You are Welcome to Attend all 11+ Keynote Speeches Shared by Co-Located IEEE IUCC 2017 & IEEE ISPA 2017 & SpaCCS 2017 Conferences


Keynote Speaker 1: Prof. Geoffrey Fox, Indiana University, USA (Fellow of APS (Physics) and Fellow of ACM (Computing))
Title Next Generation Grid: Integrating Parallel and Distributed Computing Runtimes from Cloud to Edge Applications

Keynote Speaker 2: Prof. Jie Wu, Temple University, USA (IEEE Fellow)
Title Joint Scheduling of Overlapping Phases in the MapReduce Framework

Keynote Speaker 3: Prof. Robert Deng, Singapore Management University, Singapore (IEEE Fellow)
Title Privacy-Preserving Access Control and Computations of Encrypted Data in the Cloud

Keynote Speaker 4: Prof. Lajos Hanzo, University of Southampton, UK (Fellow of the Royal Academy of Engineering of UK, Fellow of IEEE)
Title Quantum-Search Algorithms, Quantum Codes and All That...

Keynote Speaker 5: Prof. Jianhua Ma, Hosei University, Japan
Title From Personal Big Data to Personal Cyber Buddies in Hyperworld

Keynote Speaker 6: Prof. Ljiljana Trajkovic , Simon Fraser University, Canada (IEEE Fellow)
Title: Data Mining and Machine Learning for Analysis of Network Traffic

Keynote Speaker 7: Professor Kin K. Leung , Imperial College London, UK (IEEE Fellow)
Title Service Placement and Migration in Mobile Edge Clouds

Keynote Speaker 8: Prof. Azzedine Boukerche, University of Ottawa, Canada (Fellow of the IEEE, Fellow of The Canadian Academy of Engineering, Fellow of The Engineering Institute of Canada, Fellow of the American Association for the Advancement of Science)
Title Autonomous and Connected Vehicles: A New Challenge for Smart Cities

Keynote Speaker 9: Prof. Hai Jin, Huazhong University of Science and Technology, China (Cheung Kung Scholars Chair Professor, Fellow of the CCF)
Title Towards Dataflow-based Graph Accelerator

Keynote Speaker 10: Prof. Vijay Varadharajan , The University of Newcastle, Australia (FIEE, FBCS, FACS, FIEAust, FIMA)
Title Security Challenges in Software Defined Networks Policy based Security Architecture for Software Defined Networks

Keynote Speaker 11: Prof. Md Zakirul Alam Bhuiyan, Fordham University, USA
Title Tracking Ubiquitous Radio Signal Activities: Sensing and Security Application Perspectives


Detailed Information about Keynote Speeches


Keynote Speaker 1: Prof. Geoffrey Fox, Indiana University, USA (Fellow of APS (Physics) and Fellow of ACM (Computing))
Title: Next Generation Grid: Integrating Parallel and Distributed Computing Runtimes from Cloud to Edge Applications

Abstract: We look again at Big Data Programming environments such as Hadoop, Spark, Flink, Heron, Pregel; HPC concepts such as MPI and Asynchronous Many-Task runtimes and Cloud/Grid/Edge ideas such as event-driven computing, serverless computing, workflow and Services. These cross many research communities including distributed systems, databases, cyberphysical systems and parallel computing which sometimes have inconsistent worldviews. There are many common capabilities across these systems which are often implemented differently in each packaged environment. For example, communication can be bulk synchronous processing or data flow; scheduling can be dynamic or static; state and fault-tolerance can have different models; execution and data can be streaming or batch, distributed or local. We suggest that one can usefully build a toolkit (called Twister2 by us) that supports these different choices and allows fruitful customization for each application area. We illustrate the design of Twister2 by several point studies.

Prof. Geoffrey Fox received a Ph.D. in Theoretical Physics from Cambridge University where he was Senior Wrangler. He is now a distinguished professor of Engineering, Computing, and Physics at Indiana University where he is director of the Digital Science Center, and both Department Chair and Associate Dean for Intelligent Systems Engineering at the School of Informatics and Computing. He previously held positions at Caltech, Syracuse University, and Florida State University after being a postdoc at the Institute for Advanced Study at Princeton, Lawrence Berkeley Laboratory, and Peterhouse College Cambridge. He has supervised the Ph.D. of 70 students and published around 1200 papers (over 400 with at least 10 citations) in physics and computing with an h-index of 74 and over 30000 citations.

He is a Fellow of APS (Physics) and ACM (Computing) and works on the interdisciplinary interface between computing and applications. He currently researches the application of computer science from infrastructure to analytics in Biology, Pathology, Sensor Clouds, Earthquake and Ice-sheet Science, Image processing, Deep Learning, Network Science, Financial Systems and Particle Physics. The infrastructure work is built around Software Defined Systems on Clouds and Clusters. The analytics focuses on scalable parallelism. He is expert on streaming data and robot-cloud interactions. He is involved in several projects to enhance the capabilities of Minority Serving Institutions. He has experience in online education and its use in MOOCs for areas like Data and Computational Science.

Top


Keynote Speaker 2: Prof. Jie Wu, Temple University, USA (IEEE Fellow)
Title: Joint Scheduling of Overlapping Phases in the MapReduce Framework

Abstract: MapReduce includes three phases: map, shuffle, and reduce. Since the map phase is CPU-intensive and the shuffle phase is I/O-intensive, both can be conducted in parallel. This talk focuses on joint scheduling optimization of overlapping map and shuffle phases to minimize average job completion time. Challenges arise due to the dependency relationship between the map and shuffle phases since the shuffle phase relies on data emitted by the map phase. Our key observation is that the optimal schedule is trackable in two special cases. The first case is where the job set is pairable, i.e., the jobs are paired to avoid under-utilization of the I/O. The optimal schedule executes pairs of jobs depending on their size from smallest to largest. The second special case is where the job set is unilateral dominant, [KNW1] i.e., all jobs are simultaneously map-heavy, balanced, or shuffle-heavy. The optimal schedule executes the unilaterally dependent jobs in size order from smallest to largest. When the job set is a union of a pairable job set and a unilateral dominant [KNW2] job set, we propose an approximation schedule with a bound of 2 that resembles a mixture of the two optimal schedules above. Consequently, an arbitrary job set can be divided into two subsets to approximate the two special cases. Real data-driven experiments validate the efficiency and effectiveness of our algorithms.

Prof. Jie Wu is Director of the Center for Networked Computing and Laura H. Carnell professor at Temple University. He also serves as Director of International Affairs for the College of Science and Technology. He served as Chair of the Department of Computer and Information Sciences from the summer of 2009 to the summer of 2016 and as Associate Vice Provost for International Affairs from the fall of 2015 to the summer of 2017. Prior to joining Temple University, he was a program director at the National Science Foundation and was a distinguished professor at Florida Atlantic University. His current research interests include mobile computing and wireless networks, routing protocols, cloud and green computing, network trust and security, and social network applications. Dr. Wu regularly publishes in scholarly journals, conference proceedings, and books. He serves on several editorial boards, including IEEE Transactions on Service Computing and the Journal of Parallel and Distributed Computing. Dr. Wu was general co-chair for IEEE MASS 2006, IEEE IPDPS 2008, IEEE ICDCS 2013, ACM MobiHoc 2014, ICPP 2016, and IEEE CNS 2016, as well as program co-chair for IEEE INFOCOM 2011 and CCF CNCC 2013. He was an IEEE Computer Society distinguished visitor, an ACM distinguished speaker, and the chair of the IEEE Technical Committee on Distributed Processing (TCDP). Dr. Wu is a CCF distinguished speaker and a fellow of the IEEE. He is the recipient of the 2011 China Computer Federation (CCF) Overseas Outstanding Achievement Award.

Top


Keynote Speaker 3: Prof. Robert Deng, Singapore Management University, Singapore (IEEE Fellow)
Title: Privacy-Preserving Access Control and Computations of Encrypted Data in the Cloud

Abstract: A promising application of cloud computing is IoT (or Cloud of Things) where computationally limited devices, such as body sensors used to monitor patient’s heart rates, blood pressures and glucose levels send data to the cloud for processing. There are known security and privacy concerns relating to the storage and processing of data in the cloud. To address these concerns, in this talk, we present a framework and techniques for efficient sharing and computations of encrypted data in the cloud. We also discuss some applications of the framework and the techniques.

Prof. Robert Deng is AXA Chair Professor of Cybersecurity, Director of the Secure Mobile Centre, and Dean of Postgraduate Research Programmes, Singapore Management University (SMU). His research interests are in the areas of data security and privacy, cloud security and Internet of Things security. He received the Outstanding University Researcher Award from National University of Singapore, Lee Kuan Yew Fellowship for Research Excellence from SMU, and Asia-Pacific Information Security Leadership Achievements Community Service Star from International Information Systems Security Certification Consortium. He has 26 patents and has published more than 300 papers on cybersecurity. His professional contributions include an extensive list of positions in several industry and public services advisory boards, editorial boards and conference committees. These include the editorial boards of IEEE Security & Privacy Magazine, IEEE Transactions on Dependable and Secure Computing, IEEE Transactions on Information Forensics and Security, Journal of Computer Science and Technology, and Steering Committee Chair of the ACM Asia Conference on Computer and Communications Security. He is an IEEE Fellow.

Top


Keynote Speaker 4: Prof. Lajos Hanzo, University of Southampton, UK (Fellow of the Royal Academy of Engineering of UK, Fellow of IEEE)
Title: Quantum-Search Algorithms, Quantum Codes and All That...

Abstract: Since Marconi demonstrated the feasibility of radio transmissions, researchers have endeavored to realize the dream of flawless wireless multimedia telecommunications, creating the impression of tele-presence - at the touch of a dialling key...

However, making this dream a reality required 'quantum' leaps both in digital signal processing and in its nano-electronics based implementation, facilitated by advances in science both in Edinburgh and farther afield. This process has been fueled by a huge consumer market. Moore's laws has indeed prevailed since he outlined his empirical rule-of-thumb in 1965, but based on this the scale of integration is set to depart from classical physics obeying the well-understood rules revealed by science and enter into a new world, where the traveler has to obey the sometimes strange new rules of the quantum-world. The quest for quantum-domain communication solutions was inspired by Feynman's revolutionary idea in 1985: particles such as photons or electrons might be relied upon for encoding, processing and delivering information. During the last three decades researchers and engineers often considered a pair of open problems. Firstly, classic systems relying on the efficient processing capability of quantum-search algorithms were considered in the area of quantum-assisted communications, while the branch of quantum-domain communications relies on quantum channels. The latter may simply be constituted by the deleterious effects of the environment perturbing the quantum-state particles.In wireless communications we often encounter large-scale search problems, some of which may be efficiently solved with the aid of bio-inspired random guided algorithms or quantum-search techniques. For example, Grover's algorithm is capable of searching through an N-element data-base with the aid of √N cost-function evaluations. Commencing with a brief historical perspective, a variety of efficient quantum-assisted solutions will be exemplified.

Prof. Lajos Hanzo, FREng, FIEEE, FIET, RS Wolfson Fellow, received his 5-year Master degree in electronics from the Technical University of Budapest in 1976, his doctorate in 1983 and his Doctor of Sciences (DSc) degree in 2004. During his career in telecommunications he has held various research and academic posts in Hungary, Germany and the UK. Since 1986 he has been with the School of ECS, University of Southampton, UK, where holds the Chair in Telecommunications. His current research interests are featured at (http://www-mobile.ecs.soton.ac.uk).




Top


Keynote Speaker 5: Prof. Jianhua Ma, Hosei University, Japan
Title: From Personal Big Data to Personal Cyber Buddies in Hyperworld

Abstract: Cyberspace has emerged as an unprecedented digital space in addition to conventional spaces, and further brought about a new global digital environment known as cyberworld. We are undergoing the revolutionary process of cyberization to form the novel cyberworld and reform existing physical, social and mental worlds towards a cyber-enabled hyperworld. Can we successfully adapt to these new worlds to truly benefit from these cyber technologies and live better in the complex and unknown cyber and cyber-integrated new world environments? It appears that human abilities in perception, communication, management, control and cognition will not be sufficient to directly handle so many cyber things and cyber-conjugated physical, social and mental things. This talk presents a novel way to create a group of human-centered or individual-oriented cyber buddies that may help an individual’s activities in the cyber-enabled hyperworld. These personal cyber buddies are expressed as a general notation x-I including Cyber-I, Wear-I, Robo-I, Ambi-I, Web-I, Social-I and Health-I. The main features and functions of these personal cyber buddies are explained, and their future perspectives are discussed.

Prof. Jianhua Ma is a professor in the Faculty of Computer and Information Sciences, Hosei University, Tokyo, Japan. He served as the head of Digital Media Department of Hosei University in 2011-2012. His research interests include multimedia, networking, ubiquitous/pervasive computing, social computing, wearable technology, IoT, cyber life and cyber intelligence. Ma is one of pioneers in research on Hyper World and Cyber World (CW) since 1996, and was a co-initiator of the first international symposium on Cyber World in 2002. He first proposed ubiquitous intelligence (UI) towards a smart world (SW), which he envisioned in 2004, and was featured in the European ID People Magazine in 2005. He has conducted several unique CW-related projects including the cyber individual (Cyber-I), which was featured by and highlighted on the front page of IEEE Computing Now in 2011. Ma has published more than 250 papers, co-authored/edited over 15 books and 25 journal special issues, and delivered over 25 keynote speeches at international conferences. He has founded three IEEE Congresses on ‘Cybermatics’, ‘Smart World’, and ‘Cyber Science and Technology’, respectively, as well as IEEE Conferences on Ubiquitous Intelligence and Computing (UIC), Pervasive Intelligence and Computing (PICom), Advanced and Trusted Computing (ATC), Dependable, Autonomic and Secure Computing (DASC), Cyber Physical and Social Computing (CPSCom), Internet of Things (iThings), and Internet of People (IoP). He is a Chair of IEEE Technical Committee on Cybermatics, and a Chair of IEEE Technical Committee on Smart World.

Top


Keynote Speaker 6: Prof. Ljiljana Trajkovic, Simon Fraser University, Canada (IEEE Fellow)
Title: Data Mining and Machine Learning for Analysis of Network Traffic

Abstract: Collection and analysis of data from deployed networks is essential for understanding modern communication networks. Data mining and statistical analysis of network data are often employed to determine traffic loads, analyze patterns of users' behavior, and predict future network traffic while various machine learning techniques proved valuable for predicting anomalous traffic behavior. In described case studies, traffic traces collected from various deployed networks and the Internet are used to characterize and model network traffic, analyze Internet topologies, and classify network anomalies.

Prof. Ljiljana Trajkovicreceived the Dipl. Ing. degree from University of Pristina, Yugoslavia, in 1974, the M.Sc. degrees in electrical engineering and computer engineering from Syracuse University, Syracuse, NY, in 1979 and 1981, respectively, and the Ph.D. degree in electrical engineering from University of California at Los Angeles, in 1986.

She is currently a Professor in the School of Engineering Science at Simon Fraser University, Burnaby, British Columbia, Canada. From 1995 to 1997, she was a National Science Foundation (NSF) Visiting Professor in the Electrical Engineering and Computer Sciences Department, University of California, Berkeley. She was a Research Scientist at Bell Communications Research, Morristown, NJ, from 1990 to 1997, and a Member of the Technical Staff at AT&T Bell Laboratories, Murray Hill, NJ, from 1988 to 1990. Her research interests include high-performance communication networks, control of communication systems, computer-aided circuit analysis and design, and theory of nonlinear circuits and dynamical systems.

Dr. Trajkovic serves as Junior Past President (2016–2017) of the IEEE Systems, Man, and Cybernetics Society and served as President (2014–2015), President-Elect (2013), Vice President Publications (2012–2013 and 2010–2011), Vice President Long-Range Planning and Finance (2008–2009), and a Member at Large of its Board of Governors (2004–2006). She served as 2007 President of the IEEE Circuits and Systems Society. She was a member of the Board of Governors of the IEEE Circuits and Systems Society (2001–2003 and 2004–2005). She is Chair of the IEEE Circuits and Systems Society joint Chapter of the Vancouver/Victoria Sections. She was Chair of the IEEE Technical Committee on Nonlinear Circuits and Systems (1998). She is General Co-Chair of SMC 2020 and served as General Co-Chair of SMC 2016 and HPSR 2014, Technical Program Co-Chair of ISCAS 2005, and Technical Program Chair and Vice General Co-Chair of ISCAS 2004. She served as an Associate Editor of the IEEE Transactions on Circuits and Systems (Part I) (2004–2005 and 1993–1995), the IEEE Transactions on Circuits and Systems (Part II) (1999–2001 and 2002-2003), and the IEEE Circuits and Systems Magazine (2001–2003). She was a Distinguished Lecturer of the IEEE Circuits and Systems Society (2010–2011 and 2002–2003). She is a Professional Member of IEEE-HKN and a Fellow of the IEEE.

Top


Keynote Speaker 7: Professor Kin K. Leung, Imperial College London, UK (IEEE Fellow)
Title: Service Placement and Migration in Mobile Edge Clouds

Abstract: Mobile edge cloud (MEC) is a new cloud computing paradigm, which makes use of small-sized edge clouds to provide real-time services to users. Due to the coexistence of the core (centralized) cloud, users, and one or multiple layers of MECs, an important problem is to decide on which computational entity to place and execute different components of an application. This application (or workload) placement problem is notoriously hard, and therefore, heuristic algorithms without performance guarantees are generally employed.

In this talk, the speaker will first address the application placement problem. The user application and the physical computing system are modeled as an application graph and a physical graph with resource demands or availabilities annotated on them, respectively. It is shown that the optimal solution or solution with performance bounds can be obtained for specific graph structures.

As the second part of this talk, the speaker will discuss the issues of dynamic service migration in MECs. As users move over time, the MEC components that have been providing service to the users will no longer be able to do so efficiently and service migration to other components is thus required. It is challenging to make these migration decisions in an optimal manner because of the uncertainty in user/MEC mobility as well as possible non-linearity of the migration and transmission costs. The service migration problem can be formulated as the Markov Decision Process (MDP), which captures general cost models and provides a mathematical framework to design the optimal service migration policies. To overcome the computation complexity, the underlying state space is approximated based on the distance between the user and service locations. The effectiveness of the proposed approach is illustrated by simulation using real-world mobility traces of taxis in San Francisco.

Professor Kin K. Leungreceived his B.S. degree from the Chinese University of Hong Kong in 1980, and his M.S. and Ph.D. degrees from University of California, Los Angeles, in 1982 and 1985, respectively. He joined AT&T Bell Labs in New Jersey in 1986 and worked at its successor companies, AT&T Labs and Bell Labs of Lucent Technologies, until 2004. Since then, he has been the Tanaka Chair Professor in the Electrical and Electronic Engineering (EEE), and Computing Departments at Imperial College in London. He is the Head of Communications and Signal Processing Group in the EEE Department. His research interests focus on networking, protocols, optimization and modeling of wireless broadband, sensor and ad-hoc networks. He also works on multi-antenna and cross-layer designs for the physical layer of these networks.

He received the Distinguished Member of Technical Staff Award from AT&T Bell Labs (1994), was a co-recipient of the 1997 Lanchester Prize Honorable Mention Award, and was elected as an IEEE Fellow (2001). He received the Royal Society Wolfson Research Merits Award (2004-09), and was elected as member of Academia Europaea (2012). He has published 290 papers and received 45 U.S. patents. His results were applied to AT&T and Lucent products and services, while his work on WiFi technology went through a successful field trial at an airport. In terms of professional activities, he serves as a member (2009-11) and the chairman (2012-15) of the IEEE Fellow Evaluation Committee for Communications Society. He has also served an editor and guest editor for 10 IEEE and ACM journals, and as committee members of many technical conferences.

Top


Keynote Speaker 8: Prof. Azzedine Boukerche, University of Ottawa, Canada (Fellow of the IEEE, Fellow of The Canadian Academy of Engineering, Fellow of The Engineering Institute of Canada, Fellow of the American Association for the Advancement of Science)
Title: Autonomous and Connected Vehicles: A New Challenge for Smart Cities

Abstract: In this presentation, we share results from several major research projects related to the design of "cognitive" cars and smart roads applications through the DIVA Strategic Research Network, the TRANSIT Network and the PARADISE Research Laboratory at the University of Ottawa. First, we will review the main challenges of this work include modeling, simulation and design issues and discuss some results obtained recently. Next, we will talk about LIVE testbed, a convergence of distributed simulation, wireless multimedia and vehicular sensor technologies we are developing at DIVA and PARADISE Research Laboratory for an urban vehicular grid. This testbed will facilitate and enable us to evaluate and design new protocols and applications for future generations of autonemous/connected vehicular and sensor network technologies.

Prof. Azzedine Boukerche is a Distinguished University Professor and holds a Senior Canada Research Chair Tier-1 position at the University of Ottawa. He is the Scientific Director of NSERC-DIVA Strategic Research Network and NSERC TRANSIT Research Network, and a Director of PARADISE Research Laboratory at uOttawa. He worked as a Senior Scientist at the Simulation Sciences Division, Metron Corporation located in San Diego. He spent a year at the JPL/NASA-California Institute of Technology where he contributed to a project centered about the specification and verification of the software used to control interplanetary spacecraft operated by JPL/NASA Laboratory. He is a Fellow of IEEE (Computer Science Society), EiC, the Canadian Academy of Engineering and the American Association for the Advanacement of Science. He is also a recipient of several international Awards, uncluding,?Cátedra de Excelencia at the University Carlos III of Madrid?(UC3M),?the IEEE G. Gotlieb Medal Award, the Ontario Premier Researcher Award, and IEEE TCPP, and IEEE ComSoft Technical Achievement Awards.

Top


Keynote Speaker 9: Prof. Hai Jin, Huazhong University of Science and Technology, China (Cheung Kung Scholars Chair Professor, Fellow of the CCF)
Title: Towards Dataflow-based Graph Accelerator

Abstract: Existing graph processing frameworks greatly improve the performance of memory subsystem, but they are still subject to the underlying modern processor, resulting in the potential inefficiencies for graph processing in the sense of low instruction level parallelism and high branch misprediction. These inefficiencies, in accordance with our comprehensive micro-architectural study, mainly arise out of a wealth of dependencies, serial semantic of instruction streams, and complex conditional instructions in graph processing. In this talk, we propose that a fundamental shift of approach is necessary to break through the inefficiencies of the underlying processor via the dataflow paradigm. It is verified that the idea of applying dataflow approach into graph processing is extremely appealing for the following two reasons. First, as the execution and retirement of instructions only depend on the availability of input data in dataflow model, a high degree of parallelism can be therefore provided to relax the heavy dependency and serial semantic. Second, dataflow is guaranteed to make it possible to reduce the costs of branch misprediction by simultaneously executing all branches of a conditional instruction. Consequently, we make the preliminary attempt to develop the dataflow insight into a specialized graph accelerator. We believe that our work would open a wide range of opportunities to improve the performance of computation and memory access for large-scale graph processing.

Prof. Hai Jin is a Cheung Kung Scholars Chair Professor of computer science and engineering at Huazhong University of Science and Technology (HUST) in China. Jin received his PhD in computer engineering from HUST in 1994. In 1996, he was awarded a German Academic Exchange Service fellowship to visit the Technical University of Chemnitz in Germany. Jin worked at The University of Hong Kong between 1998 and 2000, and as a visiting scholar at the University of Southern California between 1999 and 2000. He was awarded Excellent Youth Award from the National Science Foundation of China in 2001. Jin is the chief scientist of ChinaGrid, the largest grid computing project in China, and the chief scientists of National 973 Basic Research Program Project of Virtualization Technology of Computing System, and Cloud Security. Jin is a Fellow of CCF, senior member of the IEEE and a member of the ACM. He has co-authored 22 books and published over 800 research papers. His research interests include computer architecture, virtualization technology, cluster computing and cloud computing, peer-to-peer computing, network storage, and network security.


Top


Keynote Speaker 10: Prof. Vijay Varadharajan, The University of Newcastle, Australia (FIEE, FBCS, FACS, FIEAust, FIMA)
Title: Security Challenges in Software Defined Networks Policy based Security Architecture for Software Defined Networks

Abstract: As networks expand in size and complexity, they pose greater administrative and management challenges. Increasingly, current networks are highly heterogeneous with many different devices, from small sensors to network routers to many different clients and servers and peripherals. Furthermore, these devices use different network technologies such as fixed, wireless and mobile networks. In such a complex heterogeneous environment, management of network devices, of mobility of users and devices, the dynamic variation in networks (due to failure of devices and network links), as well as the dramatic increase in security attacks are posing serious challenges.

Software Defined Networks (SDN) is rapidly emerging as a disruptive technology, poised to change communication networks much the same way cloud computing is changing the “compute” world. It is altering the texture of modern networking, moving away from the current control protocols dominant in the TCP/IP Internet stack, towards something more flexible and programmable. It is potentially changing the way networking will be conducted in the future, by enabling devices that are open and controllable by external open software, unlike today’s proprietary network equipment that has protocols embedded into them by the vendors.

In this sense, SDN opens up new avenues of research to realize network capabilities that were impossible or cumbersome before, thereby helping to make future networks more manageable and practicable. Although SDN offers several advantages to deal with complexities in current networks, a critical issue in SDN at present is that of security. Securing networks is becoming more challenging to businesses, especially with bring your own devices (BYOD), increased cloud adoption and the Internet of Things (IoT).

In this talk, we will start by looking at the security challenges that arise in Software Defined Networks (SDNs). We will discuss the various security threats in SDNs, and highlight the characteristics that are unique to SDN which make it suitable to counteract these threats and attacks. Then we will propose a policy based security architecture for a distributed SDN environment. We will discuss the specification of security policies in both intra and inter domain environments, and illustrate them with example scenarios. Our architecture can be used in either reactive or in a proactive mode. In the reactive mode, the first packet of the flow received by switch will trigger the insertion of flow entries in switches in the network. In the proactive approach, the flow tables in the switches are pre-configured by the Controller, thereby reducing the flow setup times. Then we will describe the implementation of the SDN security architecture and discuss some results. Finally we will conclude the talk by outlining some further work extending the proposed SDN security architecture with IoT devices.

Prof. Vijay Varadharajan is the Global Innovation Chair Professor in Cyber Security at the University of Newcastle. He is also the Director of Advanced Cyber Security Engineering Research Centre (ACSRC) at the University of Newcastle.

Previously he was the Microsoft Chair Professor in Innovation in Computing in Australia at Macquarie University. Before this he was Dean of School of Computing and IT at University of Western Sydney (UWS). Before UWS, Vijay headed Security Research Worldwide for Hewlett-Packard Labs (US/UK) based at European Headquarters at HP Labs Bristol. He led and managed several research projects in UK, US, Germany, France and Italy and under his leadership several security research technologies were transferred into commercially successful HP products generating billions of dollars in revenue. He also headed the Technical Security Strategy Initiative at HP under the Senior Vice President of HP. Before HP, he was Research Manager of Data Security Lab at British Telecom Research Labs. U.K., and was a Lecturer at Reading University and Research Fellow at Plymouth/Exeter Universities.

Vijay was an inaugural Board Member of International Advisors of TCPA, USA, (originally formed by HP, Microsoft, Intel, Sun and Compaq). From 2002, he has been on the Trustworthy Computing Advisory Board at Microsoft, USA until 2015. From 2011 till 2015, he was on the International Security Advisory Board SAP (Germany) and Research and Technology Advisory Board SAP (USA). Vijay was also a member of the Australian Government’s Peak Security Advisory Group for the Minister of Broadband, Communications and Digital Economy, Australia (2008-2013) and a member of the expert ICT Advisory Panel at NSW State Government, Australia (2014-2015). He is a member of the Australian Academy of Science National Committee on Information and Communication Systems (2014 onwards) and a member of the Australian Government Research Council College of Experts in Engineering, Mathematics and Informatics (2011-2013). He has been the Technical Board Director of Computer Science at Australian Computer Society (1999-2006), and Chair of the National Taskforce on E-Security.

Vijay has been on the Editorial Board of several journals including the IEEE Transactions in Dependable and Secure Computing, IEEE Transactions in Information Forensics and Security, IEEE Transactions in Cloud Computing, the ACM Transactions on Information Systems Security, Springer International Journal of Information Security and Dept Editor of IEEE Security and Privacy.

Vijay has published over 400 papers in International Journals and Conferences, has co-authored and edited 10 books and holds 3 patents. His current areas of research interest include Web Services Security, Secure Distributed Applications, Trusted Computing, Wireless and Mobile Security, Cloud Computing Security, Internet Security, Cyber Security Attacks, Secure Social Computing, Security Policies and Architectures. He has graduated 35 PhD Research Students and 11 Masters Research Students.

Vijay has had several visiting positions at different institutions over the years including Senior Research Scientist at Microsoft Research Cambridge UK and Redmond, Visiting Professor at the Institute of Mathematical Sciences at National University of Singapore, Invited Professor at French National Research Labs (INRIA), Visiting Professor at eScience Institute, Edinburgh University, Invited Professor at the Indian Inst. of Technology Roorkee and Visiting Professor at the Indian Institute of Science in conjunction with a Senior Fellowship from Australian Academy of Science and Indian National Academies, Fellow at British Telecom Research Labs., UK, and a Visiting Professor at the Chinese Academy of Sciences. He also holds a Mercator Fellowship with the German National Science Foundation and Technical University of Darmstadt, Germany.

Vijay is a Fellow of the British Computer Society (FBCS), a Fellow of the IEE (FIEE), a Fellow of the Institute of Mathematics, UK (FIMA), a Fellow of the Australian Institute of Engineers (FIEAust) and a Fellow of the Australian Computer Society (FACS).

Top


Keynote Speaker 11: Prof. Md Zakirul Alam Bhuiyan, Fordham University, USA
Title: Tracking Ubiquitous Radio Signal Activities: Sensing and Security Application Perspectives

Abstract: Nowadays, wireless signals are ubiquitous and are around of us; some pass through us and some reflect off us. Tracking these signals gives the limit of ISM band radiometric detection to a new level, including motion detection, gesture recognition, localization, and even classification. This research focuses on answers to questions, without interrupting the data communication, how can we leverage wireless radio signals passively for various sensing applications. For example, just raise your hand, finger-swipe the air, your lights will power down; swipe your hand left-to-right or right-to-left, your TV channel will be changed; or just tap your mobile screen to see your heartbeat? All of these, we can achieve with our wireless devices (namely, Wi-Fi, wireless sensor), but without the need of any sensing or additional transmitting unit. We will highlight these signals can extend our senses, enabling us to see moving objects through walls, behind the closed door, and in the dark where even cameras don’t work well and security personnel cannot get in. We will discuss a set of emerging wireless sensing applications that can change our current thoughts on sensing and see how such signals activities can be utilized to penetrate our security. Finally, we cover some basic methods, techniques, challenges how signals are used in such applications.

Prof. Md Zakirul Alam Bhuiyan is currently an assistant professor of the Department of Computer and Information Sciences at the Fordham University, NY, USA. Earlier, he worked as an assistant professor at the Temple University. His research focuses on dependable cyber physical systems, WSN applications, big data, cloud computing, and cyber security. He has served as a lead guest editor and associates editor for IEEE TBD, ACM TCPS, INS, FGCS, IEEE IoT journal, Cluster Computing, TJCA, and so on. He has also served as a general chair, program chair, workshop chair, publicity chair, TPC member, and reviewer of international journals/conferences. Currently, he is a general chair for IEEE DASC 2018 (Greece), DependSys 2018 (China), and a program chair for IEEE I-SPAN 2018 (China) and IEEE SmartWorld 2018 (China), and a TPC member of IEEE INFOCOM 2018 (USA). He has received the IEEE TCSC Award for Excellence in Scalable Computing for Early Career Researchers (2016-2017) and the IEEE Outstanding Leadership Award (2016) and Service Award (2017). He is a senior member of IEEE and a member of ACM.

Top


* More keynote speakers will be added later.