and application challenges" professional seminar. The seminar is open to colleagues in academia and industry, mainly from the perspective of mathematical theory, cutting-edge technology and application challenge to discuss blockchain theory and technology and application challenges. Teachers, graduate students, and practitioners who are interested in the theoretical basis and application scenarios of blockchain are welcome to participate in high-speed consensus, cross-chain mechanism design, data governance, blockchain economic game analysis, multi-party computing, and privacy protection, blockchain finance Services, financial technology, blockchain supply chain management, blockchain-driven service computing and other related topics, submit papers, and roundtable topics.

Keywords: Blockchain, Data Governance and Transaction, Cloud-side-to-end Computing, Mobile Group Intelligence Perception, User Recruitment

Chair:
Prof. Weijin Jiang, School of Computer Science and Information Engineering, Hunan Technology and Business University, China


Weijin Jiang is a second-level professor at the School of Computer Science and Information Engineering, Hunan Technology and Business University. He received a doctorate. He received his Ph. D. from the Wuhan University of Technology in 2010. His research interests include blockchain technology and applications, mobile edge computing, mobile group intelligence perception, social computing, data security, and privacy. He has published more than 150 papers in related journals and conferences including SSI, CMC, CJE, CHINA COMMUNICATIONS, IASC, ADMA, ICDM, etc. He has served as a TPC member or chairman of SMMA'18, ICIS'21, WISA'21, etc. He is also a reviewer for several authoritative journals such as JCST, CJE, IEEE/CAA Journal of Automatica Sinica (JAS), CJC, JOS, etc.
---------------------------------------------------------------------------------------------------------------------------------------------------


Workshop 19: Blockchain and Digital Economy

Title 1 :Blockchain Model and Its Theory in Cross-border Data Flows

Summary:
Cross-border data flows are a key factor to drive the development of the digital economy. currently, blockchain technology provides an opportunity to extend the theoretical research and enrich methods on cross-border data flow. Distributed ledger technologies and blockchains stem from an ideological open-source movement and facilitate the sharing and exchange of data via a complementary technical layer on top of the internet. However, despite these opportunities hopefully changing our lives, there still exit challenges addressed including technical issues such as scalability, security and interoperability. Therefore, through the research on data sovereignty, peer management, privacy protection, cross-domain authentication and efficient supervision in cross-border data flow, it will enrich the existing theories and methods of cross-border data flow, and significantly promote secure data flow and cooperative global data supervision.

This workshop aims to bring together the research accomplishments provided by researchers from academia and the industry. The other goal is to show the latest blockchain research results in the new digital economy, such as cross-border paperless trade, cross-border e-government, cross-border e-commerce, cross-border payment or settle and so on. We encourage prospective authors to submit related distinguished research papers on the subject:  theoretical approaches and models in data flow; blockchain and digital economy. Please name the title of the submission email with “paper title_workshop title”.

Keywords: Blockchain, Digital Economy, Cross-border Data Flow, Privacy-preserving Technology, Data Sharing and Interchange, Digital Governance, Heterogeneous Identity Authentication

Chair:
Prof. Yimin Yu, Information Management Center,University of Finance and Economics of Yunnan, China


Yimin Yu is the director of the Information Management Center of Yunnan University of Finance and Economics(YNUFE). He received his Ph. D. from University of Electronic Science and Technology of China in 2010. His research interests include blockchain, e-government, e-commerce, information security. He has published more than 20 papers in referred journals and conferences. He published 2 academic monographs. Moreover, He has 10 national patents and 18 software copyrights.
---------------------------------------------------------------------------------------------------------------------------------------------------


Workshop 20: Blockchain  and UAV Communication Networks

Title 1 :Blockchain Application in UAV Communication Networks

Summary:
Unmanned aerial vehicles (UAVs) have enormous potential in the public and civil domains. These are particularly useful in applications, where human lives would otherwise be endangered. Multi-UAV systems can form UAV networks and collaboratively complete missions more efficiently and economically as compared to single UAV systems. However, there are many security issues to be resolved in UAV communication networks. For example, the attackers may control some malicious UAVs and make them be part of the UAV networks. The malicious UAVs can take part in the data transmission procedures of the UAV communications and fabricate the transmitted data to undermine the authenticity and the integrity of the data in the networks. Blockchain, which is a newly emerging decentralized transaction recording technology, provides a promising solution for the above-mentioned issues. The workshop aims to show and share the latest research results provided by researchers from academia and industry about how to solve the security issues that existed in the UAV communication networks based on blockchain technology. We encourage prospective authors to submit related distinguished research papers on the subject of both: theoretical approaches and practical case reviews. Please name the title of the submission email with “paper title_workshop title”.

