The conference is held in Salon-E on the 2nd floor.


September 13th, Monday

Welcome and Keynote Talk,   8:30am – 9:15am
  • Prof. Aidong Zhang, SUNY Buffalo

Title: Advanced Network Mining and Applications

Abstract: Network mining has been an active area of research lately which develops scientific approaches to the extraction of knowledge from large network data sets. These approaches will find broad applications which handle network data, such as biological networks, web networks, social networks, and technological networks. In this talk, I will discuss new computational research issues and approaches to analysis of large-scale network data and demonstrate their significance in various applications.  

Short Bio: Dr. Aidong Zhang is Professor and Chair in the Department of Computer Science and Engineering at State University of New York at Buffalo. Her research interests include bioinformatics, data mining, multimedia and database systems, and content-based image retrieval. She is an author of over 200 research publications in these areas. She has chaired or served on over 100 program committees of international conferences and workshops, and currently serves several journal editorial boards. She has published two books “Protein Interaction Networks: Computational Analysis” (Cambridge University Press, 2009) and “Advanced Analysis of Gene Expression Microarray Data” (World Scientific Publishing Co., Inc. 2006). Dr. Zhang is a recipient of the National Science Foundation CAREER award and State University of New York (SUNY) Chancellor's Research Recognition award. Dr. Zhang is an IEEE Fellow.


Session 1:  Data Processing, 9:15am - 10:45am

  • 25 mins: A Multiple-Replica Remote Data Possession Checking Protocol with Public Verifiability (Zhuo Hao and Nenghai Yu, University of Science and Technology of China, China; SUNY Buffalo, USA)
  • 25 mins: Ontology-Enhanced Interactive Anonymization in Domain-Driven Data Mining Outsourcing (Brian Loh and Patrick Then, Swinburne University of Technology, Malaysia)
  • 25 mins:  k-NN Numeric Prediction Using Bagging and Instance-relevant Combination (Liang He, Qinbao Song and Junyi Shen, Xi'an Jiaotong University, China)

Coffee Break:  10:45 am – 11:15am  

Session 2: Data Privacy, 11:15am – 12:45pm

  • 25 mins: Pseudonym-based RFID Discovery Service to Mitigate Unauthorized Tracking in Supply Chain Management (Qiang Yan, Robert H. Deng, Zheng Yan, Yingjiu Li and Tieyan Li, Singapore Management University, Singapore; Nokia Research Center, Finland; A*Star, Singapore)
  • 25 mins: Taking the Tags With You: Digital Photograph Provenance (Brandeis Marshall, Purdue University, USA)
  • 25 mins: An efficient Dynamic Identity-Based Broadcast Encryption scheme (Han Jiang, Jiuqing Shang and Qiuliang Xu, Shan Dong University, China)

Lunch 12:45pm – 2:00pm

Session 3:  E-Commerce, 2:00pm - 3: 30pm

  • 25 mins: Improving Applicability, Efficiency And Security Of Non-Membership Proof (Kun Peng and Feng Bao, A-Star, Singapore)
  • 25 mins: Design and Development of Real-Time Communication Content Management System for E-Commerce (Pilunchana Kiatruangkrai, Poomipat Phusayangkul, Supanut Viniyakul, Nakornthip Prompoon and Pizzanu Kanongchaiyos, Chulalongkorn University, Thailand)
  • 25 mins: A face based fuzzy vault scheme for secure online authentication (Lifang Wu and Songlong Yuan, Beijing University of Technology, China)

Coffee Break:  3:30pm – 4:00pm  

Session 4: Data Privacy, 4:00pm – 5:00pm

  • 25 mins: Some Improvements on Model Checking CoreASM Models of Security Protocols (Zhenju Zhao, Feng Liu, Jianhua Peng, Danqing Huang, Rui Xue and Zhenfeng Zhang, Chinese Academy of Sciences, China)
  • 25 mins: DCT Transform based Relational Database Robust Watermarking Algorithm (Yige Song, Weidong Liu, Jiaxing Song and Ming Sze Angela Wong, Tsinghua University, China)


September 14th, Tuesday

Keynote Talk,   8:30am – 9:15am

  • Prof. Xindong Wu (bio), University of Vermont

Title: Research Challenges in Ubiquitous Personalized Information Fusion

Abstract:  Ubiquitous personalized information fusion involves a positive cycle of (a) demand-driven integration of information sources, (b) mining and analysis, (c) user interest modeling, and (d) security/privacy considerations. This talk reviews influential data mining algorithms that can be utilized in these information fusion activities, introduces data mining applications for ubiquitous personalized information fusion, and presents research challenges in intelligent informatics, active information fusion, and adaptive interest modeling and monitoring.

Session 5:  Data Privacy, 9:15am - 10:45am

  • 25 mins: A Security Enhanced Remote Password Authentication Scheme using Smart Card (Zhuo Hao and Nenghai Yu, University of Science and Technology of China, China; SUNY Buffalo, USA)
  • 25 mins: Verification of Privacy Requirements in Web Services Composition (Liu Linyuan and Huang Zhiqiu, Nanjing University of Aeronautics and Astronautics, China)
  • 25 mins: A Comprehensive Quality Evaluation System for Coordinate Transformation (Hui Li and Cheng Zhong, China University of Geoscience, China; Wuhan Urban Planning Information Center, China)

Coffee Break:  10:45 am – 11:15am  

Session 6: Data Processing, 11:15am – 12:15pm

  • 25 mins:  Improve Music Teaching Quality throughout Using Information Technology (Yue Ji, SUNY Buffalo, USA)
  • 25 mins: Performance Analysis of MIMO Relaying Channels’ Cooperative Diversity for Mobile Networks (Nafis Imtiaz Zaman, Kazi Md Abdullah Al Mamun, Triantafyllos Kanakis and Abu Salah Uddin, University of Greenwich, UK; Yeungnam University, Korea)

Lunch 12:30pm – 2:00pm

Session 7:  E-Commerce, 2:00pm - 3: 30pm

  • 25 mins: TOWARDS TRANSACTIONAL DATA MANAGEMENT OVER THE CLOUD (Rohan Tiwari, Shamkant Navathe and Gaurav Kulkarni, Georgia Institute of Technology, USA)
  • 25 mins: A Model for Evaluating Technological Innovation Ability In E-commerce Based on Information Entropy and Unascertained Measure (RongRong Ren and Xing Gang, Northeastern University at Qinhuangdao, China)
  • 25 mins: An E-payment System Based on Quantum Blind and Group Signature (Xiaojun Wen, Shenzhen Polytechnic, China)

Coffee Break:  3:30pm – 4:00pm  

Session 8: Data Privacy, 4:00am – 5:00pm

  • 25 mins: A Provable Security Biometric Password Multi-server Authentication Scheme with Smart Card (Dexin Yang and Yang Bo, South China Agricultural University, China)
  • 25 mins: Towards A Flexible Spatially Aware Access Control Model (Desheng Zhang, Min Zhang and Chi Chen, Chinese Academy of Sciences, China)










Sponsorship Info...


SUNY Buffalo

Technical Co-Sponsor:

IEEE logo

Technically Co-Sponsored IEEE Computer Society