Menu:

微信二维码
       
中文EN

TURC-AIS 2019


会议日程

2019-05-18 : 百合厅B-3 F3
Time Talks
14:00 - 14:10 开幕式(主持人:孙星明,南京信息工程大学)
Openning Remarks Moderator: Xingming Sun, NUIST
14:10- 14:50 特邀报告 1
Keynote 1
题目: 隐私计算:理论、计算框架及其未来发展趋势
Title: Privacy Computing
演讲者:李凤华,中科院信工所
Speaker
Fenghua Li, IIE, CAS
主持人:牛少彰,北京邮电大学
Chair: Shaozhang Niu, BUPT
14:50- 15:30 特邀报告 2
Keynote 2
题目:空中手写字母识别
TitleWriting in the Air with WiFi Signals
演讲者:付章杰,南京信息工程大学
SpeakerZhangjie Fu, NUIST
主持人:牛少彰,北京邮电大学
Chair: Shaozhang Niu, BUPT
15:30 - 15:45 茶歇
Tea Break
15:45- 16:25 特邀报告3
Keynote 3
题目:区块链驱动的安全可信万物互联
Title
Blockchain-Driven Secure and Trusted Internet of Everything
演讲者:徐恪,清华大学、国家杰青
SpeakerKe Xu, Tsinghua University 
主持人:孙星明,南京信息工程大学
Chair: Xingming Sun, NUIST
16:25- 17:05 特邀报告 4
Keynote 4
题目:学术画像与智能推荐
TitleAcademic Portrait and Intelligent Recommendation
演讲者:陈贵海,上海交通大学
Speaker
Guihai Chen , Shanghai Jiaotong University
主持人:孙星明,南京信息工程大学
Chair: Xingming Sun, NUIST
17:05- 17:20 录用论文报告及交流
主持人:王保卫,南京信息工程大学
Chair: Baowei Wang, NUIST

Keynote 1: 隐私计算:理论、计算框架及其未来发展趋势



李凤华
中国科学院信工所
 
摘要: 随着信息技术的快速发展和服务模式的不断演进,用户数据频繁跨境、跨系统、跨生态圈交互已成为常态,但现有隐私保护方案不能提供体系化的保护,尚未解决隐私信息的动态度量与延伸控制、隐私侵犯的追踪溯源等问题,亟需提出完善的隐私保护理论体系。本报告首先总结典型应用场景下现有隐私保护算法的局限性,然后介绍本团队提出的隐私计算理论及关键技术体系,主要内容包括:隐私计算框架、信息系统框架、隐私计算形式化定义、隐私计算应遵循的四个原则、隐私保护效果评估、算法设计准则、隐私计算语言、隐私计算框架下的取证技术等内容,最后展望隐私计算的未来研究方向和待解决问题。

 

 

Keynote 2: 空中手写字母识别



付章杰
南京信息工程大学
 
摘要: 空中肢体动作识别是一个前沿研究方向,已有的识别方法主要借助于摄像头或可穿戴传感器。基于摄像头的方法依赖光线条件,基于可穿戴传感器的方法成本昂贵。为此,我们提出一种基于WiFi信号的空中手写字母识别方法,通过捕获CSI值,并进行分析和处理,从而识别人在空中的手写动作。

 

 

Keynote 3: 区块链驱动的安全可信万物互联



徐恪
清华大学
 
摘要: 近年来,区块链已成为解决物联网安全的重要技术路径。我们将从物联网的感知层、网络层和应用层三个层面出发,探讨区块链技术在其中的可能应用,重点讨论了设备的真实身份与漏洞检测、网络的真实地址与真实路径及错误定位、服务的边缘计算与跨域访问等安全保障技术,我们相信区块链技术的引入将有利于创建更加安全可信的物联网生态。

 

 

