The links to the conference sessions will be sent to your email by July 15th. Please make sure to register before the deadline to receive the links.
- Please note that:
- For full papers, the presentation should *not* exceed 15 minutes with 5 minutes for Q/A.
- For short papers, the presentation should *not* exceed 10 minutes with 5 minutes for Q/A.
Monday, July 19, 2021 (Day One)
Session One | Title |
9:00-11:00 (Calgary Time) | DPNeT: Differentially Private Network Traffic Synthesis with Generative Adversarial Networks Liyue Fan and Akarsh Pokkunuru Comparing local and central differential privacy using membership inference attacks Daniel Bernau, Jonas Robl, Philip W. Grassal, Steffen Schneider and Florian Kerschbaum Preventing Manipulation Attack in Local Differential Privacy using Verifiable Randomization Mechanism Fumiyuki Kato, Yang Cao and Masatoshi Yoshikawa Simple Storage-Saving Structure for Volume-Hiding Encrypted Multi-Maps Jiafan Wang and Sherman S. M. Chow Distributed query evaluation over encrypted data Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Giovanni Livraga, Stefano Paraboschi and Pierangela Samarati Nowhere to Leak: A Forward and Backward Private Symmetric Searchable Encryption in the Multi-Client Setting Alexandros Bakas and Antonis Michalas |
Session Two | Title |
11:30-13:20 (Calgary Time) | Multi-party Private Set Operations with an External Decider Sara Ramezanian, Tommi Meskanen and Valtteri Niemi Encrypted-Input Obfuscation of Image Classifiers Giovanni Di Crescenzo, Lisa Bahler, Brian Coan, Kurt Rohloff, Yuriy Polyakov and Dave Cousins Preserving Privacy of Co-Occurring Keywords over Encrypted Data D.V.N. Siva Kumar and P. Santhi Thilagam Verifiable Hierarchical Key Assignment Schemes Anna Lisa Ferrara, Federica Paci and Chiara Ricciardi An ABAC model with Trust and Gossiping (ABAC–TG) for online social networks Adi Swissa and Ehud Gudes On Feasibility of Attribute-Aware Relationship Based Access Control Policy Mining Shuvra Chakraborty and Ravi Sandhu |
Tuesday, July 20, 2021 (Day Two)
Session Three | Title |
9:00-11:10 (Calgary Time) | Not a Free Lunch, But a Cheap One: On Classifiers Performance on Anonymized Dataset Mina Sheikhalishahi and Nicola Zannone A Rewarding Framework for Crowdsourcing to Increase Privacy Awareness Ioannis Chrysakis, Giorgos Flouris, Maria Makridaki, Theodore Patkos, Yannis Roussakis, Georgios Samaritakis, Nikoleta Tsabanaki, Elias Tzortzakakis, Elisjana Ymeralli, Tom Seymoens, Anastasia Dimou and Ruben Verborgh DUCE: Distributed Usage Control Enforcement for Private Data Sharing in Internet of Things Na Shi, Bo Tang, Ravi Sandhu and Qi Li A Digital Twin-based Cyber Range for SOC Analysts Manfred Vielberth, Magdalena Glas, Marietheres Dietz, Stylianos Karagiannis, Emmanouil Magkos and Günther Pernul Divide-and-Learn: A Random Indexing Approach to Attribute Inference Attacks in Online Social Networks Sanaz Eidizadehakhcheloo, Bizhan Alipour Pijani, Abdessamad Imine and Michael Rusinowitch The tkl-Score for Data-Sharing Misuseability Kalvin Eng and Eleni Stroulia Automated Risk Assessment and Trade-Off Analysis of OpenID Connect and OAuth 2.0 Deployments Salimeh Dashti, Amir Sharif, Roberto Carbone and Silvio Ranise |
Session Four | Title |
11:30-13:10 (Calgary Time) | Access Control Policy Generation From User Stories Using Machine Learning John Heaps, Ram Krishnan, Yufei Huang, Jianwei Niu and Ravi Sandhu Perun: Confidential Multi-Stakeholder Machine Learning Framework with Hardware Acceleration Support Wojciech Ozga, Do Le Quoc and Christof Fetzer PDF Malware Detection Using Visualization and Machine Learning Ching-Yuan Liu, Min-Yi Chiu, Qi-Xian Huang and Hung-Min Sun Deep Learning for Detecting Network Attacks: An End-to-end Approach Qingtian Zou, Anoop Singhal, Xiaoyan Sun and Peng Liu 11.3 WG Business Meeting Dr. Sara Foresti |