Special Session

ICDIS 2022 technical program will include special sessions. The special session should focus on hot topics of interest to the data intelligence and security community.

 

ICDIS 2022 welcomes the special proposals. The special session proposal should include:

* Title of the session.

* Aim and scope (including a list of the main topic) of the proposed session.

* The names, e-mail addresses, affiliations, websites, and short bios of the organizers.

* (Optional) A list of potential contributors will be very helpful.

 

The proposal will be evaluated based on the topics and the qualifications of the organizers.

 

The special session proposal should be submitted to the special session chair, Weiping Ding (dwp9988@163.com).

 

The deadline of the special session proposal is February 15, 2022. The notification of acceptance will be sent to the organizers no later than March 1, 2022. Early proposal submissions are encouraged. The proposal will be evaluated once received.

 

Once a special session proposal is accepted, the special session chair will add an option in the paper submission system. When the special session authors submit papers, please select the option to indicate that their papers are submitted to a special session.

 

The deadline of the special session papers is the same as the regular paper.

 

All special session papers will be reviewed by the program committee. The review process is the same as the regular paper. If the number of accepted papers is less than 4, the session will be canceled and the accepted papers will be moved to regular sessions. The format of the special session papers is the same as the regular papers. All the accepted special session papers will be included in the conference proceedings.

Special Session 1: "Recent Studies on Cyber Security Solutions in the IoT"

Description & Theme:

The Internet of Things, or IoT, is a system of interrelated computing devices, mechanical and digital machines, objects, animals or people that are provided with unique identifiers (UIDs) and the ability to transfer data over a network without requiring human-to-human or human-to- computer interaction. Due to this advantage, it has been rapidly developed in the last few years. Its cooperative nature enables us to provide fast, cost-effective, and safe solutions for many applications, including Smart City, Autonomous Vehicles and UAV, smart automation of traditional manufacturing. Precisely, every IoT device may sense sensitive data, such as the number of people in an important location or low brake fluid, which should not be unintentionally disclosed. IoT cyber security mechanisms should be implemented in each IoT device to hinder adversaries and attackers from exploring the originally produced sensitive data and prevent system damages, leaks, and financial losses.

Objectives:

  • Privacy-preserving models for IoT environment and its applications

  • Security models for IoT environment and its applications

  • Confidentiality solutions for IoT environment and its applications

  • Understand most Cyber Security solutions available in IoT environment and its applications

  • Reliability solutions for IoT environment and its applications Trust challenges associated with IoT

Submission:

Please follow the ICDIS 2022 instruction for authors and  submit your paper via the ICDIS 2022 online submission system. The papers submitted to the session should select the topic of “Workshop on Recent Studies on Cyber Security Solutions in the IoT”.

Organizers:

  1. Dr. Mehdi Gheisari, Department of CST, Harbin Institute of Technology, Shenzhen, China

  2. Dr. Mehdi Sookhak, Department of Computer science, Texas A&M University-Corpus Christi, Tx, USA

  3. Dr. Seyed Mojtaba Hosseini Bamakan, Yazd University, Iran

  4. Roghayeh Rezaei, Malayer Technical University, Iran

 

Contact:

Mehdi Gheisari (mehdi.gheisari61@gmail.com)

Special Session 2: "Optimization and Security Issues in Data Mining"

Description & Theme:

In the field of data mining, model optimization and data security issues are two related views. Most existing models have only focused on either model performance, or data security issues. However, we increasingly need to consider how to improve model optimization while protecting data security and privacy simultaneously. Therefore, model optimization and data protection may require a balance, which present constant challenges for both academia and industry. Those challenges provide great opportunities for innovative ideas, tools and technologies.

Objectives:

Research areas include, but are not limited to, the following topics:

  • Federated learning;

  • Evolutionary algorithms and its applications;

  • Machine learning methods for security and privacy-preservation;

  • Privacy-preserving models;

  • Deep learning and statistical methods for data mining and its application;

  • Data mining systems and platforms, and their efficiency, scalability, security and privacy;

  • Negative representation of data;

  • Data mining for social networks and its applications.

