IEEE TrustCom 会议(全称 IEEE International Conference on Trust, Security and Privacy in Computing and Communications)IEEE国际计算和通信信任,安全和隐私学术会议,是中国计算机学会推荐国际学术会议的C类(CCF-C)。2020年共收到465篇论文, 共录取了130篇论文,录取率为27.9%,录用论文标题如下:
TT - Trust Track
Xuewei Feng (National Key Laboratory of Science and Technology on Information System Security, China), Dongxia Wang (National Key Laboratory of Science and Technology on Information System Security, China), Zhechao Lin (National Key Laboratory of Science and Technology on Information System Security, China), Xiaohui Kuang (National Key Laboratory of Science and Technology on Information System Security, China), and Gang Zhao (National Key Laboratory of Science and Technology on Information System Security, China)
Xin Tang (University of International Relations, China), Linna Zhou (Beijing University of Posts and Telecommunications, China), Dan Liu (University of International Relations, China), Boyu Liu (University of International Relations, China), and Xinyi Lü (University of International Relations, China)
Dapeng Qu (Liaoning University, China), Jiankun Zhang (Liaoning University, China), Zhenhuan Hou (Liaoning University, China), Min Wang (Liaoning University, China), and Bo Dong (Liaoning University, China)
Jingbin Liu (TCA&SKLCS, Institute of Software, Chinese Academy of Sciences, China; University of Chinese Academy of Sciences, China), Yu Qin (TCA&SKLCS, Institute of Software, Chinese Academy of Sciences, China; University of Chinese Academy of Sciences, China), and Dengguo Feng (TCA&SKLCS, Institute of Software, Chinese Academy of Sciences, China; University of Chinese Academy of Sciences, China)
Young Choon Lee (Macquarie University, Australia), Jayden King (Macquarie University, Australia), Young Ki Kim (The University of Sydney, Australia), and Seok-Hee Hong (The University of Sydney, Australia)
Chengying Mao (Jiangxi University of Finance and Economics, China), Linlin Wen (Jiangxi University of Finance and Economics, China), and Tsong Yueh Chen (Swinburne University of Technology, Australia)
Wei Yang (Nanjing University of Science and Technology, China), Anmin Fu (Nanjing University of Science & Technology, China), Hailong Zhang (State Key Laboratory of Cryptology, China), and Chanying Huang (Nanjing University of Science & Technology, China)
Marcin Plata (Wrocław University of Science and Technology, Poland; Vestigit, Wrocław, Poland) and Piotr Syga (Wrocław University of Science and Technology, Poland; Vestigit, Wrocław, Poland)
Xuan Son Ha (FPT University, Vietnam), Hai Trieu Le (Can Tho University of Technology, Vietnam), Nadia Metoui (University of Amsterdam, Netherlands), and Nghia Duong-Trung (FPT University, Vietnam)
Ran Li (Shanghai Key Laboratory of Trustworthy Computing, East China Normal University, China), Jiaqi Yin (Shanghai Key Laboratory of Trustworthy Computing, East China Normal University, China), and Huibiao Zhu (Shanghai Key Laboratory of Trustworthy Computing, East China Normal University, China)
User-Controlled, Auditable, Cross-Jurisdiction Sharing of Healthcare Data Mediated by a Public Blockchain Xiaohu Zhou (Birmingham City University, UK), Vitor Jesus (Birmingham City University, UK), Yonghao Wang (Birmingham City University, UK), and Mark Josephs (Birmingham City University, UK)
Ming Liu (Shanghai Jiao Tong University, China), Zhi Xue (Shanghai Jiao Tong University, China), and Xiangjian (Sean) He (University of Technology Sydney, Australia)
Yanshul Sharma (IIIT Guwahati, India), Zinea Das (IIIT Guwahati, India), Alok Das (IIIT Guwahati, India), and Sanjay Moulik (IIIT Guwahati, India)
Yin Liu (Software Innovations Lab, Virginia Tech) and Eli Tilevich (Software Innovations Lab, Virginia Tech)
Wentao Xie (University of Chinese Academy of Sciences, China) and Peng Wu (University of Chinese Academy of Sciences, China)
Isaac Matthews (Newcastle University, U.K.), John Mace (Newcastle University, U.K.), Sadegh Soudjani (Newcastle University, U.K.), and Aad van Moorsel (Newcastle University, U.K.)
