Menu:

WeChat QR Code
       
中文EN

TURC-AIS 2019


会议日程

2019-05-18 : 百合厅B-3 F3
Time Talks
14:00 - 14:10 开幕式(主持人:孙星明,南京信息工程大学)
Openning Remarks Moderator: Xingming Sun, NUIST
14:10- 14:50 特邀报告 1
Keynote 1
题目: 隐私计算:理论、计算框架及其未来发展趋势
Title: Privacy Computing
演讲者:李凤华,中科院信工所
Speaker
Fenghua Li, IIE, CAS
主持人:牛少彰,北京邮电大学
Chair: Shaozhang Niu, BUPT
14:50- 15:30 特邀报告 2
Keynote 2
题目:空中手写字母识别
TitleWriting in the Air with WiFi Signals
演讲者:付章杰,南京信息工程大学
SpeakerZhangjie Fu, NUIST
主持人:牛少彰,北京邮电大学
Chair: Shaozhang Niu, BUPT
15:30 - 15:45 茶歇
Tea Break
15:45- 16:25 特邀报告3
Keynote 3
题目:区块链驱动的安全可信万物互联
Title
Blockchain-Driven Secure and Trusted Internet of Everything
演讲者:徐恪,清华大学、国家杰青
SpeakerKe Xu, Tsinghua University 
主持人:孙星明,南京信息工程大学
Chair: Xingming Sun, NUIST
16:25- 17:05 特邀报告 4
Keynote 4
题目:学术画像与智能推荐
TitleAcademic Portrait and Intelligent Recommendation
演讲者:陈贵海,上海交通大学
Speaker
Guihai Chen , Shanghai Jiaotong University
主持人:孙星明,南京信息工程大学
Chair: Xingming Sun, NUIST
17:05- 17:20 录用论文报告及交流
主持人:王保卫,南京信息工程大学
Chair: Baowei Wang, NUIST

Keynote 1: 隐私计算:理论、计算框架及其未来发展趋势



Fenghua Li
IIE, CAS
 
Abstract: 随着信息技术的快速发展和服务模式的不断演进,用户数据频繁跨境、跨系统、跨生态圈交互已成为常态,但现有隐私保护方案不能提供体系化的保护,尚未解决隐私信息的动态度量与延伸控制、隐私侵犯的追踪溯源等问题,亟需提出完善的隐私保护理论体系。本报告首先总结典型应用场景下现有隐私保护算法的局限性,然后介绍本团队提出的隐私计算理论及关键技术体系,主要内容包括:隐私计算框架、信息系统框架、隐私计算形式化定义、隐私计算应遵循的四个原则、隐私保护效果评估、算法设计准则、隐私计算语言、隐私计算框架下的取证技术等内容,最后展望隐私计算的未来研究方向和待解决问题。

 

 

Keynote 2: Writing in the Air with WiFi Signals



Zhangjie Fu
NUIST
 
Abstract: Handwriting action recognition in the air is an important research direction. The existing identification methods mainly rely on cameras or wearable sensors. The camera-based approaches rely on lighting conditions, and methods based on wearable sensors are expensive. To this end, we propose a handwriting action recognition method based on Wi-Fi signal, which captures the CSI value, analyzes and processes it, and recognizes the handwriting action of the human in the air.

 

 

Keynote 3: Blockchain-Driven Secure and Trusted Internet of Everything



Ke Xu
Tsinghua
 
Abstract: In recent years, blockchain has become a novel paradigm for ensuring the security of IoT. In this talk, we will make some explorations for the possible combinations of both blockchain and IoT from the perspective of perceptual, network and application layer of IoT architecture. In particular, security enhancement technologies will be mainly clarified, such as the authentic identification and vulnerability detection for IoT devices, source authentication and path validation as well as fault localization for IoT networks, and trusted edge computing and inter-domain access and control for IoT services. We believe blockchain can act as an IoT infrastructure that is conducive to establish a more secure and reliable IoT ecosystem.

