You are Welcome to Attend all 10+ Keynote Speeches Shared by co-located conferences (iSCI 2019 and DependSys 2019) and associated symposiums, workshops and special sessions (TrustData, AEIT, IWCSS, Blockchain, NOPE, INSERT-IoT, BDSC-IoT, FogCom, ITSC, EAIC, CNC, etc)!


Keynote Speaker 1: Prof. Geoffrey Fox, Indiana University, USA (Fellow of APS (Physics) and Fellow of ACM (Computing))
Title TBD

Keynote Speaker 2: Prof. Jie Wu, Temple University, USA (IEEE Fellow)
TitleCyber Security Defense: From Moving Target Defense to Cyber Deception.

Keynote Speaker 3: Prof. Jiannong Cao, The Hong Kong Polytechnic University, Hong Kong (IEEE Fellow)
Title TBD

Keynote Speaker 4: Prof. Sy-Yen Kuo, National Taiwan University (NTU), Taipei, Taiwan (IEEE Fellow)National Taiwan University (NTU), Taipei, Taiwan (IEEE Fellow)
Title Security Testing Automation in the Era of AIoT.

Keynote Speaker 5: Prof. Minyi Guo, Shanghai Jiao Tong University, China (IEEE Fellow)
Title TBD.

Keynote Speaker 6: Prof. Weijia Jia, University of Macau and Shanghai Jiao Tong University, China
Title AI Tech Circle for Smart City.

Keynote Speaker 7: Prof. Wanlei Zhou, University of Technology Sydney (UTS), Australia
Title AI Security: Impact and Applications.

Keynote Speaker 8: Prof. Richard Hill, University of Huddersfield, UK (IET Fellow)
Title Realising Smart Manufacturing with the Industrial Internet of Things .

Keynote Speaker 9: Prof. Frank Hsu, Fordham University, USA
Title TBD.

Keynote Speaker 10: Prof. Kim-Kwang Raymond Choo, The University of Texas at San Antonio (UTSA), USA
Title Cyber security threat and forensic intelligence: Challenges and opportunities.


Detailed Information about Keynote Speeches


Keynote Speaker 2: Prof. Jie Wu, Temple University, USA (IEEE Fellow)
Title: Cyber Security Defense: From Moving Target Defense to Cyber Deception

Abstract: Deception technology is an emerging field of cyber security defense. Products from deception technology can detect, analyze, and defend against zero-day and advanced attacks. The talk starts with the discussion of some unique challenges with cyber deception, as compared with some other deception technology such as in military. We then focus on moving target defense with a couple of examples and some recent results. Finally, we discuss several future directions of cyber deception research with a focus on game and theoretical models.

Prof. Jie Wu is the Director of the Center for Networked Computing and Laura H. Carnell professor at Temple University. He also serves as the Director of International Affairs at College of Science and Technology. He served as Chair of Department of Computer and Information Sciences from the summer of 2009 to the summer of 2016 and Associate Vice Provost for International Affairs from the fall of 2015 to the summer of 2017. Prior to joining Temple University, he was a program director at the National Science Foundation and was a distinguished professor at Florida Atlantic University. His current research interests include mobile computing and wireless networks, routing protocols, cloud and green computing, network trust and security, and social network applications. Dr. Wu regularly publishes in scholarly journals, conference proceedings, and books. He serves on several editorial boards, including IEEE Transactions on Mobile Computing, IEEE Transactions on Service Computing, Journal of Parallel and Distributed Computing, and Journal of Computer Science and Technology. Dr. Wu was general co-chair for IEEE MASS 2006, IEEE IPDPS 2008, IEEE ICDCS 2013, ACM MobiHoc 2014, ICPP 2016, and IEEE CNS 2016, as well as program cochair for IEEE INFOCOM 2011 and CCF CNCC 2013. He was an IEEE Computer Society Distinguished Visitor, ACM Distinguished Speaker, and chair for the IEEE Technical Committee on Distributed Processing (TCDP). Dr. Wu is a Fellow of the AAAS and a Fellow of the IEEE. He is the recipient of the 2011 China Computer Federation (CCF) Overseas Outstanding Achievement Award.

Top


Keynote Speaker 4: Prof. Sy-Yen Kuo, National Taiwan University (NTU), Taiwan (IEEE Fellow)
Title: Security Testing Automation in the Era of AIoT

Abstract: The convergence of Artificial Intelligence (AI) and Internet of Things (IoT) technologies to AIoT applications, e.g., Smart Speaker, Drones and Autonomous Car, that solve a wide range of problems in industry innovation. The complexity of AIoT applications intensifies the severity of security threats. Thus, government agencies and organizations have developed security guidelines and testing standards to enhance the security quality of IoT products. However, the security of AI still needs to be addressed. In this talk, we'll introduce current security testing automation in IoT applications. Moreover, the AI adversarial attacks which could lead AI making wrong decisions will also be mentioned..

Sy-Yen Kuo is the Pegatron Chair Professor at the Department of Electrical Engineering, National Taiwan University (NTU), Taipei, Taiwan. He was the Dean of College of Electrical Engineering and Computer Science in NTU from 2012 to 2015 and the Chairman of Department of Electrical Engineering in NTU from 2001 to 2004. He also took a leave from NTU and served as a Chair Professor and Dean of the College of Electrical Engineering and Computer Science, National Taiwan University of Science and Technology from 2006 to 2009. He received the BS (1979) in Electrical Engineering from National Taiwan University, the MS (1982) in Electrical & Computer Engineering from the University of California at Santa Barbara, and the PhD (1987) in Computer Science from the University of Illinois at Urbana-Champaign (UIUC). He spent his sabbatical years as a Visiting Professor at Hong Kong Polytechnic University from 2011-2012 and at the Chinese University of Hong Kong from 2004-2005, and as a visiting researcher at AT&T Labs-Research, New Jersey from 1999 to 2000, respectively. He was a faculty member in the Department of Electrical and Computer Engineering at the University of Arizona from 1988 to 1991, and an engineer at Fairchild Semiconductor and Silvar-Lisco, both in California, from 1982 to 1984. In 1989, he also worked as a summer faculty fellow at Jet Propulsion Laboratory of California Institute of Technology. His current research interests include Dependable and Secure Systems, Edge and Cloud computing, Internet of Things, Quantum Computing. Dr. Kuo is an IEEE Fellow, and a member of the IEEE Fellow Committee from 2018-2020. He is also a Core Member and a member of the Board of Governors of IEEE Computer Society from 2017-2020. He has published 450 papers in journals and conferences, and also holds 22 US patents, 23 Taiwan patents, and 15 patents from other countries. He received the Distinguished Academic Achievement Alumni Award from the UIUC Department of Computer Science in 2019. He received the Distinguished Research Award and the Distinguished Research Fellow award several times from the National Science Council, Taiwan. He was also a recipient of the Best Paper Awards in the 1996 International Symposium on Software Reliability Engineering and the 1986 IEEE/ACM Design Automation Conference, and the National Science Foundation's Research Initiation Award in 1989.

Top


Keynote Speaker 6: Prof. Weijia Jia, University of Macau and Shanghai Jiao Tong University, China
Title: AI Tech Circle for Smart City.

Abstract: In this talk, I will briefly introduce the research activities at State of Key Lab of IoT for Smart City at University of Macau. I would like to share my personal view on how the part of AI technology can be applied to the Smart City R&D circle, especially, on different layers of smart city such that AI at Bottom layer of Sensors/IoT; AI at Middle layer of Fog/Edge Networks and Computing; AI at Upper layer of using of Knowledge Graph building and completions etc..

Prof. Weijia Jia is currently a Chair Professor, Deputy Director of State Key Laboratory of Internet of Things for Smart City and Director of Data Science Center at University of Macau while he was Zhiyuan Chair Prof from Shanghai Jiaotong University, China (he received 2013 China 1000 Talent Award). He received BSc/MSc from Central South University, China in 82/84 and Master of Applied Sci./PhD from Polytechnic Faculty of Mons, Belgium in 92/93, respectively, all in computer science. For 93-95, he joined German National Research Center for Information Science (GMD) in Bonn (St. Augustine) as research fellow. From 95-13, he worked in City University of Hong Kong as a full professor in Computer Science Dept. His research interests include smart city; next generation IoT, knowledge graph constructions; multicast and anycast QoS routing protocols, wireless sensor networks and distributed systems. In these fields, he has over 500 publications in the prestige international journals/conferences and research books and book chapters. His past research contributions can be summarized from the aspects of vertex cover and efficient anycast for optimal placement and routing of severs/sensors in many applications of mobile/sensor/wireless networks and the Internet. He received Best Product Awards from the International Science&Tech. Expos (Shenzhen) in 2011/2012 and 1st- Prize of Scientific Research Awards from Ministry of Education of PR China in 2017 (list 2). He has served as area editor for various prestige international journals, chair and PC member/keynote speaker for many prestige international conferences. He is the Senior Member of IEEE and the Member of ACM.







Top


Keynote Speaker 7: Prof. Wanlei Zhou, University of Technology Sydney (UTS), Australia
Title: AI Security: Impact and Applications

Abstract: Artificial Intelligence is now applied to almost every aspect of our lives, including agriculture, autonomous vehicles, banking, gaming, healthcare, marketing, politics, social networks, etc. However, wide applications of AI also bring serious security issues. For example, disasters may happen if an autonomous car is controlled by a malicious user. One way to address the AI security issues is to make sure that the AI supported applications still function correctly despite the presence of malicious agents. In this presentation we focus on multi-agent security, aiming to overcome two limitations of existing agent advising approaches: the presence of malicious agents giving false advices and the communication overhead. We propose a novel differentially private agent advising approach to overcome the two limitations. We use the differential privacy technique to reduce the impact of malicious agents without identifying them. Also, by adopting the privacy budget concept of differential privacy, the proposed approach can naturally control communication overhead. The experimental results demonstrate the effectiveness of the proposed approach.

Prof. Wanlei Zhou is currently the Head of School of Computer Science in University of Technology Sydney (UTS), Australia. He received the B.Eng and M.Eng degrees from Harbin Institute of Technology, Harbin, China in 1982 and 1984, respectively, and the PhD degree from The Australian National University, Canberra, Australia, in 1991, all in Computer Science and Engineering. He also received a DSc degree (a higher Doctorate degree) from Deakin University in 2002. Before joining UTS, Professor Zhou held the positions of Alfred Deakin Professor, Chair of Information Technology, and Associate Dean (International Research Engagement) of Faculty of Science, Engineering and Built Environment, Deakin University. Professor Zhou has been the Head of School of Information Technology twice (Jan 2002-Apr 2006 and Jan 2009-Jan 2015) and Associate Dean of Faculty of Science and Technology in Deakin University (May 2006-Dec 2008). Professor Zhou also served as a lecturer in University of Electronic Science and Technology of China, a system programmer in HP at Massachusetts, USA; a lecturer in Monash University, Melbourne, Australia; and a lecturer in National University of Singapore, Singapore. His research interests include security and privacy, bioinformatics, and e-learning. Professor Zhou has published more than 400 papers in refereed international journals and refereed international conferences proceedings, including many articles in IEEE transactions and journals.

Top


Keynote Speaker 8: Prof. Richard Hill, University of Huddersfield, UK (IET Fellow)
Title: Realising Smart Manufacturing with the Industrial Internet of Things .

Abstract: Rapid developments in communication networks, pervasive sensing, distributed storage and computation, and the continued reduction in the cost of hardware, are providing new ways of automating manufacturing to become more responsive and reliable, facilitating mass customisation of products. The convergence of technologies creates opportunities for manufacturing organisations to collaborate, which presents new vulnerabilities and the potential for practical concerns regarding privacy, and the protection of Intellectual Property. This talk will examine some of the immediate issues facing organisations that are adopting IIoT technologies as they respond to the Industry 4.0 movement.

Prof. Richard Hill is a Professor and Head of the Department of Computer Science in the School of Computing and Engineering at the Huddersfield University. Richard has published widely in the fields of agent-oriented computing, Cloud computing, Enterprise Architecture, Internet of Things (IoT) and analytics for Big Data. Richard has published in excess of 100 peer-reviewed articles and was submitted to both RAE 2008 and REF 2014 research exercises. Richard is a Fellow of the British Computer Society (FBCS), a Chartered Engineer (CEng), a Chartered Manager (CMgr), a Fellow of the Chartered Management Institute (FCMI), a Chartered IT Professional (CITP) and a Senior Fellow of the Higher Education Academy (SFHEA)







Top


Keynote Speaker 10: Prof. Kim-Kwang Raymond Choo, The University of Texas at San Antonio (UTSA), USA
Title: Cyber security threat and forensic intelligence: Challenges and opportunities

Abstract: Cyber threat intelligence and analytics is among one of the fastest growing interdisciplinary fields of research bringing together researchers from different fields such as digital forensics, political and security studies, criminology, cyber security, big data analytics, machine learning, etc. to detect, contain and mitigate advanced persistent threats and fight against organized cybercrimes. In this presentation, we will discuss some of the challenges underpinning this inter- / trans- /multi-disciplinary field as well as research opportunities (e.g. how can we leverage advances in deep learning to better identify, predict, and prevent malicious criminal activities?).

Prof. Kim-Kwang Raymond Choo currently holds the Cloud Technology Endowed Professorship at The University of Texas at San Antonio (UTSA). He currently serves on the editorial board of Computers & Electrical Engineering, Computers & Security, Cluster Computing, Digital Investigation, IEEE Access, IEEE Blockchain Technical Briefs, IEEE Communications Magazine, IEEE Transactions on Big Data, IEEE Transactions on Engineering Management, Future Generation Computer Systems, Journal of Network and Computer Applications, PLoS ONE, Soft Computing, etc. In 2016, he was named the Cybersecurity Educator of the Year - APAC (Cybersecurity Excellence Awards are produced in cooperation with the Information Security Community on LinkedIn), and in 2015 he and his team won the Digital Forensics Research Challenge organized by Germany's University of Erlangen-Nuremberg. He is the recipient of the 2018 UTSA College of Business Col. Jean Piccione and Lt. Col. Philip Piccione Endowed Research Award for Tenured Faculty, Outstanding Associate Editor of 2018 for IEEE Access, British Computer Society's 2019 Wilkes Award Runner-up for his paper published in the 2018 volume of The Computer Journal (Oxford University Press), 2019 EURASIP Journal on Wireless Communications and Networking (JWCN) Best Paper Award, Journal of Information Processing Systems (JIPS) Survey Paper Award (Gold) 2019, IEEE TrustCom 2018 Best Paper Award, ESORICS 2015 Best Research Paper Award, 2014 Highly Commended Award by the Australia New Zealand Policing Advisory Agency, Fulbright Scholarship in 2009, 2008 Australia Day Achievement Medallion, and British Computer Society's Wilkes Award in 2008. He is also a Fellow of the Australian Computer Society, an IEEE Senior Member, and Co-Chair of IEEE Multimedia Communications Technical Committee’s Digital Rights Management for Multimedia Interest Group.

Top


* More keynote speakers will be added later.