Qi Feng (Key Laboratory of Aerospace Information Security and Trusted Computing, Wuhan University, China), Debiao He (Key Laboratory of Aerospace Information Security and Trusted Computing, Wuhan University, China), Min Luo (Key Laboratory of Aerospace Information Security and Trusted Computing, Wuhan University, China), Zengxiang Li (Digital Research Institute, ENN Group, China), and Kim-Kwang Raymond Choo (University of Texas at San Antonio, China)
Roberto Dillon (James Cook University Singapore), Shailey Chawla (James Cook University Singapore), Dayana Hristova (Cognitive Science Hub, University of Vienna, Austria), Barbara Göbl (Research Group Entertainment Computing, University of Vienna, Austria), and Suzana Jovicic (University of Vienna, Austria)
Yu Ding (Institute of Information Engineering, Chinese Academy of Sciences; University of Chinese Academy of Sciences, China), ShuPeng Wang (Institute of Information Engineering, Chinese Academy of Sciences, China), Jian Xing (Institute of Information Engineering, Chinese Academy of Sciences; University of Chinese Academy of Sciences, China; National Computer Network Emergency Response Technical Team/Coordination Center of China Xinjiang Branch, China), XiaoYu Zhang (Institute of Information Engineering, Chinese Academy of Sciences, China), ZiSen Qi (Institute of Information Engineering, Chinese Academy of Sciences; University of Chinese Academy of Sciences, China), Ge Fu (National Computer Network Emergency Response Technical Team/Coordination Center of China, China), Qian Qiang (Institute of Information Engineering, Chinese Academy of Sciences; University of Chinese Academy of Sciences, China; National Computer Network Emergency Response Technical Team/Coordination Center of China, China), HaoLiang Sun (National Computer Network Emergency Response Technical Team/Coordination Center of China, China), and JianYu Zhang (Changan Communication Technology Co., LTD., China)
Ning Zhang (Institute of Information Engineering, CAS, China; University of Chinese Academy of Sciences, China), Zhiqiang Lv (Institute of Information Engineering, Chinese Academy of Sciences, China), Yanlin Zhang (University of Chinese Academy of Sciences, China), Haiyang Li (University of Chinese Academy of Sciences, China), Yixin Zhang (University of Chinese Academy of Sciences, China), and Weiqing Huang (Institute of Information Engineering, Chinese Academy of Sciences, China)
Munir Geden (University of Oxford, United Kingdom) and Kasper Rasmussen (University of Oxford, United Kingdom)
Ioana Boureanu (University of Surrey), Daniel Migault (Ericsson Security), Stere Preda (Ericsson Security), Hyame Assem Alamedine (Ericsson Security), Sanjay Mishra (Verizon), Frederic Fieau (Orange), and Mohammad Mannan (Concordia University)
Fang Li (Institute of Information Engineering, Chinese Academy of Sciences, China; University of Chinese Academy of Sciences, China), Ziyuan Zhu (Institute of Information Engineering, Chinese Academy of Sciences, China; University of Chinese Academy of Sciences, China), Chao Yan (Institute of Information Engineering, Chinese Academy of Sciences, China), Bowen Chen (Institute of Information Engineering, Chinese Academy of Sciences, China; University of Chinese Academy of Sciences, China), and Dan Meng (Institute of Information Engineering, Chinese Academy of Sciences, China)
Radu Ciucanu (INSA Centre Val de Loire, LIFO), Pascal Lafourcade (Univ. Clermont Auvergne, LIMOS), Marius Lombard-Platet (Univ. PSL, DIENS, Be-Studys), and Marta Soare (Univ. Orléans, LIFO)
Yannan Liu (Sangfor Technologies Inc.; Shenzhen Institutes of Advanced Technology, Chinese Academy of Sciences, China), Yabin Lai (Sangfor Technologies Inc.), Kaizhi Wei (Sangfor Technologies Inc.), Liang Gu (Sangfor Technologies Inc.), and Zhengzheng Yan (Shenzhen Institutes of Advanced Technology, Chinese Academy of Sciences, China)
Xuyang Ding (University of Electronic Science and Technology of China, China), Feng Xiao (Wuhan University, China), Man Zhou (Wuhan University, China), and Zhibo Wang (Wuhan University, China)
Oleg Schell (Bosch Engineering GmbH, Germany) and Marcel Kneib (Robert Bosch GmbH, Germany)
Peilun Wu (University of New South Wales, Sydney; Sangfor Technologies Inc.), Nour Moustafa (Australian Center for Cyber, University of New South Wales, Canberra), Shiyi Yang (University of New South Wales, Sydney), and Hui Guo (University of New South Wales, Sydney)
Guoqiang Yang (Shandong University, China), Fanyu Kong (Shandong University, China), and Qiuliang Xu (Shandong University, China)
Kemeng Wu (Institute of Information Engineering, Chinese Academy of Sciences, University of Chinese Academy of Sciences, China), Yongzheng Zhang (Institute of Information Engineering, Chinese Academy of Sciences, University of Chinese Academy of Sciences, China), and Tao Yin (Institute of Information Engineering, Chinese Academy of Sciences, University of Chinese Academy of Sciences, China)
Tianning Zhang (Nanjing University, China), Miao Cai (Nanjing University, China), Diming Zhang (Jiangsu University of Science and Technology, China), and Hao Huang (Nanjing University, China)
Rory Coulter (Swinburne University of Technology, Australia), Jun Zhang (Swinburne University of Technology, Australia), Lei Pan (Deakin University, Australia), and Yang Xiang (Swinburne University of Technology, Australia)
Changchun Yin (Nanjing University of Aeronautics and Astronautics, China), Hao Wang (Nanjing University of Aeronautics and Astronautics, China), Lu Zhou (Nanjing University of Aeronautics and Astronautics, China), and Liming Fang (Nanjing University of Aeronautics and Astronautics, China)