Keynote 4: 学术画像与智能推荐



陈贵海
上海交通大学
 
摘要: 学术同行评价是国家科技计划组织实施和评审评估的核心环节,全面、合理、精准、可信的学术同行评价有利于促进广大科研人员积极参与科技创新研究工作,进而促进国家的科技发展与进步。本项目基于学术网络及其学术大数据,研究基于立体精准画像的学术分类与推荐系统,以解决当前人工挑选评审专家耗时费力且很难公平公正的问题。针对学者人数众多、数据庞杂对遴选评审专家的挑战,研究并实现科研行为数据库、多维学术画像、精准推荐、可信溯源与隐私保护等一系列前沿关键技术及系统,并在科教领域进行示范应用,形成相关规范和标准,为遴选专家的 “高效化、精准化、可信化” 提供技术支撑。

 

 

征文通知:第1届中国图灵大会人工智能与安全学术会议(TURC-AIS 2019)


中国图灵大会人工智能与安全学术会议(ACM TURC-AIS , ACM TURC Conference on Artificial Intelligence and Security)是 ACM 中国图灵大会(ACM TURC)下设的唯一学术分会。依托于主会每年举办一届,主要关注计算机前沿技术、人工智能与安全。会议立足国内,面向国际,致力于收录展示度高、代表性强的国内外前沿学术成果。欢迎鼓励国内外专家学者参与、投稿。会议正式录用的文章将在 ACM Digital Library 发表(EI 检索),优秀论文将被推荐到本领域8个知名 SCI 期刊发表;会议短文将在普通国际期刊发表。具有代表性的成果,将安排在中国图灵大会学术分会场进行报告。投稿并注册参加本学术分会的作者,将有机会同时参与中国图灵大会的各项活动。

详情ACM TURC-AIS官网:http://www.turcais.com

We are pleased to announce that the 1st ACM TURC Conference on Artificial Intelligence and Security (TURC-AIS 2019, http://www.turcais.com) will be held from May 17-19, 2019 at Chengdu, China. As the only workshop of the ACM Turing Celebration Conference - China (ACM TURC 2019, ACM 中国图灵大会), TURC AIS offers a timely venue for researchers and industry partners to present and discuss their latest results in computer science, artificial intelligence, security and privacy related works.

The organizing committee is excited to invite you to take part in ACM TURC AIS 2019, to discuss issues at the technological frontier of society today as well as interdisciplinary technological trends. The technical program chairs invite the submission of original papers to following symposia for presentation and publication in the conference proceedings (ACM Digital Library). Best paper awards will be selected from accepted papers. Outstanding papers will be invited for possible publication in SCI-indexed journals.

Topics of interest include, but are not limited to:

  1. Artificial Intelligence and Security
    • Machine Learning
    • Natural Language Processing
    • Computer Vision
    • Data Mining
    • Artificial Neural Networks
    • Affective Computing
    • Planning
    • Knowledge Representation
    • Reasoning
    • Robotics and Reception
    • Big Data Applications
    • Artificial Intelligence Applications in Science, Engineering, Healthcare and Medicine

  2. Big Data and Security
    • Techniques, Models and Algorithms for Big Data
    • Tools and Systems for Big Data
    • Big Data Analytics and Social Media
    • Hardware/Software Infrastructure for Big Data
    • Mobile Communications and Networks
    • Security and Privacy for Big Data
    • Copyright Protection for Big Data
    • Data Compression
    • Machine Learning and AI for Big Data
    • Big Data Persistence and Preservation
    • Big Data Quality and Provenance Control
    • Big Data Storage and Retrieval

  3. Cloud Computing and Security
    • Cloud Computing Architecture and Systems
    • Cloud Computing Models, Simulations, Designs, and Paradigms
    • Cloud Management and Operations
    • Dynamic Resource Provision and Consuming
    • Cloud Computing Technologies, Services and Applications
    • Security Evaluation and Benchmarks Based on Cloud
    • Authentication, Authorization and Reliability Issues in Cloud
    • Security and Privacy in Cloud Computing

  4. Information Hiding
    • Coverless Information Hiding
    • Steganography and Steganalysis
    • Digital Watermarking, Fingerprinting and Forensics
    • Multimedia Authentication and Encryption
    • Covert/Subliminal Channels