 

 

Keynote 4: Academic portrait and intelligent recommendation



Guihai Chen
SJTU
 
Abstract: Academic Evaluation is very important in national science and technology program and management. How to make a complete, accurate and fair evaluation is still a challenging issue. In this talk, we first discuss the related techniques such as academic portrait, data source tracing, privacy preserving, interest conflict and intelligent recommendation. We also introduce an expert recommendation system which is currently under construction for the Ministry of Science and Technology.

 

 

Call for Papers: The 1st ACM TURC Conference on Artificial Intelligence and Security (TURC-AIS 2019)


中国图灵大会人工智能与安全学术会议(ACM TURC-AIS , ACM TURC Conference on Artificial Intelligence and Security)是 ACM 中国图灵大会(ACM TURC)下设的唯一学术分会。依托于主会每年举办一届,主要关注计算机前沿技术、人工智能与安全。会议立足国内,面向国际,致力于收录展示度高、代表性强的国内外前沿学术成果。欢迎鼓励国内外专家学者参与、投稿。会议正式录用的文章将在 ACM Digital Library 发表(EI 检索),优秀论文将被推荐到本领域8个知名 SCI 期刊发表;会议短文将在普通国际期刊发表。具有代表性的成果,将安排在中国图灵大会学术分会场进行报告。投稿并注册参加本学术分会的作者,将有机会同时参与中国图灵大会的各项活动。

详情ACM TURC-AIS官网:http://www.turcais.com

We are pleased to announce that the 1st ACM TURC Conference on Artificial Intelligence and Security (TURC-AIS 2019, http://www.turcais.com) will be held from May 17-19, 2019 at Chengdu, China. As the only workshop of the ACM Turing Celebration Conference - China (ACM TURC 2019, ACM 中国图灵大会), TURC AIS offers a timely venue for researchers and industry partners to present and discuss their latest results in computer science, artificial intelligence, security and privacy related works.

The organizing committee is excited to invite you to take part in ACM TURC AIS 2019, to discuss issues at the technological frontier of society today as well as interdisciplinary technological trends. The technical program chairs invite the submission of original papers to following symposia for presentation and publication in the conference proceedings (ACM Digital Library). Best paper awards will be selected from accepted papers. Outstanding papers will be invited for possible publication in SCI-indexed journals.

Topics of interest include, but are not limited to:

  1. Artificial Intelligence and Security
    • Machine Learning
    • Natural Language Processing
    • Computer Vision
    • Data Mining
    • Artificial Neural Networks
    • Affective Computing
    • Planning
    • Knowledge Representation
    • Reasoning
    • Robotics and Reception
    • Big Data Applications
    • Artificial Intelligence Applications in Science, Engineering, Healthcare and Medicine

  2. Big Data and Security
    • Techniques, Models and Algorithms for Big Data
    • Tools and Systems for Big Data
    • Big Data Analytics and Social Media
    • Hardware/Software Infrastructure for Big Data
    • Mobile Communications and Networks
    • Security and Privacy for Big Data
    • Copyright Protection for Big Data
    • Data Compression
    • Machine Learning and AI for Big Data
    • Big Data Persistence and Preservation
    • Big Data Quality and Provenance Control
    • Big Data Storage and Retrieval

  3. Cloud Computing and Security
    • Cloud Computing Architecture and Systems
    • Cloud Computing Models, Simulations, Designs, and Paradigms
    • Cloud Management and Operations
    • Dynamic Resource Provision and Consuming
    • Cloud Computing Technologies, Services and Applications
    • Security Evaluation and Benchmarks Based on Cloud
    • Authentication, Authorization and Reliability Issues in Cloud
    • Security and Privacy in Cloud Computing

  4. Information Hiding
    • Coverless Information Hiding
    • Steganography and Steganalysis
    • Digital Watermarking, Fingerprinting and Forensics
    • Multimedia Authentication and Encryption
    • Covert/Subliminal Channels

  5. IoT Security
    • Data Security and Privacy in the IoT
    • Attacks and Countermeasures on IoT Systems
    • Trust Model, Data Aggregation and Information Sharing
    • Secure Hardware and Software for IoT
    • Application Security for IoT