Chan Fan (Shanghai Key Laboratory of Trustworthy Computing, East China Normal University, China), Xiaolei Dong (Shanghai Key Laboratory of Trustworthy Computing, East China Normal University, China), Zhenfu Cao (Shanghai Key Laboratory of Trustworthy Computing, East China Normal University, China; Cyberspace Security Research Center, Peng Cheng Laboratory, Shenzhen and Shanghai Institute of Intelligent Science and Technology, Tongji University, China), and Jiachen Shen (Shanghai Key Laboratory of Trustworthy Computing, East China Normal University, China)
Xiaonan Song (Institute of Information Engineering, Chinese Academy of Sciences, China), Aimin Yu (Institute of Information Engineering, Chinese Academy of Sciences, China), Haibo Yu (Institute of Information Engineering, Chinese Academy of Sciences, China), Shirun Liu (Institute of Information Engineering, Chinese Academy of Sciences, China), Xin Bai (Institute of Information Engineering, Chinese Academy of Sciences, China), Lijun Cai (Institute of Information Engineering, Chinese Academy of Sciences, China), and Dan Meng (Institute of Information Engineering, Chinese Academy of Sciences, China)
Liu Liu (Swinburne University of Technology, Australia), Chao Chen (James Cook University, Australia), Jun Zhang (Swinburne University of Technology, Australia), Olivier De Vel (Defence Science and Technology Group, Australia), and Yang Xiang (Swinburne University of Technology, Australia)
Tiago Fernandes (CINAMIL, Academia Militar, Instituto Universitário Militar – Portugal; INESC-ID, Instituto Superior Técnico, Universidade de Lisboa – Portugal), Luis Dias (CINAMIL, Academia Militar, Instituto Universitário Militar – Portugal; INESC-ID, Instituto Superior Técnico, Universidade de Lisboa – Portugal), and Miguel Correia (INESC-ID, Instituto Superior Técnico, Universidade de Lisboa –Portugal)
Tianlin Huo (University of Chinese Academy of Sciences; Institute of Software, Chinese Academy of Sciences), Wenhao Wang (Institute of Information Engineering, Chinese Academy of Sciences), Pei Zhao (Institute of Software, Chinese Academy of Sciences), Yufeng Li (University of Chinese Academy of Sciences; Institute of Software, Chinese Academy of Sciences), Tingting Wang (University of Chinese Academy of Sciences; Institute of Information Engineering, Chinese Academy of Sciences), and Mingshu Li (Institute of Software, Chinese Academy of Sciences)
Benjamin Semal (Information Security Group, Royal Holloway University of London, United Kingdom), Konstantinos Markantonakis (Information Security Group, Royal Holloway University of London, United Kingdom), Keith Mayes (Information Security Group, Royal Holloway University of London, United Kingdom), and Jan Kalbantner (Information Security Group, Royal Holloway University of London, United Kingdom)
Jiajin Cai (Peking University, China), Tongxin Li (Peking University, China), Can Huang (Peking University, China), and Xinhui Han (Peking University, China)
Tiago Espinha Gasiba (Siemens AG, Germany), Ulrike Lechner (Universität der Bundeswehr München, Germany), Maria Pinto-Albuquerque(Instituto Universitário de Lisboa (ISCTE-IUL), ISTAR-IUL, Lisboa, Portugal), and Daniel Mendez Fernandez (Blekinge Institute of Technology, Karlskrona, Sweden)
Junaid Haseeb (Victoria University of Wellington, New Zealand), Masood Mansoori (Victoria University of Wellington, New Zealand), Harith Al-Sahaf (Victoria University of Wellington, New Zealand), and Ian Welch (Victoria University of Wellington, New Zealand)
Hoang Hai Nguyen (Information Trust Institute, University of Illinois at Urbana-Champaign) and David M. Nicol (Information Trust Institute, University of Illinois at Urbana-Champaign)
Xueying Han (Institute of Information Engineering, Chinese Academy of Sciences, China; University of Chinese Academy of Sciences, China), Rongchao Yin (China Academy of Industrial Internet, China), Zhigang Lu (Institute of Information Engineering, Chinese Academy of Sciences, China; University of Chinese Academy of Sciences, China), Bo Jiang (Institute of Information Engineering, Chinese Academy of Sciences, China; University of Chinese Academy of Sciences, China), Yuling Liu (Institute of Information Engineering, Chinese Academy of Sciences, China; University of Chinese Academy of Sciences, China), Song Liu (Institute of Information Engineering, Chinese Academy of Sciences, China; University of Chinese Academy of Sciences, China), Chonghua Wang (China Industrial Control Systems Cyber Emergency Response Team, China), and Ning Li (Institute of Information Engineering, Chinese Academy of Sciences, China; University of Chinese Academy of Sciences, China)
Xiaohui Wu (Institute of Software Chinese Academy of Sciences, China), Yeping He (Institute of Software Chinese Academy of Sciences, China), Qiming Zhou (Institute of Software Chinese Academy of Sciences, China), Hengtai Ma (Institute of Software Chinese Academy of Sciences, China), Liang He (Institute of Software Chinese Academy of Sciences, China), Wenhao Wang (Institute of Information Engineering Chinese Academy of Sciences, China), and Liheng Chen (Institute of Software Chinese Academy of Sciences, China)
Guga Suri (Wuhan University, China), Jianming Fu (Wuhan University, China), Rui Zheng (Wuhan University, China), and Xinying Liu (China Merchants Financia, China)
Muhammad Rizwan Asghar (The University of Auckland, New Zealand), Steven Galbraith (The University of Auckland, New Zealand), Andrea Lanzi (Universita degli studi di Milano, Italy), Giovanni Russello (The University of Auckland, New Zealand), and Lukas Zobernig (The University of Auckland, New Zealand)
Meng Li (Wuhan University of Technology, Wuhan, China), Qi Zhong (Deakin University, Geelong, Australia), Leo Yu Zhang (Deakin University, Geelong, Australia), Yajuan Du (Wuhan University of Technology, Wuhan, China), Jun Zhang (Swinburne University of Technology, Melbourne, Australia), and Yong Xiang (Deakin University, Geelong, Australia)
Johannes Lauinger (Technische Universität Darmstadt, Germany), Lars Baumgärtner (Technische Universität Darmstadt, Germany), Anna-Katharina Wickert (Technische Universität Darmstadt, Germany), and Mira Mezini (Technische Universität Darmstadt, Germany)
Yuzong Hu (Shanghai Jiao Tong University, China), Futai Zou (Shanghai Jiao Tong University, China), Linsen Li (Shanghai Jiao Tong University, China), and Ping Yi (Shanghai Jiao Tong University, China)
Dong Qin (Iowa State University, USA), Shen Fu (Iowa State University, USA), George Amariucai (Kansas State University, USA), Daji Qiao (Iowa State University, USA), and Yong Guan (Iowa State University, USA)
Yu Fu (University of Chinese Academy of Sciences; TCA Lab, Institute of Software Chinese Academy of Sciences), Siming Tong (University of Chinese Academy of Sciences; TCA Lab, Institute of Software Chinese Academy of Sciences), Xiangyu Guo (Beijing University of Posts and Telecommunications), Liang Cheng (TCA Lab, Institute of Software Chinese Academy of Sciences), Yang Zhang (TCA Lab, Institute of Software Chinese Academy of Sciences), and Dengguo Feng (TCA Lab, Institute of Software Chinese Academy of Sciences)
Joe Samuel (Systems and Computer Engineering, Carleton University, Canada), Khalil Aalab (Systems and Computer Engineering, Carleton University, Canada), and Jason Jaskolka (Systems and Computer Engineering, Carleton University, Canada)
Yi Li (Tsinghua university, China; Cyberspace Security Research Center, Peng Cheng Laboratory, China), Xi Xiao (Cyberspace Security Research Center, Peng Cheng Laboratory, China), Xiaogang Zhu (Cyberspace Security Research Center, Peng Cheng Laboratory, China), Xiao Chen (Faculty of Information Technology, Monash University, Melbourne, Australia), Sheng Wen (Tsinghua university, China; Cyberspace Security Research Center, Peng Cheng Laboratory, China), and Bin Zhang (Tsinghua university, China; Cyberspace Security Research Center, Peng Cheng Laboratory, China)
Lars Baumgärtner (Technische Universität Darmstadt, Germany), Alexandra Dmitrienko (Julius-Maximilians-Universität Würzburg, Germany), Bernd Freisleben (Philipps-Universität Marburg, Germany), Alexander Gruler (Technische Universität Darmstadt, Germany), Jonas Höchst (Technische Universität Darmstadt, Germany; Philipps-Universität Marburg, Germany), Joshua Kühlberg (Technische Universität Darmstadt, Germany), Mira Mezini (Technische Universität Darmstadt, Germany), Richard Mitev (Technische Universität Darmstadt, Germany), Markus Miettinen (Technische Universität Darmstadt, Germany), Anel Muhamedagic (Technische Universität Darmstadt, Germany), Thien Duc Nguyen (Technische Universität Darmstadt, Germany), Alvar Penning (Philipps-Universität Marburg, Germany), Dermot Pustelnik (Technische Universität Darmstadt, Germany), Filipp Roos (Julius-Maximilians-Universität Würzburg, Germany), Ahmad-Reza Sadeghi (Technische Universität Darmstadt, Germany), Michael Schwarz (Philipps-Universität Marburg, Germany), and Christian Uhl Philipps-Universität Marburg, Germany)
Mingkai Tong (NSFOCUS Technologies Group Co., Ltd., China), Guo Li Tsinghua University, China), Runzi Zhang (NSFOCUS Technologies Group Co., Ltd., China; Tsinghua University, China), Jianxin Xue (NSFOCUS Technologies Group Co., Ltd., China; Tsinghua University, China), Wenmao Liu (NSFOCUS Technologies Group Co., Ltd., China), and Jiahai Yang (Tsinghua University, China)
Minghui Li (Nanjing University of Aeronautics and Astronautics, China), Yang Li (Nanjing University of Aeronautics and Astronautics, China), and Liming Fang (Nanjing University of Aeronautics and Astronautics, China)
Jordan Stobbs (Northumbria University, UK), Biju Issac (Northumbria University, UK), and Seibu Mary Jacob (Teesside University, UK)
-Asset-Oriented Threat Modeling
Nan Messe (IRISA, France), Vanea Chiprianov (DiverSE, IRISA, France), Nicolas Belloir (DiverSE, IRISA, France), Jamal El-Hachem (DiverSE, IRISA, France), Régis Fleurquin (DiverSE, IRISA, France), and Salah Sadou (DiverSE, IRISA, France)
Yipeng Zhang (Beihang University, China), Zhonghao Sun (CNCERT/CC, China), Liqun Yang (Beihang University, China), Zhoujun Li (Beihang University, China), Qiang Zeng (University of South Carolina, China), Yueying He (CNCERT/CC, China), and Xiaoming Zhang (CNCERT/CC, China)
Haoqi Wu (Laboratory for Data Analytics and Security, Fudan University, China), Zhengxuan Yu (Laboratory for Data Analytics and Security, Fudan University, China), Dapeng Huang (Laboratory for Data Analytics and Security, Fudan University, China), Haodong Zhang Laboratory for Data Analytics and Security, Fudan University, China), and Weili Han (Laboratory for Data Analytics and Security, Fudan University, China)
Chengqian Guo (Institute of Information Engineering, Chinese Academy of Sciences, China; Data Assurance and Communication Security Research Center, CAS; University of Chinese Academy of Sciences), Quanwei Cai Institute of Information Engineering, Chinese Academy of Sciences, China; Data Assurance and Communication Security Research Center, CAS; University of Chinese Academy of Sciences), Qiongxiao Wang (Institute of Information Engineering, Chinese Academy of Sciences, China; Data Assurance and Communication Security Research Center, CAS; University of Chinese Academy of Sciences), and Jingqiang Lin (University of Science and Technology of China, China)