Submission:

Please follow the ICDIS 2022 instruction for authors and submit your paper via the ICDIS 2022 online submission system. The papers submitted to the session should select the topic of “Optimization and Security Issues in Data Mining”.

Organizers:

  1. Dr. Chenyang Bu, School of Computer Science and Information Engineering, Hefei University of Technology, Hefei, China

  2. Dr. Dongdong Zhao, School of Computer Science and Artificial Intelligence, Wuhan University of Technology, Wuhan, China

  3. Dr. Hao Jiang, School of Computer Science and Technology,  Anhui University, Hefei, China

  4. Dr. Li Ni, School of Computer Science and Technology,  Anhui University, Hefei, China

  5. Fei Liu, School of Computer Science and Information Engineering, Hefei University of Technology, Hefei, China

 

Contact:

Chenyang Bu (chenyangbu@hfut.edu.cn)

Special Session 3: "Privacy Intelligence Technologies for Big Data"

Description & Theme:

In the era of artificial intelligence, massive high-quality data helps the development of artificial intelligence; in turn, artificial intelligence significantly improves the ability of big data management and the utilization level of data mining. Although artificial intelligence can enhance the value of big data, it also poses serious threats to personal privacy data and enterprise business secrets, making the problem of data island one of the biggest obstacles and bottlenecks restricting the development of artificial intelligence. Traditional privacy protection technologies face great challenges in efficiency, function, and applicability when solving the privacy protection problem for big data. Therefore, how to use the relevant advanced cryptography, privacy protection, and AI technologies to research privacy intelligence technologies for big data will help effectively promote secure data sharing and enable the high-quality development of artificial intelligence technology.

Objectives:

Research areas include, but are not limited to, the following topics:

  • Secure multi-party computation

  • Implementation and performance evaluations of homomorphic encryption schemes

  • Attribute-based encryption schemes and applications

  • Encrypted search schemes and applications

  • Practical aspects of functional encryption

  • Blockchain-based applications

  • Differential privacy applications

  • Cloud secure computation

Submission:

Please follow the ICDIS 2022 instruction for authors and submit your paper via the ICDIS 2022 online submission system. The papers submitted to the session should select the topic of “Privacy Intelligence Technologies for Big Data”.

Organizers:

  1. Dr. Zoe L. Jiang, School of Computer Science and Technology, Harbin Institute of Technology, Shenzhen, China

  2. Dr. Yang Liu, School of Computer Science and Technology, Harbin Institute of Technology, Shenzhen, China

  3. Dr. Yulin Wu, School of Computer Science and Technology, Harbin Institute of Technology, Shenzhen, China

  4. Dr. Junbin Fang, School of Science and Engineering, Jinan University, Guangzhou, China

  5. Dr. Peng Zhang, School of Electronic and Information Engineering, Shenzhen University, Shenzhen, China

  6. Dr. Zhen Zhao, School of Cyber Engineering, Xidian University, Xi'an, China

 

Contact:

Yulin Wu (wuyulin@hit.edu.cn)

Special Session 4: "Swarm Intelligence in Security and Privacy"

Description & Theme:

Swarm intelligence is an important branch of artificial intelligence (AI). Swarm intelligence is becoming one of the most rapidly growing areas because of its ability to solve complex problems that traditional algorithms could not handle very well. Swarm intelligence techniques have been used in detecting malicious attacks on network systems, analyzing and designing cryptographic primitives, generating the adversarial examples for fooling the deep learning modes, searching the efficient network structure for federated learning, etc. Swarm intelligence techniques have attracted some attention in the computer security and data privacy fields. In the future, swarm intelligence will play a more and more important role in these fields because of its population-based search and learning framework.

 

The aims of this special session are: (1) to present the state-of-the-art work on swarm intelligence in security and privacy; (2) to offer new conceptual swarm intelligence models for security privacy; (3) to provide a forum to disseminate their recent advances and views on future perspectives in the field.

Objectives:

Research areas include, but are not limited to, the following topics:

  • Swarm learning and federated learning

  • Swarm intelligence in the computer security

  • Swarm and evolutionary computation in cryptology

  • Memetic algorithms in the network security

  • Swarm and evolutionary computation for adversarial examples

  • Swarm intelligence and AI backdoors

  • Swarm and evolutionary computation in AI security

  • Robust solutions for evolutionary computing in security challenges

Submission:

Please follow the ICDIS 2022 instruction for authors and submit your paper via the ICDIS 2022 online submission system. The papers submitted to the session should select the topic of “Swarm Intelligence in Security and Privacy”.

Organizers:

  1. Dr. Gai-Ge Wang, Department of Computer Science and Technology, Ocean University of China, Qingdao, China

  2. Dr. Yong Zhang, School of Information and Control Engineering, China University of Mining and Technology, Xuzhou, China

  3. Dr. Wenjian Luo, School of Computer Science and Technology, Harbin Institute of Technology, Shenzhen, China

  4. Dr. Weiping Ding, Nantong University, School of Information Science and Technology, Nantong, China

 

Contact:

Gai-Ge Wang (gaigewang@gmail.com)

Special Session 5: "Data Intelligence and Security in User-Centred Applications and Systems"

Description & Theme:

With the rapid development and prevalence of the latest emerging technologies such as advanced sensing, mobile computing, the Internet of Things, pervasive computing, data mining and deep leaning, a new wave of user-centred applications, such as personalized care and medicine, just-in-time independent living, self-care and self-management, early risk detection and intervention, have attracted increasing attention. Such applications, including these built upon the conception of smart homes, smart cities, intelligent transport, service robots, to name but a few, will change the way we live, work, thus having the huge potential of impacting the society and economy. User-centred applications and systems place special emphases on data intelligence, including computational intelligence, interactive intelligence and cognitive intelligence, and co-design, co-development, user experience, accessibility and acceptability of technologies, systems and services, in particular in the envisioned future smart world environments. Security is also a central research topic in User.Centred Applications and Systems, so that digital possessions and privacy could preserved.

Objectives:

Research areas include, but are not limited to, the following topics:

  • Computational intelligence, interactive intelligence and cognitive intelligence

  • Methodologies and frameworks for intelligence engineering 

  • User engineering and modeling techniques

  • Data analytics, behavior analysis and lifestyle recognition

  • Decision support, recommendation techniques

  • Co-design and development methodologies

  • Personalisation and adaptation methods and mechanisms

  • Ethics, privacy and security

  • Standards and interoperability

  • Accessibility and acceptability

  • Design, engineering and prototyping

  • Development and real-world application deployment

Submission:

Please follow the ICDIS 2022 instruction for authors and submit your paper via the ICDIS 2022 online submission system. The papers submitted to the session should select the topic of “User-Centred Applications and Systems”.

Organizers:

  1. Dr. Tao Zhu, School of Computer, University of South China, Hengyang, China

  2. Dr. Sahraoui Dhelim, University College Dublin, Ireland

  3. Prof. Liming Chen, Ulster University, United Kingdom

  4. Prof. Huansheng Ning, University of Science and Technology Beijing, Beijing, China

  5. Prof. Yaping Wan, University of South China, Hengyang, China

Contact:

Tao Zhu (tzhu@usc.edu.cn)

Special Session 6: "Technology of AI Security for Multimedia Understanding"

Description & Theme:

Numerous multimedia data have emerged in both Internet, and accumulated in the video surveillance domain. Therefore, multimedia understanding, which aims to facilitate users understand the target multimedia data from a huge database, has gained increasing research attention.

 

However, the rapid development of multimedia understanding also has the accompanying effect of security problems and the enabling effect in the field of security. On the one hand, multimedia understanding brings new attack and defense methods to the security field. On the other hand, with the emergence of AI attack method, such as sample attack, the data and model of multimedia system become no more safe. Moreover, the unexplainability of artificial intelligence system also makes the operation state of multimedia system trend to be more unpredictable.

 

Therefore, the goal of this special session is to call for a coordinated effort to promote the security technology for multimedia understanding, showcase innovative methodologies and ideas, introduce real systems or applications, as well as propose new real-world datasets and discuss future directions. We solicit manuscripts in all fields that shed light on the multimedia understanding and the technology for the security of its data and model.

Objectives:

Research areas include, but are not limited to, the following topics:

  • Privacy preserving for multimedia understanding

  • The security technology enabled by multimedia

  • The AI security for multimedia understanding

  • New emergency application of multimedia understanding

Submission:

Please follow the ICDIS 2022 instruction for authors and  submit your paper via the ICDIS 2022 online submission system. The papers submitted to the session should select the topic of “Technology of AI Security for Multimedia Understanding”.

Organizers:

  1. Dr. Shuhan Qi, shuhanqi@cs.hitsz.edu.cn, Department of computer science and technology, Harbin Institute of Technology, Shenzhen, China

  2. Dr. Cuiyun Gao, gaocuiyun@hit.edu.cn,  Department of computer science and technology, Harbin Institute of Technology, Shenzhen, China

  3. Dr. Jian Guan, j.guan@hrbeu.edu.cn,Department of computer science and technology,Harbin Engineering University

Contact:

Shuhan Qi (shuhanqi@cs.hitsz.edu.cn)

Special Session 7: "Orientation, Decision and Explainable Action in Imperfect Information Computer Games"

Description & Theme:

Computer game is one of the important fields of artificial intelligence, which studies the cognitive decision-making ability in human intelligence. Computer game has important application value in the fields of military intelligence, financial technology, smart traffic and so on. The progress of the computer game technology, like “Alpha Go system”, represents a new breakthrough in the development of artificial intelligence from perceptual intelligence and cognitive intelligence to decision-making intelligence. The complexity of computer game problems is related to the information condition of the game environments, the scale of players involved and the utilization of computing resources. Especially, imperfect information game is a kind of game with hidden information, which is more complex, more difficult and closer to practical applications. Therefore, it has become a hotspot in recent years.

The aims of this special session are: (1) to present the state-of-the-art work on orientation, decision and explainable action in imperfect information computer game; (2) to provide a forum to discuss novel imperfect information computer game models.

Objectives:

Research areas include, but are not limited to, the following topics:

  • Methods of modeling, orientation and perception in imperfect information game

  • Game tree searching for huge scale game states

  • Deep learning for game agent contribution

  • Reinforcement learning for game agent contribution

  • Swarm intelligence and self-play game mechanism

  • Explainability of game decision-making models

Submission:

Please follow the ICDIS 2022 instruction for authors and submit your paper via the ICDIS 2022 online submission system. The papers submitted to the session should select the topic of “Orientation, Decision and Explainable Action in Imperfect Information Computer Game”.

Organizers:

  1. Dr. Jiajia Zhang, School of Computer Science and Technology, Harbin Institute of Technology, Shenzhen, China

  2. Dr. Peixi Peng, National Engineering Research Center for Visual Technology, School of Computer, Peking University, Beijing, China; and also Peng Cheng Laboratory, Shenzhen , China

  3. Dr. Chao Yu,School of Computer Science and Engineering, Sun Yat-sen University, Guangzhou, China

  4. Dr. Mengyuan Liu, School of Intelligent Systems Engineering, Sun Yat-sen University, Shenzhen, China

Contact:

Jiajia Zhang (zhangjiajia@hit.edu.cn)