Keywords: Blockchain, UAV Communication Networks, Data Authenticity, Data Integrity, Trustworthy Systems

Chair:
Prof. Xingpo Ma, School of Computer and Information Technology, Xinyang Normal University, China


Xingpo Ma received his bachelor's degree, master's degree and doctor's degree in Central South University in 2005, 2007 and 2013 respectively. From March 2017 to March 2018, he studied in CSIRO (Commonwealth Scientific and Industrial Research Organisation) as a visiting scholar. He is now an associate professor at the school of computer and information technology at Xinyang Normal University. He has published tens of papers in “IEEE transactions on circuits and systems I: regular papers”, “IEEE transactions on computers”, “IEEE Internet of Things Journal”, “future generation computer systems”, “computer research and development” as well as some other important journals both at home and abroad.
---------------------------------------------------------------------------------------------------------------------------------------------------


Workshop 21 : Blockchain data security

Title 1 : Application of Cryptography in Blockchain

Summary:
Aiming at the problem that the common nodes in the Blockchain Delegated Proof of Stake(DPOS) consensus mechanism have a low discourse right and the probability that the authorized node is a malicious node, a dynamically authorized blockchain consensus mechanism is proposed. Two sets of screening methods, chaos randomization and fireworks optimization, were used to construct the authorized node set, and a new type of decision supervision mechanism and statistical model was established to eliminate the adverse effects of malicious nodes and achieve dynamic updates of authorized nodes. Based on the Hyperledger platform, the throughput and delay of the dynamic authorization consensus mechanism were tested and analyzed. The results show that the scheme can effectively improve the efficiency of consensus and reduce the probability of malicious nodes in the authorized node set, to ensure the security, accuracy and efficiency of consensus reached by blockchain nodes.

Keywords: Blockchain, Consensus Mechanism, Dynamic Authorization

Chair:
Associate Prof. Juan Wang, School of Electronics and Information Engineering, University of Science and Technology of Heilongjiang, China


Juan Wang is an Associate professor in the School of Electronics and Information Engineering at the University of Science and Technology of Heilongjiang(USTH). She received her Ph. D. from Heilongjiang University in 2019. Her research interests include information security, secret communication and blockchain technology. She has published more than 26 papers in referred journals and conferences, including IJBC, IEEE Access, Entropy, Symmetry, etc.
---------------------------------------------------------------------------------------------------------------------------------------------------


Workshop 22 : Blockchain Application Systems

Title 1 :Blockchain Application in Mobile Computing

Summary:
Due to the widespread of mobile devices, various mobile computing application systems have arisen, including mobile crowdsensing, spatial crowdsourcing, mobile edge computing, intelligent transportation service, and so on. As a newly emerging decentralized transaction recording technology, blockchain provides a promising solution for designing trustworthy mobile computing application systems, which has attracted much attention recently. This workshop aims to show and share the latest research results in the field of blockchain application systems provided by researchers from academia and industry. We encourage prospective authors to submit related distinguished research papers on the subject of both: theoretical approaches and practical case reviews. Please name the title of the submission email with “paper title_workshop title”.

Keywords:Blockchain, Mobile Crowdsensing, Spatial Crowdsourcing, Edge Computing, Data Trading

Chair:
Prof. Shuobo Xu, School of Information Science and Electrical Engineering, University of Shandong Jiaotong University, China


Shuobo Xu is a professor in the School of Information Science and Electrical Engineering at the Shandong Jiaotong University. His research interests include mobile crowdsensing, blockchain technology and application, mobile edge computing, auction theory, data security and privacy.
---------------------------------------------------------------------------------------------------------------------------------------------------


Workshop 23 :  Blockchain TechnologyData Sharing & Privacy,AI Security
 
Title 1 :Blockchain TechnologyData Sharing & Privacy,AI Security

Summary:
Blockchain is currently considered the next big wave after the Internet. Based on blockchain technology, we explore edge computing, copyright protection, data sharing, artificial intelligence security and other information security practices.
This workshop aims to bring together the latest research accomplishments in the field of Blockchain, Data Sharing, Privacy and AI Security. And we encourage the prospective authors to submit their distinguished research papers on the subjects. Please name the title of the submission email with “paper title_workshop title”.