BHDA - A Blockchain-Based Hierarchical Data Access Model for Financial Services
Zhiyu Xu (Swinburne University of Technology, Australia), Lin Yang Swinburne University of Technology, Australia), Ziyuan Wang Swinburne University of Technology, Australia), Sheng Wen (Pengcheng Lab, China), Rob Hanson (The Commonwealth Scientific and Industrial Research Organisation, Australia), Shiping Chen (The Commonwealth Scientific and Industrial Research Organisation, Australia), and Yang Xiang (Swinburne University of Technology, Australia)
FTCLNet: Convolutional LSTM with Fourier Transform for Vulnerability Detection
Defu Cao (Peking University, China), Jing Huang (Peking University, China), Xuanyu Zhang (Beijing Normal University, China), and Xianhua Liu (Peking University, China)
Luqi Zhu (Computer Science and Technology, Soochow University, China),Jin Wang (Computer Science and Technology, Soochow University, China),Lianmin Shi (Computer Science and Technology, Soochow University, China), Jingya Zhou (Computer Science and Technology, Soochow University, China), Kejie Lu (Computer Science and Engineering, University of Puerto Rico at Mayagüez, Puerto Rico), and Jianping Wang Computer Science, City University of Hong Kong, China)
Junaid Haseeb (Victoria University of Wellington, New Zealand), Masood Mansoori (Victoria University of Wellington, New Zealand), and Ian Welch (Victoria University of Wellington, New Zealand)
Tengfei Li (Shanghai Key Laboratory of Trustworthy Computing, East China Normal University, China), Xiaohong Chen (Shanghai Key Laboratory of Trustworthy Computing, East China Normal University, China), Haiying Sun (Shanghai Key Laboratory of Trustworthy Computing, East China Normal University, China), Jing Liu (Shanghai Key Laboratory of Trustworthy Computing, East China Normal University, China), Jiajia Yang (Shanghai Key Laboratory of Trustworthy Computing, East China Normal University, China), Chenchen Yang (Shanghai Key Laboratory of Trustworthy Computing, East China Normal University, China), and Junfeng Sun (Casco Signal Ctd., China)
Tianyi Zhang (Nanjing University of Aeronautics and Astronautics) and Jian Wang (Nanjing University of Aeronautics and Astronautics)
Xuren Wang (Capital Normal University, China), Mengbo Xiong (Capital Normal University, China), Yali Luo (Institute of Information Engineering, Chinese Academy of Sciences, University of Chinese Academy of Sciences, China), Ning Li (Institute of Information Engineering, Chinese Academy of Sciences, University of Chinese Academy of Sciences, China), Zhengwei Jiang (Institute of Information Engineering, Chinese Academy of Sciences, University of Chinese Academy of Sciences, China), and Zihan Xiong (Capital Normal University, China)
Francis Onodueze (Bowie State University, USA) and Darsana Josyula Bowie State University, USA)
Meng Li (Hefei University of Technology, China), Jianbo Gao (Hefei University of Technology, China), Yifei Chen (Hefei University of Technology, China), Jingcheng Zhao (Hefei University of Technology, China), and Mamoun Alazab (Charles Darwin University, Australia)
Eduardo Gomes (INESC-ID / Instituto Superior Técnico, Universidade de Lisboa, Portugal), Igor Zavalyshyn (INESC-ID / Instituto Superior Técnico, Universidade de Lisboa, Portugal; UCLouvain, ICTEAM, Louvain-la-Neuve, Belgium), Nuno Santos (INESC-ID / Instituto Superior Técnico, Universidade de Lisboa, Portugal), João Silva (INESC-ID / Instituto Superior Técnico, Universidade de Lisboa, Portugal), and Axel Legay (UCLouvain, ICTEAM, Louvain-la-Neuve, Belgium)
Chen Tian (Institute of Information Engineering, Chinese Academy of Sciences), Yazhe Wang (Institute of Information Engineering, Chinese Academy of Sciences), Peng Liu (Pennsylvania State University), Yu Wang (Institute of Information Engineering, Chinese Academy of Sciences), Ruirui Dai (Institute of Information Engineering, Chinese Academy of Sciences), Anyuan Zhou (Institute of Information Engineering, Chinese Academy of Sciences), and Zhen Xu (Institute of Information Engineering, Chinese Academy of Sciences)
Wen Huang (University of Electronic Science and Technology of China, China), Shijie Zhou (University of Electronic Science and Technology of China, China), Tianqing Zhu (University of Technology Sydney, China), Yongjian Liao (University of Electronic Science and Technology of China, China), Chunjiang Wu (University of Electronic Science and Technology of China, China), and Shilin Qiu (University of Electronic Science and Technology of China, China)
De Li (Guangxi Key Lab of Multi-source Information Mining & Security, Guangxi Normal University, China), Jinyan Wang (Guangxi Key Lab of Multi-source Information Mining & Security, Guangxi Normal University, China), Zhou Tan (Guangxi Key Lab of Multi-source Information Mining & Security, Guangxi Normal University, China), Xianxian Li (Guangxi Key Lab of Multi-source Information Mining & Security, Guangxi Normal University, China), and Yuhang Hu (Guangxi Key Lab of Multi-source Information Mining & Security, Guangxi Normal University, China)
Zhihao Zheng (Shanghai Key Laboratory of Trustworthy Computing, East China Normal University, China), Zhenfu Cao (Shanghai Key Laboratory of Trustworthy Computing, East China Normal University, China; Cyberspace Security Research Center, Peng Cheng Laboratory, Shenzhen and Shanghai Institute of Intelligent Science and Technology, Tongji University, China), and Jiachen Shen (Shanghai Key Laboratory of Trustworthy Computing, East China Normal University, China)
Hugo Sbaï (University of Oxford, UK), Jassim Happa (Royal Holloway, University of London, UK), Michael Goldsmith (University of Oxford, UK), and Samy Meftali (Université de Lille 1, France)
Shiwei Xu (Huazhong Agricultural University, China), Xiaowen Cai Huazhong Agricultural University, China), Yizhi Zhao (Huazhong Agricultural University, China), Zhengwei Ren (Wuhan University of Science and Technology, China), Lingjuan Wu (Huazhong Agricultural University, China), Huanguo Zhang (Wuhan University, China), Le Du Wuhan Donghu Big Data Trading Center Co. Ltd., China), and Yan Tong Huazhong Agricultural University, China)
Navoda Senavirathne (University of Skövde, Sweden) and Vicenç Torra University of Umeå, Sweden)
Thomas Cory (Technische Universität Berlin, Germany), Philip Raschke Technische Universität Berlin, Germany), and Axel Küpper (Technische Universität Berlin, Germany)
Tianyuan Liu (University of Illinois at Urbana-Champaign), Hongpeng Guo (University of Illinois at Urbana-Champaign), Claudiu Danilov Boeing Research & Technology), and Klara Nahrstedt (University of Illinois at Urbana-Champaign)
Mina Sheikhalishahi (Eindhoven University of Technology, Netherlands) and Nicola Zannone (Eindhoven University of Technology, Netherlands)
Muqian Chen (Institute of Information Engineering, Chinese Academy of Sciences; University of Chinese Academy of Sciences), Xuebin Wang Institute of Information Engineering, Chinese Academy of Sciences; University of Chinese Academy of Sciences), Jinqiao Shi (Beijing University of Posts and Telecommunications; Institute of Information Engineering, Chinese Academy of Sciences), Can Zhao (Institute of Information Engineering, Chinese Academy of Sciences; University of Chinese Academy of Sciences), Meiqi Wang (Institute of Information Engineering, Chinese Academy of Sciences; University of Chinese Academy of Sciences), and Binxing Fang (Institute of Information Engineering, Chinese Academy of Sciences; Electronic and Information Engineering of UESTC in Guangdong)
Linpeng Lu (Shanghai JiaoTong University, China) and Ning Ding Shanghai Jiao Tong University, China)
Fucheng Liu (Institute of Information Engineering, Chinese Academy of Sciences, China; University of Chinese Academy of Sciences, China), Yu Wen (Institute of Information Engineering, Chinese Academy of Sciences, China), Yanna Wu (Institute of Information Engineering, Chinese Academy of Sciences, China; University of Chinese Academy of Sciences, China), Shuangshuang Liang (Institute of Information Engineering, Chinese Academy of Sciences, China; University of Chinese Academy of Sciences, China), Xihe Jiang (Institute of Information Engineering, Chinese Academy of Sciences, China; University of Chinese Academy of Sciences, China), and Dan Meng (Institute of Information Engineering, Chinese Academy of Sciences, China)
Nour Moustafa (University of New South Wales, Canberra, Australia),Mohiuddin Ahmedy (Edith Cowan University, Perth, Australia), and Sherif Ahmed (University of Windsor, Windsor, Canada)
Runzi Zhang (NSFOCUS Technologies Group Co., Ltd., China; Tsinghua University, China), MingKai Tong (NSFOCUS Technologies Group Co., Ltd., China), Lei Chen (NSFOCUS Technologies Group Co., Ltd., China; Tsinghua University, China), Jianxin Xue (NSFOCUS Technologies Group Co., Ltd., China; Tsinghua University, China), Wenmao Liu (NSFOCUS Technologies Group Co., Ltd., China), and Feng Xie (Harbin Engineering University, China)
Xiaojian Li (Guangxi Normal University, China), Bo Li (Guangxi Normal University, China), Hailan Wang (Guangxi Normal University, China),Jiajia Zhang (Guangxi Normal University, China), Haopeng Yang (Guangxi Normal University, China), and Jingang Liu (Beihang University, China)
Lida Ketsbaia (Northumbria University, UK), Biju Issac (Northumbria University, UK), and Xiaomin Chen (Northumbria University, UK)
Jack Hance (North Dakota State University, USA) and Jeremy Straub Institute for Cyber Security Education and Research, North Dakota State University, USA)
Adnan Anwar (Deakin University, Australia) and S. M. Abu Adnan Abir IGW Operators Forum (IOF), Bangladesh)
Yen-Ting Lee (National Taiwan University of Science and Technology, Taiwan), Tao Ban (National Institute of Information and Communications Technology, Japan), Tzu-Ling Wan (National Taiwan University of Science and Technology, Taiwan), Shin-Ming Cheng (National Taiwan University of Science and Technology, Taiwan; Academia Sinica, Taiwan), Ryoichi Isawa (National Institute of Information and Communications Technology, Japan), Takeshi Takahashi (National Institute of Information and Communications Technology, Japan), and Daisuke Inoue (National Institute of Information and Communications Technology, Japan)
Yuqing Pan (University of International Business and Economics, China; Tsinghua University, China), Xi Xiao (Tsinghua University, China; Peng Cheng Laboratory, China), Guangwu Hu (Shenzhen Institute of Information Technology, China), Bin Zhang (Peng Cheng Laboratory, China), Qing Li (Peng Cheng Laboratory, China; Southern University of Science and Technology, China), and Haitao Zheng (Tsinghua University, China)
Behzad Asadi (The University of Newcastle, Australia) and Vijay Varadharajan (The University of Newcastle, Australia)
Matthew J. Ryan (Deakin University, Australia), Morshed Chowdhury Deakin University, Australia), Frank Jiang (Deakin University, Australia), and Robin Ram Doss (Deakin University, Australia)
Paul Black (Federation University, Australia), Iqbal Gondal Federation University, Australia), Peter Vamplew (Federation University, Australia), and Arun Lakhotia (University of Louisiana at Lafayette, USA)
Yunan Zhang (Guangdong Provincial Key Laboratory of Power System Network Security, Electric Power Research Institute, CSG, China),Aidong Xu Xu (Guangdong Provincial Key Laboratory of Power System Network Security, Electric Power Research Institute, CSG, China), and Yixin Jiang (Guangdong Provincial Key Laboratory of Power System Network Security, Electric Power Research Institute, CSG, China)
Taejun Choi (The University of Queensland, Australia), Guangdong Bai The University of Queensland, Australia), Ryan K L Ko (The University of Queensland, Australia), Naipeng Dong (The University of Queensland, Australia), Wenlu Zhang (The University of Queensland, Australia), and Shunyao Wang (The University of Queensland, Australia)
Shinelle Hutchinson (Purdue University, West Lafayette, IN), Neesha Shantaram (Purdue University, West Lafayette, IN), and Umit Karabiyik Purdue University, West Lafayette, IN)
Nour Moustafa (University of New South Wales Canberra, Australia),Marwa Keshky (University of New South Wales Canberra, Australia),Essam Debiez (University of New South Wales Canberra, Australia), and Helge Janicke (Cyber Security Cooperative Research Centre, Edith Cowan University, Australia)
Sara Salim (University of New South Wales, Australia), Nour Moustafa University of New South Wales, Australia), and Benjamin Turnbull University of New South Wales, Australia)
Mengxiang wan (Wuhan University of Technology, China), Hanbing Yao Wuhan University of Technology, China; Hubei Key Laboratory of Transportation Internet of Things, China), and Xin Yan (Wuhan University of Technology, China; Hubei Key Laboratory of Transportation Internet of Things, China)
Dali Zhu (Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China; University of Chinese Academy of Sciences, Beijing, China), Yuchen Ma (Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China; University of Chinese Academy of Sciences, Beijing, China), and Yinlong Liu (Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China; University of Chinese Academy of Sciences, Beijing, China)
Lei Xu (University of Texas Rio Grande Valley, US), Lin Chen (Texas Tech University, US), Zhimin Gao (Auburn University at Montgomery, US), Hanyee Kim (Korea University, Korea), Taeweon Suh (Korea University, Korea), and Weidong Shi (University of Houston, US)
Handong Cui (The University of Hong Kong, Hong Kong) and Tsz Hon Yuen The University of Hong Kong, Hong Kong)
Shunsheng Zhang (Guangxi Normal University, China), Yuling Luo Guangxi Normal University, China; Guangxi Key Lab of Multi-source Information Mining & Security, Guangxi Normal University, China),Lvchen Cao (Guangxi Normal University, China), and Junxiu Liu (Guangxi Normal University, China)
Giulio Zizzo (Institute for Security Science and Technology; Department of Computing), Chris Hankin (Institute for Security Science and Technology; Department of Computing), Sergio Maffeis (Department of Computing), and Kevin Jones (Airbus)
Alban Siffer (Amossys, Univ. Rennes, CNRS, IRISA), Pierre-Alain Fouque Univ. Rennes, CNRS, IRISA), Alexandre Termier (Univ. Rennes, Inria, CNRS, IRISA), and Christine Largouet (AgroCampus Ouest, Inria, CNRS, IRISA)
Zhongkai Tong (Institute of Information Engineering, Chinese Academy of Sciences, China; University of Chinese Academy of Sciences, China),Ziyuan Zhu (Institute of Information Engineering, Chinese Academy of Sciences, China; University of Chinese Academy of Sciences, China),Zhanpeng Wang (Institute of Information Engineering, Chinese Academy of Sciences, China; University of Chinese Academy of Sciences, China),Limin Wang (Institute of Information Engineering, Chinese Academy of Sciences, China; University of Chinese Academy of Sciences, China),Yusha Zhang (Institute of Information Engineering, Chinese Academy of Sciences, China; University of Chinese Academy of Sciences, China),and Yuxin Liu (Institute of Information Engineering, Chinese Academy of Sciences, China; University of Chinese Academy of Sciences, China)
Xiaohui Hu (Institute of Information Engineering, Chinese Academy of Sciences; University of Chinese Academy of Science, China), Rui Sun Institute of Information Engineering, Chinese Academy of Sciences; University of Chinese Academy of Science, China), Kejia Xu (Institute of Information Engineering, Chinese Academy of Sciences; University of Chinese Academy of Science, China), Yongzheng Zhang (Institute of Information Engineering, Chinese Academy of Sciences; University of Chinese Academy of Science, China), and Peng Chang (Institute of Information Engineering, Chinese Academy of Sciences; University of Chinese Academy of Science, China)
Paul Walther (Chair for Privacy and Security, TU Dresden, Germany) and Thorsten Strufe (Karlsruhe Institute of Technology (KIT) and Centre for Tactile Internet, TU Dresden (CeTI))
Enzo Tartaglione (University of Torino, Italy) and Marco Grangetto University of Torino, Italy) Security and Privacy
Amjad Qashlan (University of Technology Sydney(UTS), Australia),Priyadarsi Nanda (University of Technology Sydney (UTS), Australia),and Xiangjian He (University of Technology Sydney(UTS), Australia)
Rahma Mukta (University of New South Wales (UNSW Sydney), Sydney),James Martens (University of New South Wales (UNSW Sydney), Sydney),Hye-young Paik (University of New South Wales (UNSW Sydney), Sydney),Qinghua Lu (Data61, CSIRO, Sydney), and Salil S. Kanhere (University of New South Wales (UNSW Sydney), Sydney)
Wenjun Fan (University of Colorado Colorado Springs, United States),Younghee Park (San Jose State University, United States), Shubham Kumar (San Jose State University, United States), Priyatham Ganta (San Jose State University, United States), Xiaobo Zhou (University of Colorado Colorado Springs, United States), and Sang-Yoon Chang University of Colorado Colorado Springs, United States)
Mingfu Xue (Collaborative Innovation Center of Novel Software Technology and Industrialization, China; Nanjing University of Aeronautics and Astronautics, China), Zhiyu Wu (Nanjing University of Aeronautics and Astronautics, China), Can He (Collaborative Innovation Center of Novel Software Technology and Industrialization, China; Nanjing University of Aeronautics and Astronautics, China), Jian Wang Collaborative Innovation Center of Novel Software Technology and Industrialization, China; Nanjing University of Aeronautics and Astronautics, China), and Weiqiang Liu (Nanjing University of Aeronautics and Astronautics, China)
Zhanpeng Wang (Institute of Information Engineering, Chinese Academy of Sciences, China; University of Chinese Academy of Sciences, China),Ziyuan Zhu (Institute of Information Engineering, Chinese Academy of Sciences, China; University of Chinese Academy of Sciences, China),Limin Wang (Institute of Information Engineering, Chinese Academy of Sciences, China; University of Chinese Academy of Sciences, China),Zhongkai Tong (Institute of Information Engineering, Chinese Academy of Sciences, China; University of Chinese Academy of Sciences, China),and Chao Yan (Institute of Information Engineering, Chinese Academy of Sciences, China)
Zhujun Zhang (Institute of Information Engineering, Chinese Academy of Sciences, University of Chinese Academy of Sciences, China), Dali Zhu Institute of Information Engineering, Chinese Academy of Sciences, China), and Wei Fan (Institute of Information Engineering, Chinese Academy of Sciences, China)
Kilian Becher (Chair of Privacy and Data Security, TU Dresden, Germany), J. A. Gregor Lagodzinski (Hasso Plattner Institute, University of Potsdam, Germany), and Thorsten Strufe (Chair of IT Security, Karlsruhe Institute of Technology, Germany)
Zhuo Li (Computer Network Information Center, Chinese Academy of Sciences, China; University of Chinese Academy of Sciences, China), Xu Zhou (Computer Network Information Center, Chinese Academy of Sciences, China), Yang Liu (Beijing Normal University, China),Congshan Fan (Computer Network Information Center, Chinese Academy of Sciences, China), and Wei Wang (Knet Technologies Co. Ltd., China)
Yizhong Liu (Beihang University, China), Jianwei Liu (Beihang University, China), Yiming Hei (Beihang University, China), Wei Tan Xidian University, China), and Qianhong Wu (Beihang University, China)
Andreas Abraham (Institute of Applied Information Processing and Communications (IAIK), Graz University of Technology, Graz, Austria),Stefan More (Institute of Applied Information Processing and Communications (IAIK), Graz University of Technology, Graz, Austria),Christof Rabensteiner (Institute of Applied Information Processing and Communications (IAIK), Graz University of Technology, Graz, Austria),and Felix Hörandner (Institute of Applied Information Processing and Communications (IAIK), Graz University of Technology, Graz, Austria)
Lei Xu (University of Texas Rio Grande Valley, USA), Zhimin Gao Auburn University at Montgomery, USA), Xinxin Fan (IoTeX, USA), Li Chen (Texas Tech University, USA), Hanyee Kim (Korea University, Korea), Taeweon Suh (Korea University, Korea), and Weidong Shi University of Houston, USA)
Subhra Mazumdar (Cryptology and Security Research Unit, Indian Statistical Institute, India), Prabal Banerjee (Cryptology and Security Research Unit, Indian Statistical Institute, India), and Sushmita Ruj (CSIRO, Data61, Australia; Cryptology and Security Research Unit, Indian Statistical Institute, India)
Przemysław Kubiak (Wrocław University of Science and Technology, Wrocław, Poland) and Mirosław Kutyłowski (Wrocław University of Science and Technology)
Ting Su (National University of Defense Technology, China), Jiahe Shi National University of Defense Technology, China), Yongkang Tang National University of Defense Technology, China), and Shaoqing Li National University of Defense Technology, China)
Rohan Dahiya (Deakin University, Australia), Frank Jiang (Deakin University, Australia), and Robin Ram Doss (Deakin University, Australia)
Md. Atik Shahriar (Shahjalal University of Science & Technology, Bangladesh), Faisal Haque Bappy (Shahjalal University of Science and Technology, Bangladesh), A. K. M. Fakhrul Hossain (Shahjalal University of Science and Technology, Bangladesh), Dayamoy Datta Saikat (Shahjalal University of Science and Technology, Bangladesh),Md Sadek Ferdous (Shahjalal University of Science and Technology, Bangladesh; Imperial College London, UK), Mohammad Jabed M. Chowdhury La Trobe University, Australia), and Md Zakirul Alam Bhuiyan (Fordham University, USA)
Md. Saiful Islam Bhuiyan (Shahjalal University of Science and Technology, Bangladesh), Abdur Razzak (Shahjalal University of Science and Technology, Bangladesh), Md Sadek Ferdous (Shahjalal University of Science and Technology, Bangladesh; Imperial College London, United Kingdom), Mohammad Jabed M. Chowdhury (La Trobe University, Australia), Mohammad A. Hoque (University of Helsinki, Finland), and Sasu Tarkoma (University of Helsinki, Finland)
Harsh Dhillon (Western University, Canada) and Anwar Haque (Western University, Canada)
会议地址:
http://ieee-trustcom.org/TrustCom2020/