Program
Friday, July 12
Time | Agenda | Location |
12:00-22:00 | Conference Check-in | Hotel Lobby |
会议注册和签到 | 酒店大堂 | |
18:30-20:00 | Dinner | JIN’S CAFE |
自助餐 | 金仕咖啡厅 |
Saturday, July 13
Time | Agenda | Location |
08:30-08:40 | Welcome Speech of Zhejiang Sci-Tech University | International Conference Hall 国际厅 Host: Jian Shen, Zhejiang Sci-Tech University |
浙江理工大学校领导致欢迎辞 | ||
08:40-08:50 | Introduces the BlockSys’2024 | |
介绍会议及论文交流情况 | ||
08:50-09:00 | Group Photo | |
合影 | ||
09:00-09:30 | Keynote Speech 1: | International Conference Hall 国际厅
Host: Yan Zhang, University of Oslo |
Yang Xiang, Swinburne University of Technology | ||
Title: Securing AI Systems: from Development to Deployment | ||
09:30-10:00 | Keynote Speech 2: | |
Aniello Castiglione, University of Salerno | ||
Title: Recent Trends and Developments in Quantum Computing within Blockchain, Metaverse and Trustworthy Systems | ||
10:00-10:30 | Keynote Speech 3: | |
Guomin Yang, Singapore Management University | ||
Title: TEE-Assisted Cryptographic Solutions | ||
10:30-10:50 | Coffee Break 茶歇 | |
10:50-11:20 | Keynote Speech 4: | International Conference Hall 国际厅 Host: Jiajing Wu, Sun Yat-sen University |
Yang Xiao, University of Alabama | ||
Title: Malicious Smart Meter Detection | ||
11:20-11:50 | Keynote Speech 5: | |
Jinjun Chen, Swinburne University of Technology | ||
Title: Composite DP-unbias: Bounded and Unbiased Composite Differential Privacy | ||
11:50-12:20 | Keynote Speech 6: | |
Jun Long, Central South University | ||
Title: A Human-Machine Collaborative Consultation Model for Complex and Difficult Diseases | ||
12:20-14:00 | Lunch | JIN’S CAFE 金仕咖啡厅 |
自助餐 | ||
14:00-14:30 | Keynote Speech 7: | International Conference Hall 国际厅 Host: Weizhi Meng, Technical University of Denmark |
Chau Yuen, Nanyang Technological University | ||
Title: Towards Ubiquitous Semantic Metaverse: Challenges, Approaches, and Opportunities | ||
14:30-15:00 | Keynote Speech 8: | |
Zhaolong Ning, Chongqing University of Posts and Telecommunications | ||
Title: Intelligent Communication and Computing Optimization At The Network Edge | ||
15:00-15:30 | Keynote Speech 9: | |
Chao Lin, Fujian Normal University | ||
Title: Universal and Trustless Large-Value Payments in Cryptocurrencies | ||
15:30-15:50 | Coffee Break | |
茶歇 | ||
15:50-16:20 | Keynote Speech 10: (Online) | International Conference Hall 国际厅 Host: Zilong Jin, Nanjing University of Information Science and Technology |
Willy Susilo, University of Wollongong | ||
Title: Metaverse and Cybersecurity | ||
16:20-16:50 | Keynote Speech 11: (Online) | |
Vijayakumar Pandi, Anna University | ||
Title: Mutual Authentication for Secure Communication in Fog-Based VANETs- Formal Security Analysis using Scyther | ||
16:50-17:20 | Keynote Speech 12: | |
Tianqi Zhou, Zhejiang Sci-Tech University | ||
Title: Group Key Agreement Protocols from Combinatorial Designs | ||
18:30-20:00 | Banquet | International Conference Hall 国际厅 |
晚宴及最佳论文奖颁奖 |
Sunday, July 14
Session 1: Blockchain and Data Mining Session Chair: Mingdong Tang, Guangdong University of Foreign Studies Phoenix Hall, A座三楼凤祥厅 | |
Time | Title & Authors |
09:00-10:30 | Intrusion Anomaly Detection with Multi-Transformer Mengshuai Ma, Bin Wen, Wenlong Liu, Wanrong Du and Xiaoxun Wei |
Research on Network Traffic Anomaly Detection Method Based on Deep Learning Wenlong Liu, Bin Wen, Mengshuai Ma, Feng Zhang and Xiaoxun Wei | |
Hyper-parameter Optimization and Proxy Re-encryption for Federated Learning Wanrong Du, Bin Wen, Mengshuai Ma, Wenlong Liu and Xiaoxun Wei | |
A Federated Learning Method Based on Linear Probing and Fine-Tuning Yang Li, Haoyu Chen, Jianming Zhu and Youwei Wang | |
Facilitating Feature and Topology Lightweighting: An Ethereum Transaction Graph Compression Method for Malicious Account Detection Xuanze Chen, Chenkai Hu, Shengbo Gong, Chengxiang Jin, Jiajun Zhou, Shanqing Yu and Qi Xuan | |
A Secure Hierarchical Federated Learning Framework based on FISCO Group Mechanism Xiaoli Li, Yizhe Zhao, Ting Cai, Lili Jiao, Degang Xu and Qiong Gu | |
10:30-10:50 | Coffee Break |
Session 2: Data Security and Anomaly Detection Session Chair: Bin Wen, Hainan Normal University Yunqi Hall, A座三楼云栖厅 | |
Time | Title & Authors |
09:00-10:30 | Exploring Embedded Content in the Ethereum Blockchain: Data Restoration and Analysis Weili Chen, Xingyu Feng and Mingdong Tang |
Task Allocation and Process Optimization of Data, Information, Knowledge, and Wisdom (DIKW)-based Workflow Engine Yifan Li and Lei Yu | |
Location Data Sharing Method Based on Blockchain and Attribute-Based Encryption Xueping Sun, Peng Liu, Bingjie Liao and Qian He | |
Implicit White-Box Implementations of Efficient Double-Block-Length MAC Hengxing Liu, Yupeng Zhang, Luoqi Chen and Zheng Gong | |
A Survey on Blockchain Scalability Xuanze Chen, Chenkai Hu, Shengbo Gong, Chengxiang Jin, Jiajun Wei Tong, Jian Li, Lingxiao Yang, Xiyan Huang, Xiangshang Gao and Zesong Dong | |
Supply Chain Financing Model Embedded with “Full-Process” Blockchain Ying Fang, Haifeng Guo, Yuyun Jie, Yong Wang, Biliang Wang and Yuwei He | |
10:30-10:50 | Coffee Break |
Session 3: Blockchain Performance Optimization Session Chair: Haowen Tan, Zhejiang Sci-Tech University Phoenix Hall, A座三楼凤祥厅 | |
Time | Title & Authors |
10:50-12:20 | ReCon: Faster Smart Contract Vulnerability Detection by Reusable Symbolic Execution Tree Huanze Chen and Peilin Zheng |
SVD-SESDG: Smart Contract Vulnerability Detection Technology via Symbol Execution and State Variable Dependency Graph Cong Tan, Jiahao Wu, Zhao Liu and Sujuan Qin | |
Dual-view Aware Smart Contract Vulnerability Detection for Ethereum Jiacheng Yao, Maolin Wang, Wanqi Chen, Chengxiang Jin, Jiajun Zhou, Shanqing Yu and Qi Xuan | |
Blockchain Layered Sharding Algorithm Based on Transaction Characteristics Changsong Yang, Yixiong Tang, Yong Ding, Yujue Wang and Hai Liang | |
An Empirical Study on the Performance of EVMs and Wasm VMs for Smart Contract Execution Shuwei Song, Zhou Liao, Ting Chen, Xiapu Luo, Yongjie Zhang and Guopeng Wang | |
Ponzi Scheme Detection in Smart Contracts Using Heterogeneous Semantic Graph Wei Chen, Xinjun Jiang, Tian Lan, Leyuan Liu and Chengyu Li | |
12:20-14:00 | Lunch 自助餐 (JIN’S CAFÉ 金仕咖啡厅) |
Session 4: Frontier Technology Integration Session Chair: Chen Wang, Zhejiang Sci-Tech University Yunqi Hall, A座三楼云栖厅 | |
Time | Title & Authors |
10:50-12:20 | Blockchain-Enabled Large Language Models for Prognostics and Health Management Framework in Industrial Internet of Things Dun Li, Hongzhi Li Li, Jing Li, Jiatao Li, Huan Wang, Roberto Minerva, Noel Crespi and Kuan-Ching Li |
Protecting Shepherded Parallel Permissioned Blockchain System from Congestion-related Attack Ziyang Zheng, Qingkai Meng, Tao Tong, Shan Zhang, Zhiyuan Wang and Hongbin Luo | |
Cross-Chain Overview:Development, Mechanisms, Protocols, Security, and Challenges Liang Zhiyong, Jiang Rongwang and Yang Ming | |
VMeta: A QoS Dataset for Metaverse Services Zhiyuan Ge, Huiying Jin, Hai Dong, Shunhui Ji, Jiajia Li, Shuhan Yang, Qi Wang and Pengcheng Zhang | |
OptimalFix:An Automated Framework for Fixing Vulnerabilities in Smart Contracts Effectively Ningkang Jing, Shanshan Chen and Kunhang Bao | |
Visionary Security Framework for Blockchain Integrated Metaverse Platform Prabakaran C and Kannadasan R | |
12:20-14:00 | Lunch 自助餐 (JIN’S CAFÉ 金仕咖啡厅) |
Session 5: Trustworthy System and Cryptocurrencies Session Chair: Tianqi Zhou, Zhejiang Sci-Tech University Phoenix Hall, A座三楼凤祥厅 | |
Time | Title & Authors |
14:00-15:35 | Analysis of Cryptocurrencies Mixing Services and Its Regulatory Mechansim Mingdong Liu and Bin Dong |
A Cross-chain Model Based on Credit Hierarchical Notary Group for IoT Roaming Settlement Shuhao Lu, Hai Liang, Yujue Wang, Yong Ding, Changsong Yang and Zhenwei Guo | |
GDCTSA: A Grouped Data Collection Scheme for Trustworthy Systems Assessment Zhiwei Si, Ziyi Wang and Yanqiu Li | |
Coffee Break | |
Privacy Vulnerability Analysis of Bitcoin Network Mingdong Liu and Bin Dong | |
Deduplication Cloud Storage Integrity Auditing with Unpredictable Challenge Messages Zhanren Lin, Meiyan Xiao, Hongbo Li and Qiong Huang |
Session 6: Blockchain Applications Session Chair: Huijie Yang, Zhejiang Sci-Tech University Yunqi Hall, A座三楼云栖厅 | |
Time | Title & Authors |
14:00-15:35 | Drug traceability and health monitoring system with Hyperledger Fabric Vijayakumar P, Rajkumar S.C, Audithan Sivaraman, Jayarekha P and Chandrasekaran S |
BCPA-OC Blockchain-Based Conditional Privacy-Preserving Authentication with Out-of-Band Communication for VANETs Mengjie Zhou, Chao Lin, Shengmin Xu and Wei Wu | |
BBDAS: Blockchain-assisted Blinded Data Auditing Scheme for Cloud-Edge Systems Chen Wang, Yuxin Cui, Bing Yang, Haiyan Yu and Wei Tong | |
Coffee Break | |
Blockchain-Based Tamper-Resistant Broadcast Encryption Scheme Kai Zhao, Wenying Zheng and Tianqi Zhou | |
Joint Optimization of Task Offloading and Resource Allocation in Blockchain-Enabled Vehicular Fog Computing Networks Tao Qiu, Xi Lou, Ke Zhang, Xiaoyan Huang and Fan Wu |