Keywords: Blockchain, Data Sharing, Privacy, AI Security

Chair:
Prof. Sheng Hong, School of Cyber Science and Technology, Beihang University, China


Sheng Hong is an associate professor and doctoral supervisor in the School of Cyber Science and Technology at the Beihang University (BUAA). He engaged in network and information security, complex system security research, completed several related scientific research projects in the field of network security, Presided over the national key basic research and development plan projects, national key research and development project, industrial Internet innovation and development project, technical basic project, pre-research project, National Natural Science Foundation of China There are more than 10 national, provincial and ministerial-level topics, and more than 10 horizontal topics in key industries such as industrial Internet, intelligent manufacturing, State Grid, and avionics systems. He is the editorial board member of several international journals and conferences, including "Information Network Security", "Information Technology and Network Security" and "Aeronautical Engineering Progress". In the national key research and development plan, he established a multi-level industrial network security protection model, through dangerous targets, key targets, cloud detection and other protection strategies and protective measures to ensure the network from the aspects of environmental credibility, situational knowledge, and controllable operation. Security; in the industrial Internet innovation and development project, he proposed a system security enhancement protection technology for the industrial Internet; in the National Natural Science Foundation, he broke through the critical phase change mechanism of fault propagation by focusing on the coupling, chaos and spreading characteristics of dynamic network faults The bottleneck of the maintenance control strategy provides a new solution for the prevention of complex dynamic network fault propagation and fault-tolerant control. In the open topic of the Shanghai industrial control system safety innovation functional platform, he aimed at the industrial Internet network suffered from virus attacks and equipment paralysis. The actual problems of the research network virus transmission mechanism and protection strategies. He has published more than 50 papers, including 26 papers indexed by SCI, one co-authored academic book, and 14 national invention patents.
---------------------------------------------------------------------------------------------------------------------------------------------------


Workshop 24 : SecurityPrivacy Protection, and Secure Multiparty Computation

Title 1 :Privacy Protection Schemes on Blockchain and Other Application Scenarios

Summary:
Privacy protection has always been a big problem on blockchain. The workshop aims to propose some privacy protection schemes on blockchain and other application scenarios, which can effectively protect data privacy. In addition, to solve the problem of resource waste caused by distributed storage of blockchain data, we need to propose a new mode to store data.

Keywords: Blockchain, Privacy Protection, Secure Multiparty Computation, Homomorphic Encryption

Chair:
Prof. Xin Liu, School of Information Engineering, Inner Mongolia University of Science and Technology, China


Xin Liu is an associate professor of Inner Mongolia University of Science and Technology. He received doctorate in Computer Software and Theory from Shaanxi Normal University in 2017. His research interests are in the areas of information security, blockchain, and secure multiparty computation, quantum cryptography.
---------------------------------------------------------------------------------------------------------------------------------------------------


Workshop 25 : Protocols and Algorithms Based on Blockchain

Title 1 :Consensus Algorithm, Architecture, Performance Analysis on Blockchain

Summary:
Consensus algorithm is the core technology in blockchain, which describes how peers in blockchain network achieve data consistency and directly determines the operating efficiency of the entire blockchain system. At the same time, the architecture is also the key to the blockchain application. However, the existing consensus algorithm and architecture are different to meet the performance and security requirements of blockchain applications. So, studying the new consensus algorithm and architecture have important significance for the actual application of blockchain.