  5. IoT Security
    • Data Security and Privacy in the IoT
    • Attacks and Countermeasures on IoT Systems
    • Trust Model, Data Aggregation and Information Sharing
    • Secure Hardware and Software for IoT
    • Application Security for IoT

  6. Multimedia Forensics
    • Active and Passive Forensics
    • Big Data Forensics
    • Portable electronic device forensics
    • Network Forensics
    • Anti-forensics

  7. Encryption and Cybersecurity
    • Measurements for Cybersecurity
    • Post Quantum Cybersecurity
    • Visualization for Security
    • Applied Cryptography
    • Language-based Security


Organization Committee


General Co-Chairs:
Yun Q. Shi, New Jersey Institute of Technology, USA
Xingang You, China Information Technology Security Evaluation Center, China
Suzanne K. McIntosh, New York University, USA
Xingming Sun, Nanjing University of Information Science and Technology, China
Victor S. Sheng, University of Central Arkansas, USA

Technical Program Chairs:
Yunbiao Guo, China Information Technology Security Evaluation Center, China
Jinsong Han, Zhejiang University, China
Zhaoxia Wang, Agency for Science, Technology and Research (A*STAR), Singapore
Jin Wang, Changsha University of Science and Technology, China
Baowei Wang, Nanjing University of Information Science and Technology, China

Publication Chairs:
Zhaoqing Pan, Nanjing University of Information Science and Technology, China
Jiliang Wang, Tsinghua University, China
Zhihua Xia, Nanjing University of Information Science and Technology, China

Organization Chairs:
Zhangjie Fu, Nanjing University of Information Science and Technology, China
Changming Zhao, Chengdu University of Information Science and Technology, China
Lingyun Xiang, Changsha University of Science and Technology, China
Chunfang Yang, Zhengzhou Science and Technology Institute, China

 

Paper Submission Guidelines


1. All manuscripts should be submitted in PDF file format by the following system:
https://cmt3.research.microsoft.com/TURCAIS2019.
Note: In the SUBJECT AREAS section, the invited authors please select "Invited Paper", others please select "Original Paper".

2. All submissions must be in English. This year we are accepting Full paper and Short Paper submissions. Full papers, must be at least 7 pages in length but no more than 10 pages in double-column ACM format (as specified at ACM Proceedings Template), including figures and references. Short papers, must be 4-6 pages in length, including figures and references. Authors should refer to the conference submission format to prepare their papers. Templates for the standard ACM format can be found at https://www.acm.org/publications/proceedings-template. No changes to margins, spacing, or font sizes are allowed from those specified by the style files. Papers violating the formatting guidelines will be returned without review.

3. The submitted papers must not be previously published anywhere, and must not be submitted to any other conferences before and during the TURC-AIS 2019 review process. Submitting a paper to the conference means that if the paper were accepted, at least one author will register and attend the conference to present the paper.

4. For any difficulties and other issues regarding submission, please contact: turcais@163.com.

Acceptance
Manuscripts should present the current research in the areas identified in the call for papers. All submitted manuscripts will be reviewed by experts in the fields and will be judged from the aspects of problem significance, contributions, originality, correctness, technical strength, quality of presentation, and relevance to the conference attendees.

Publication
All accepted full papers will be entered into ACM Digital Library and the Engineering Index (EI).
All accepted short papers will be published in other journals.
Outstanding papers will be invited for possible publication in the following SCI-indexed journals:

  • International Journal of Sensor Networks
  • Journal of Real-Time Image Processing
  • Mathematical Biosciences and Engineering
  • Computers, Materials & Continua
  • IEEE Access
  • Journal of Information Security and Applications
  • Journal of Combinatorial Optimization
  • Mobile Networks and Applications

  • Important Date


    Paper Submission Due: March 25, 2019
    Notification of Acceptance: April 10, 2019
    Registration Due: April 18, 2019
    Camera-Ready Paper Due: April 25, 2019
    Conference Date: May 17-19, 2019

    Contact US


    ACM TURC Conference on Artificial Intelligence and Security
    URL: http://www.turcais.com
    Tel: +86-(25)-58731244
    e-mail: turcais@163.com
    TURC AIS WeChat Official Accounts: