Program

Friday, July 12

Time

Agenda

Location

12:00-22:00

Conference Check-in

Hotel Lobby

会议注册和签到

酒店大堂

18:30-20:00

Dinner

JIN’S CAFE

自助餐

金仕咖啡厅

Saturday, July 13

TimeAgendaLocation
08:30-08:40Welcome Speech of Zhejiang Sci-Tech University

International Conference Hall

国际厅

Host:

Jian Shen, Zhejiang Sci-Tech University

浙江理工大学校领导致欢迎辞
08:40-08:50Introduces the BlockSys’2024
介绍会议及论文交流情况
08:50-09:00Group Photo
合影
09:00-09:30Keynote Speech 1:

International Conference Hall

国际厅

 

Host:

Yan Zhang,

University of Oslo

Yang Xiang, Swinburne University of Technology
Title: Securing AI Systems: from Development to Deployment
09:30-10:00Keynote Speech 2:
Aniello Castiglione, University of Salerno
Title: Recent Trends and Developments in Quantum Computing within Blockchain, Metaverse and Trustworthy Systems
10:00-10:30Keynote Speech 3:
Guomin Yang, Singapore Management University
Title: TEE-Assisted Cryptographic Solutions
10:30-10:50

Coffee Break

茶歇

10:50-11:20Keynote Speech 4:

International Conference Hall

国际厅

Host:

Jiajing Wu,

Sun Yat-sen University

Yang Xiao, University of Alabama
Title: Malicious Smart Meter Detection
11:20-11:50Keynote Speech 5:
Jinjun Chen, Swinburne University of Technology
Title: Composite DP-unbias: Bounded and Unbiased Composite Differential Privacy
11:50-12:20Keynote Speech 6:
Jun Long, Central South University
Title: A Human-Machine Collaborative Consultation Model for Complex and Difficult Diseases
12:20-14:00Lunch

JIN’S CAFE

金仕咖啡厅

自助餐
14:00-14:30Keynote Speech 7:

International Conference Hall

国际厅

Host:

Weizhi Meng,

Technical University of Denmark

Chau Yuen, Nanyang Technological University
Title: Towards Ubiquitous Semantic Metaverse: Challenges, Approaches, and Opportunities
14:30-15:00Keynote Speech 8:
Zhaolong Ning, Chongqing University of Posts and Telecommunications
Title: Intelligent Communication and Computing Optimization At The Network Edge
15:00-15:30Keynote Speech 9:
Chao Lin, Fujian Normal University
Title: Universal and Trustless Large-Value Payments in Cryptocurrencies
15:30-15:50Coffee Break
茶歇
15:50-16:20Keynote Speech 10: (Online)

International Conference Hall

国际厅

Host:

Zilong Jin,

Nanjing University of Information Science and Technology

Willy Susilo, University of Wollongong
Title: Metaverse and Cybersecurity
16:20-16:50Keynote Speech 11: (Online)
Vijayakumar Pandi, Anna University
Title: Mutual Authentication for Secure Communication in Fog-Based VANETs- Formal Security Analysis using Scyther
16:50-17:20Keynote Speech 12:
Tianqi Zhou, Zhejiang Sci-Tech University
Title: Group Key Agreement Protocols from Combinatorial Designs
18:30-20:00Banquet

International Conference Hall

国际厅

晚宴及最佳论文奖颁奖

Sunday, July 14

 

Session 1: Blockchain and Data Mining

Session Chair: Mingdong Tang, Guangdong University of Foreign Studies

Phoenix Hall, A座三楼凤祥厅

Time

Title & Authors

09:00-10:30

Intrusion Anomaly Detection with Multi-Transformer

Mengshuai Ma, Bin Wen, Wenlong Liu, Wanrong Du and Xiaoxun Wei

Research on Network Traffic Anomaly Detection Method Based on Deep Learning

Wenlong Liu, Bin Wen, Mengshuai Ma, Feng Zhang and Xiaoxun Wei

Hyper-parameter Optimization and Proxy Re-encryption for Federated Learning

Wanrong Du, Bin Wen, Mengshuai Ma, Wenlong Liu and Xiaoxun Wei

A Federated Learning Method Based on Linear Probing and Fine-Tuning

Yang Li, Haoyu Chen, Jianming Zhu and Youwei Wang

Facilitating Feature and Topology Lightweighting: An Ethereum Transaction Graph Compression Method for Malicious Account Detection

Xuanze Chen, Chenkai Hu, Shengbo Gong, Chengxiang Jin, Jiajun Zhou, Shanqing Yu and Qi Xuan

A Secure Hierarchical Federated Learning Framework based on FISCO Group Mechanism

Xiaoli Li, Yizhe Zhao, Ting Cai, Lili Jiao, Degang Xu and Qiong Gu

10:30-10:50

Coffee Break

Session 2: Data Security and Anomaly Detection

Session Chair: Bin Wen, Hainan Normal University

Yunqi Hall, A座三楼云栖厅

Time

Title & Authors

09:00-10:30

Exploring Embedded Content in the Ethereum Blockchain: Data Restoration and Analysis

Weili Chen, Xingyu Feng and Mingdong Tang

Task Allocation and Process Optimization of Data, Information, Knowledge, and Wisdom (DIKW)-based Workflow Engine

Yifan Li and Lei Yu

Location Data Sharing Method Based on Blockchain and Attribute-Based Encryption

Xueping Sun, Peng Liu, Bingjie Liao and Qian He

Implicit White-Box Implementations of Efficient Double-Block-Length MAC

Hengxing Liu, Yupeng Zhang, Luoqi Chen and Zheng Gong

A Survey on Blockchain Scalability

Xuanze Chen, Chenkai Hu, Shengbo Gong, Chengxiang Jin, Jiajun Wei Tong, Jian Li, Lingxiao Yang, Xiyan Huang, Xiangshang Gao and Zesong Dong

Supply Chain Financing Model Embedded with “Full-Process” Blockchain

Ying Fang, Haifeng Guo, Yuyun Jie, Yong Wang, Biliang Wang and Yuwei He

10:30-10:50

Coffee Break

Session 3: Blockchain Performance Optimization

Session Chair: Haowen Tan, Zhejiang Sci-Tech University

Phoenix Hall, A座三楼凤祥厅

Time

Title & Authors

10:50-12:20

ReCon: Faster Smart Contract Vulnerability Detection by Reusable Symbolic Execution Tree

Huanze Chen and Peilin Zheng

SVD-SESDG: Smart Contract Vulnerability  Detection Technology via Symbol Execution and  State Variable Dependency Graph

Cong Tan, Jiahao Wu, Zhao Liu and Sujuan Qin

Dual-view Aware Smart Contract Vulnerability Detection for Ethereum

Jiacheng Yao, Maolin Wang, Wanqi Chen, Chengxiang Jin, Jiajun Zhou, Shanqing Yu and Qi Xuan

Blockchain Layered Sharding Algorithm Based on Transaction Characteristics

Changsong Yang, Yixiong Tang, Yong Ding, Yujue Wang and Hai Liang

An Empirical Study on the Performance of EVMs and Wasm VMs for Smart Contract Execution

Shuwei Song, Zhou Liao, Ting Chen, Xiapu Luo, Yongjie Zhang and Guopeng Wang

Ponzi Scheme Detection in Smart Contracts Using Heterogeneous Semantic Graph

Wei Chen, Xinjun Jiang, Tian Lan, Leyuan Liu and Chengyu Li

12:20-14:00

Lunch 自助餐 (JIN’S CAFÉ 金仕咖啡厅)

Session 4: Frontier Technology Integration

Session Chair: Chen Wang, Zhejiang Sci-Tech University

Yunqi Hall, A座三楼云栖厅

Time

Title & Authors

10:50-12:20

Blockchain-Enabled Large Language Models for Prognostics and Health Management Framework in Industrial Internet of Things

Dun Li, Hongzhi Li Li, Jing Li, Jiatao Li, Huan Wang, Roberto Minerva, Noel Crespi and Kuan-Ching Li

Protecting Shepherded Parallel Permissioned Blockchain System from Congestion-related Attack

Ziyang Zheng, Qingkai Meng, Tao Tong, Shan Zhang, Zhiyuan Wang and Hongbin Luo

Cross-Chain Overview:Development, Mechanisms, Protocols, Security, and Challenges

Liang Zhiyong, Jiang Rongwang and Yang Ming

VMeta: A QoS Dataset for Metaverse Services

Zhiyuan Ge, Huiying Jin, Hai Dong, Shunhui Ji, Jiajia Li, Shuhan Yang, Qi Wang and Pengcheng Zhang

OptimalFix:An Automated Framework for  Fixing Vulnerabilities in Smart Contracts Effectively

Ningkang Jing, Shanshan Chen and Kunhang Bao

Visionary Security Framework for Blockchain Integrated Metaverse Platform

Prabakaran C and Kannadasan R

12:20-14:00

Lunch 自助餐 (JIN’S CAFÉ 金仕咖啡厅)

Session 5: Trustworthy System and Cryptocurrencies

Session Chair: Tianqi Zhou, Zhejiang Sci-Tech University

Phoenix Hall, A座三楼凤祥厅

Time

Title & Authors

14:00-15:35

Analysis of Cryptocurrencies Mixing Services and Its Regulatory Mechansim

Mingdong Liu and Bin Dong

A Cross-chain Model Based on Credit Hierarchical Notary Group for IoT Roaming Settlement

Shuhao Lu, Hai Liang, Yujue Wang, Yong Ding, Changsong Yang and Zhenwei Guo

GDCTSA: A Grouped Data Collection Scheme for Trustworthy Systems Assessment

Zhiwei Si, Ziyi Wang and Yanqiu Li

Coffee Break

Privacy Vulnerability Analysis of Bitcoin Network

Mingdong Liu and Bin Dong

Deduplication Cloud Storage Integrity Auditing with Unpredictable Challenge Messages

Zhanren Lin, Meiyan Xiao, Hongbo Li and Qiong Huang

Session 6: Blockchain Applications

Session Chair: Huijie Yang, Zhejiang Sci-Tech University

Yunqi Hall, A座三楼云栖厅

Time

Title & Authors

14:00-15:35

Drug traceability and health monitoring system with Hyperledger Fabric

Vijayakumar P, Rajkumar S.C, Audithan Sivaraman, Jayarekha P and Chandrasekaran S

BCPA-OC Blockchain-Based Conditional Privacy-Preserving Authentication with Out-of-Band Communication for VANETs

Mengjie Zhou, Chao Lin, Shengmin Xu and Wei Wu

BBDAS: Blockchain-assisted Blinded Data Auditing Scheme for Cloud-Edge Systems

Chen Wang, Yuxin Cui, Bing Yang, Haiyan Yu and Wei Tong

Coffee Break 

Blockchain-Based Tamper-Resistant Broadcast Encryption Scheme

Kai Zhao, Wenying Zheng and Tianqi Zhou

Joint Optimization of Task Offloading and Resource Allocation in Blockchain-Enabled Vehicular Fog Computing Networks

Tao Qiu, Xi Lou, Ke Zhang, Xiaoyan Huang and Fan Wu