Keywords:Consensus Algorithm, Architecture, Performance Analysis

Chair:
Assoc. Prof. Xiaohong Deng, College of Applied Science, Jiangxi University of Science and Technology University, China


Xiaohong Deng received a Ph. D. degree in Computer Application Technology from Central South University. He worked as an associate professor at the College of Applied Science, Jiangxi University of Science and Technology University. His research interests include Blockchain and Information Security.
He participated in the National Natural Science Foundation, Natural Science Fund Project in Jiangxi province, etc. Based on these projects, he published more than 50 papers in important academic publications at home and abroad. At present, he is a peer reviewer of some academic journals on Blockchain and its application.
---------------------------------------------------------------------------------------------------------------------------------------------------


Workshop 26 : Blockchain Technologies that support Federal Learning
 
Title 1 :Learning, Exchange, Contract and Modelling

Summary:
Federal learning (federated learning) is a new artificial intelligence basic technology to carry out high efficiency machine learning between multi-participants or multi-computing nodes under the premise of ensuring information security, protecting terminal data and personal data privacy, and ensuring legal compliance. Unlike distributed machine learning, federal learning requires a decentralized distribution system to ensure user privacy and security. Effective machine learning is carried out under the premise of ensuring data security, exchange and training efficiency. As a decentralized, data-encrypted, non-tampering distributed shared database, blockchain can provide data confidentiality for federated learning data exchange to guarantee user privacy and ensure data security between participants. It can also ensure that the value-driven incentive mechanism of multi-participants providing data for model training increase the enthusiasm of participants to provide data and update network model parameters. Both federal learning and blockchain need multi-party participation, and the trusted network of multi-party cooperation is realized through technical consensus, which has good complementarity. From the perspective of application goals, federal learning aims to create value, while blockchain aims to represent and transfer value.

Keywords:Federated Learning, Data Privacy, Big Data Exchange Security, Artificial intelligence, Machine Learning

Chair:
Prof. Jian Zhang ,Cyber Security, Central South University, China

Jian Zhang received a Ph. D. degree in information science and engineering from Central South University and a Ph. D. degree in Economics and Management from Tsinghua University. He worked as a professor at the School of Computer Science, Central South University. His research interests include cyber security, cognitive communication, target detection and recognization.
He presided over the National Natural Science Foundation, National Key Research and Development Project, Chinese National Programs for High Technology Research and Development, etc. Based on these projects, he published more than 30 papers in IEEE Trans, Science China and other journals/conferences, Application and authorization of 17 national patents.
---------------------------------------------------------------------------------------------------------------------------------------------------


Workshop 27 : Blockchain and Machine Learning

Title 1 : Blockchain-based Secure Intelligent Algorithms for Machine Learning
 
Summary:
The blockchain is a distributed ledger database and has attracted much recent attention in the academic community. The blockchain paradigm takes advantage of key technologies such as P2P networking, the distributed ledger, the consensus mechanism, and the smart contracts, which has many applications in fields such as Internet of Things, finance and manufacture. 
How to improve the performance of the machine learning algorithms effectively in a distributed system has been a challenging problem in the field of data mining. Sharing data without sacrificing privacy in the distributed network can enlarge the training data volume and improve the accuracy of the machine learning models. The blockchain-based mechanisms can provide the feasible solutions to promote the performances of the secure machine learning algorithm.
The workshop aims to bring together the research accomplishments provided by researchers from academia and the industry. The other goal is to show the latest research results in the field of Blockchains and Machine Learning. We encourage prospective authors to submit related distinguished research papers on the subject of both: theoretical approaches and practical case reviews. Please name the title of the submission email with “paper title_workshop title”.

Keywords : Blockchain, Machine Learning, Distributed System, Smart Contract, Consensus Mechanism

Chair:
Prof. Jianping Yu, Information Science and Engineering, Hunan Normal University, China


Jianping Yu received a Ph. D. degree in Computer Science and Technology from Hunan University in 2008. He worked as an associate professor from 2010 at the College of Information Science and Engineering, Hunan Normal University. His research interests include Blockchain Technology, Network Optimization, Swarm Intelligence and Machine Learning.
He has participated in the National Natural Science Foundation, Chinese National Programs for High Technology Research and Development, etc. Based on these projects, he published more than 30 papers in Transactions on Emerging Telecommunications Technologies, Intelligent Automation & Soft Computing, Journal of Software, Chinese Journal of Electronics, EURASIP Journal on Wireless Communications and Networking, International Journal of Distributed Sensor Networks and other journals/conferences. He served as the project reviewer of the National Natural Science Foundation of China, the Strategic Innovation Cooperation Key Special Project of Ministry of Science and Technology FDCT and the Science and Technology Progress Award of Hunan Province.
---------------------------------------------------------------------------------------------------------------------------------------------------


Workshop 28 : Data privacy security and Blockchain
 
Title 1 : Data Privacy, Information Security and Blockchain

Keywords : Blockchain, Date Privacy, Information Security, Differential Privacy

Summary:
In recent years, data privacy security has gradually become a research hotspot and is more widely used in banks, exchanges and other financial and insurance industries. Among them, relevant algorithms, protocols, smart contracts and other technologies to enhance data privacy and security centered on blockchain technology are receiving increasing attention from peers.
The main purpose of this symposium is to present and share relevant research results on data privacy protection, data security and blockchain technology from relevant researchers in academia and industry. We encourage potential authors to submit relevant and outstanding research papers on topics including theoretical approaches and practical case reviews. Please use the name "paper title_Date Security and Blockchain" in the submission email.

Chair:
Researcher Feng Liu, Institute of Artificial Intelligence and Change Management, Shanghai University of International Business and 
Economics(SUIBE), China


Researcher Feng Liu is a researcher in Institute of Artificial Intelligence and Change Management, data security and privacy. He has published more than 20 papers in referred journals and conferences, including 20 blockchain-related papers, among which, many high-level papers are included in CCF-A, CCF-B and above searches, applied for more than 20 blockchain-related invention patents. He is also on the reviewer board of several journals such as ICMR, Computing Science etc.
---------------------------------------------------------------------------------------------------------------------------------------------------


Workshop 29 :  Blockchain Privacy Protecting

Title 1 : Privacy Protecting and Security Computing on Blockchains

Summary:
Privacy protection has been widely studied in distributed applications, mobile crowdsourcing etc. As a type of distributed database, blockchain technology has significant advantages in privacy protection, such as information tamper-proof, anonymity and network stability, which can solve the privacy disclosure problems faced by some centralized services, such as the privacy protection intelligent parking system based on blockchain, the secret share voting system, transparent voting platform and health monitor system. However, the decentralized architecture and data storage mechanism adopted by blockchain technology also bring some adverse effects on privacy protection, among which the two main problems are user identity privacy challenge and user transaction privacy challenge.
The workshop aims to bring together the research accomplishments provided by researchers from academia and the industry. The other goal is to show the latest research results in the field of Blockchain Privacy Protection. We encourage prospective authors to submit related distinguished research papers on the subject of both: theoretical approaches and practical case reviews. Please name the title of the submission email with “paper title_workshop title”.

Keywords : Blockchains, Privacy Protection, Security Computing

Chair:
Assoc. Prof. Jindong Zhao, School of Computer  Science and Control Engineering,  Yantai University, China
  

Jindong Zhao received a Ph.D. degree from University of Science and Technology Beijing. He worked as an associate professor at the Computer Science and Control Engineering, Yantai University. His research interests include IOT and blockchain. 
He was PI of the National Natural Science Foundation, Shandong Natural Science Foundation, etc., and he is PI the blockchain sub-project of Yantai smart city project. Based on these projects, he published more than 10 papers in journals/conferences.
---------------------------------------------------------------------------------------------------------------------------------------------------


Workshop 30 :  Blockchain in the Internet of Things (IoT)

Title 1 : IoT Security and Trust with Blockchain

Summary:
Current Internet of Things (IoT) are increasingly becoming pervasive, complex, and ever-evolving due to factors like enormous growth in the number of connected devices and users, continuous appearance of network applications, increasing amount of data transferred, and diversity of data structure and usage. Understanding data traffic and pattens in such networks is a difficult yet vital task for availability and validity of the network, but recently also for its security. IoT Security can, for example, enable the detection of the malicious software and attacks to connected vehicles or help to understand the patterns of various network threats including those that exploit users’ behaviour and other user’s sensitive information. On the other hand, Trust with Blockchain can help to build a new but reliable infrastructure for IoT applications and devices, with blockchain technology, one can have more robust trust measures for connected devices or users.
The workshop aims to bring together the research accomplishments provided by researchers from academia and the industry. The other goal is to show the latest research results in the field of IoT cybersecurity and blockchain technology. We encourage prospective authors to submit related distinguished research papers on the subject of both: IoT Security and Trust with Blockchain. 
Please name the title of the submission with “paper title_IoT Security and Trust with Blockchain” and email tohaoxi@cuit .edu.cnor icbctis@126.com.

Keywords : Cyber Security, Internet of Things, Trust, Big Data, Artificial intelligence, Blockchain

Chair:
Assoc. Prof. Haoxi Zhang, Chengdu University of Information Technology, China


Haoxi Zhang is an Associate Professor from the Chengdu University of Information Technology, Chengdu, China. He received his Ph. D. degree in Knowledge Engineering from the University of Newcastle in 2013, and the master’s degree in Software Engineering from the University of Electronic Science and Technology of China. His research interests focus on experience-oriented intelligent systems, knowledge engineering, cyber security, Internet of Things, and Deep Learning. He has published more than 30 reputed journal and conference papers, including IEEE Internet of Things Journal, KBS, Neurocomputing, Future Generation Computer Systems, etc.
---------------------------------------------------------------------------------------------------------------------------------------------------


Workshop 31 :  Security, Privacy, Attacks, and Forensics

Title 1 :Internet Measurement and Data Security

Summary:
The ultimate purpose of network research is to establish efficient, stable, safe, interoperable, predictable and controllable network, and network measurement is the most effective means to obtain first-hand network behavior indicators and parameters. It is an effective way to understand network behavior to build a network behavior model on the basis of network measurement and test, and to build a bridge from theory to practice with simulation method. Besides, data security refers to the ability to ensure the effective protection and legal use of data by taking necessary measures, and keep the data in a safe state continuously.
The objective of this workshop is to collect and analyze the performance status of network protocol operation, and detect the problems of affecting network service quality such as DoS, data tampering, data leakage; also focuses on data security, including privacy, identity authentication and data encryption transmission. Please name the title of the submission email with “paper title_workshop title”.

Keywords : Internet Measurement, Privacy Protection, Identity Authentication, Encrypted Transmission

Chair:
Prof. Zhaoxin Zhang , Faculty of Computing, Harbin Institute of Technology, China


Zhaoxin Zhang received Ph. D. degree from School of Computer Science and Technology of Harbin Institute of Technology, Harbin, China in 2007. Currently, he works as a professor in Faculty of Computing, Harbin Institute of Technology, Harbin, China. Besides, he is the research director of the Network and Information Security Technology Research Center at Weihai of Harbin Institute of Technology. His research interests include Network and Information Security, Network Simulation and Domain Name System Security.
---------------------------------------------------------------------------------------------------------------------------------------------------


Workshop 32 :  Intrusion Detection and Cloud Security

Title 1 : Intrusion Detection and Cloud Security

Summary:
Malicious attacks have become more sophisticated in today’s world. Furthermore, security threat such as APT attack which exploits vulnerabilities to perform persistent and aggressive attack and zero-day attacks aiming at internet users shows an increase in risk. The security threat not only exists in local host and traditional network, but also exists in the cloud. It is increasingly critical and a big challenge to detect intrusion behavior. 
This workshop aims to bring together academic researchers, industrial practitioners, and individuals working on intrusion detection and cloud security to share their new ideas, latest findings, and state-of-the-art results.

Keywords : Intrusion Detection, Cloud Security, Anomaly Detection

Chair:
Prof. Yulai Xie , School of Cyber Science and Engineering, Huazhong University of Science and Technology, China


Yulai Xie received the BE and Ph. D. degrees in computer science from the Huazhong University of Science and Technology(HUST),Wuhan, China, in 2007 and 2013, respectively. He is currently an associate professor with the School of Cyber Science and Engineering, HUST, China. His current research interests include provenance-aware data storage and security, intrusion detection, digital forensic, social computing, distributed file systems, cloud storage and cloud security.
He currently serves as the web editor of IEEE Letters of the Computer Society. He is also an editoral board member of GSL Journal of Forensic Research and International Journal of Next-Generation Networks. He has been selected in the WuHan Yellow Crane Talents Program. He has been also selected in the CCF-venusterch program and CCF-NSFOCUS program. He is a member of ACM and IEEE, and a senior member of China Computer Federation (CCF).
---------------------------------------------------------------------------------------------------------------------------------------------------







To be updated.