  6. Multimedia Forensics
    • Active and Passive Forensics
    • Big Data Forensics
    • Portable electronic device forensics
    • Network Forensics
    • Anti-forensics

  7. Encryption and Cybersecurity
    • Measurements for Cybersecurity
    • Post Quantum Cybersecurity
    • Visualization for Security
    • Applied Cryptography
    • Language-based Security


Organization Committee


General Co-Chairs:
Yun Q. Shi, New Jersey Institute of Technology, USA
Xingang You, China Information Technology Security Evaluation Center, China
Suzanne K. McIntosh, New York University, USA
Xingming Sun, Nanjing University of Information Science and Technology, China
Victor S. Sheng, University of Central Arkansas, USA

Technical Program Chairs:
Yunbiao Guo, China Information Technology Security Evaluation Center, China
Jinsong Han, Zhejiang University, China
Zhaoxia Wang, Agency for Science, Technology and Research (A*STAR), Singapore
Jin Wang, Changsha University of Science and Technology, China
Baowei Wang, Nanjing University of Information Science and Technology, China

Publication Chairs:
Zhaoqing Pan, Nanjing University of Information Science and Technology, China
Jiliang Wang, Tsinghua University, China
Zhihua Xia, Nanjing University of Information Science and Technology, China

Organization Chairs:
Zhangjie Fu, Nanjing University of Information Science and Technology, China
Changming Zhao, Chengdu University of Information Science and Technology, China
Lingyun Xiang, Changsha University of Science and Technology, China
Chunfang Yang, Zhengzhou Science and Technology Institute, China

 

Paper Submission Guidelines


1. All manuscripts should be submitted in PDF file format by the following system:
https://cmt3.research.microsoft.com/TURCAIS2019.
Note: In the SUBJECT AREAS section, the invited authors please select "Invited Paper", others please select "Original Paper".

2. All submissions must be in English. This year we are accepting Full paper and Short Paper submissions. Full papers, must be at least 7 pages in length but no more than 10 pages in double-column ACM format (as specified at ACM Proceedings Template), including figures and references. Short papers, must be 4-6 pages in length, including figures and references. Authors should refer to the conference submission format to prepare their papers. Templates for the standard ACM format can be found at https://www.acm.org/publications/proceedings-template. No changes to margins, spacing, or font sizes are allowed from those specified by the style files. Papers violating the formatting guidelines will be returned without review.

3. The submitted papers must not be previously published anywhere, and must not be submitted to any other conferences before and during the TURC-AIS 2019 review process. Submitting a paper to the conference means that if the paper were accepted, at least one author will register and attend the conference to present the paper.

4. For any difficulties and other issues regarding submission, please contact: turcais@163.com.

Acceptance
Manuscripts should present the current research in the areas identified in the call for papers. All submitted manuscripts will be reviewed by experts in the fields and will be judged from the aspects of problem significance, contributions, originality, correctness, technical strength, quality of presentation, and relevance to the conference attendees.

Publication
All accepted full papers will be entered into ACM Digital Library and the Engineering Index (EI).
All accepted short papers will be published in other journals.
Outstanding papers will be invited for possible publication in the following SCI-indexed journals:

  • International Journal of Sensor Networks
  • Journal of Real-Time Image Processing
  • Mathematical Biosciences and Engineering
  • Computers, Materials & Continua
  • IEEE Access
  • Journal of Information Security and Applications
  • Journal of Combinatorial Optimization
  • Mobile Networks and Applications

  • Important Date


    Paper Submission Due: March 25, 2019
    Notification of Acceptance: April 10, 2019
    Registration Due: April 18, 2019
    Camera-Ready Paper Due: April 25, 2019
    Conference Date: May 17-19, 2019

    Contact US


    ACM TURC Conference on Artificial Intelligence and Security
    URL: http://www.turcais.com
    Tel: +86-(25)-58731244
    e-mail: turcais@163.com
    TURC AIS WeChat Official Accounts: