Last Update: 2007/3/29
 P A I S I 2 0 0 7    P R O G R A M    S C H E D U L E  

Please download the list of accepted papers here



Tuesday, April 10th, 2007

03:00pm to 07:00pm
Workshop Registration


Wednesday, April 11th, 2007

A
B
08:25am
to
08:30am
Opening Remarks
08:30am
to
08:40am
Welcome Speech
Tianchun Xu, Deputy Chief Executive, Wenjiang District, Chengdu, Sichuan, China (Abstract)
08:40am
to
09:15am
Keynote Speech
Exploring Extremism and Terrorism on the Web: The Dark Web Project
Hsinchun Chen, University of Arizona (Abstract)
Session 1:
09:15am
to
10:35am
Session W1-A: Crime Analysis

Analyzing and Visualizing Gray Web Forum Structure
Christopher C. Yang, Torbun D. Ng, Jau-Hwang Wang, Chih-Ping Wei, Hsinchun Chen (30 mins.)

An Empirical Analysis of Online Gaming Crime Characteristics from 2002 to 2004
Yungchang Ku, Ying-Chieh Chen, Kuo-Ching Wu, Chaochang Chiu (30 mins.)

Trends in Computer Crime and Cybercrime Research during the Period 1974-2006: A Bibliometric Approach
Chichao Lu, Wenyuan Jun, Weiping Chang (20 mins.)
Session W1-B: Cyberinfrastructure Protection

Lightweight Anomaly Intrusion Detection in Wireless Sensor Networks

Haiguang Chen, Peng Han, Xi Zhou, Chuanshan Gao (30 mins.)

ASITL: Adaptive Secure Interoperation using Trust-Level
Li Jin, Zhengding Lu (30 mins.)

PPIDS: Privacy Preserving Intrusion Detection System
Hyun-A Park, Dong Hoon Lee, Jong In Lim, Sang Hyun Cho (20 mins.)
Session 2:
11:00am
to
12:20pm
Session W2-A: Emergency Response

What-if Emergency Management System: A Generalized Voronoi Diagram Approach
Ickjai Lee, Reece Pershouse, Peter Phillips, Chris Christensen (30 mins.)

Agent Based Framework for Emergency Rescue and Assistance Planning
Yujun Zheng, Jinquan Wang, Jinyun Xue (30 mins.)

Evaluating the Disaster Defense Ability of Information Systems
Baowen Zhang, Jing Zhang, Ning Zhou, Mingang Chen (20 mins.)

Session W2-B: Cyberinfrastructure Protection

TCM-KNN Algorithm for Supervised Network Intrusion Detection

Yang Li, Bin-Xing Fang, Li Guo, You Chen (30 mins.)

Research on Hidden Markov Model for System Call Anomaly Detection
Quan Qian, Mingjun Xin (30 mins.)

Port and Address Hopping for Active Cyber-Defense
Leyi Shi, Chunfu Jia, Shuwang Lu, Zhenhua Liu (20 mins.)
2:00pm
to
2:30pm
Plenary Invited Talk
Activity Mining to Strengthen Debt Prevention
Chengqi Zhang, City University of Hong Kong and University of Technology, Sydney (Abstract)
Session 3:
2:35pm
to
3:55pm
Session W3-A: Emergency Response and Surveillance

A Case-based Evolutionary Group Decision Support Method for Emergency Response
Jidi Zhao, Tao Jin, Huizhang Shen (30 mins.)

Object Tracking with Self-Updating Tracking Window
Huimin Qian, Yaobin Mao, Jason Geng, Zhiquan Wang (30 mins.)

A Hybrid Model for Worm Simulations in a Large Network
Eul Gyu Im, Jung Sik Kim, In Woo Noh, Hyun Jun Jang (20 mins.)

Session W3-B: Cyberinfrastructure Protection

Towards Identifying True Threat from Network Security Data
Zhi-tang Li, Jie Lei, Li Wang, Dong Li, Yang-ming Ma (30 mins.)

Defending DDoS Attacks Using Hidden Markov Models and Cooperative Reinforcement Learning
Xin Xu, Yongqiang Sun, Zunguo Huang (30 mins.)

A Framework for Proving the Security of Data Transmission Protocols in Sensor Network Mi Wen, Ling Dong, Yanfei Zheng, Kefei Chen (20 mins.)
Session 4:
4:15pm
to
5:15pm
Session W4-A: Novel Applications

Airline Safety Evaluation Based on Fuzzy TOPSIS
Yong Deng, Jia Xiong, Ping Fu (20 mins.)

The Treelike Assembly Classifier for Pedestrian Detection
Huimin Qian, Yaobin Mao, Jason Geng, Zhiquan Wang (20 mins.)

A Simple Method to Buyers in Confronting Internet Auction Fraud
Yungchang Ku, Yuchi Chen, Chaochang Chiu (20 mins.)


Session W4-B: Network Security

A RT0-Based Compliance Checker Model for Automated Trust Negotiation
Zhensong Liao, Hai Jin (30 mins.)

A Secure Data Transmission Protocol for Mobile Ad Hoc Networks
Shejie Lu, Jun Li, Zhiyuan Liu, Guohua Cui (30 mins.)
5:35pm
to
7:30pm
Workshop Reception / Award Ceremony and Poster Session

A Web Portal for Terrorism Activities in China
Daniel Zeng, Li Zhang, Donghua Wei, Fei-Yue Wang

An Overview of Telemarketing Fraud Problems and Countermeasures in Taiwan

Jau-Hwang Wang, Jiing-Long Jow, You-Lu Liao, Tyan-muh Tsai, Garfield Hung

Mining the Core Member of Terrorist Crime Group Based On Social Network Analysis
Qihong Liu, Changjie Tang, Shaojie Qiao, Qiwei Liu, Fenlian Wen


Providing Personalized Services for HWME System by Item-based Collaborative Filtering

Qiudan Li, Yaodong Li, Huiguang He, Guanggang Geng, Yuanping Zhu, Chunheng Wang

An Intelligent Agent-Oriented System for Integrating Network Security Devices and Handling Large Amount of Security Events
Yang-ming Ma, Zhi-tang Li, Jie Lei, Li Wang, Dong Li

Link Analysis-based Detection of Anomalous Communication Patterns

Daniel Zeng, Zan Huang

Social Modeling and Reasoning for Security Informatics
Wenji Mao, Daniel Zeng, Li Zhang, Donghua Wei, Fei-Yue Wang


Detecting Botnets by Analyzing DNS Traffic

Hao Tu, Zhi-tang Li, Bin Liu

HMM-based Approach for Evaluating Risk Propagation
Young-Gab Kim, Jong In Lim


A Symptom-based Taxonomy for an Early Detection of Network Attacks

Ki-Yoon Kim, Hyoung-Kee Choi

Privacy Preserving Data Mining In Digital Age
Justin Zhan, Carnegie Mellon Univ.
7:35pm
to
8:30pm
Public Lecture
Social Computing
Fei-Yue Wang, Chinese Academy of Sciences


Thursday, April 12th, 2007

A
B
08:25am
to
08:30am
Announcements
08:30am
to
09:00am
Plenary Invited Talk
"Top 10 Algorithms in Data Mining"
Xindong Wu, University of Vermont (Abstract)
09:00am
to
09:50am
Session T1-A: Data and Text Mining

Anticipatory Event Detection for Bursty Events
Kuiyu Chang, Qi He, Ridzwan Aminuddin, Ridzwan Suri, Ee-Peng Lim (20 mins.)

Community Detection in Scale-free Networks Based on Hypergraph Model
Rong Qian, Wei Zhang, Bingru Yang (20 mins.)
Session T1-B: Information Access and Security


The Study of Government Website Information Disclosure in Taiwan
Yuan-Fa Chen, Yu-Lan Sandy Yeh, Kuo-Ching Wu (20 mins.)

An Inference Control Algorithm for RDF(S) Repository
Jianjiang Lu, Jinpeng Wang, Yafei Zhang, Bo Zhou, Yanhui Li, Zhuang Miao (20 mins.)

10:10am
to
11:15am

Session T2-A: Surveillance and Threat Analysis

Detecting Cyber Security Threats in Weblogs Using Probabilistic Models
Flora S. Tsai, Kap Luk Chan (30 mins.)

Security Assessment for Application Network Services using Fault Injection
Hyungwoo Kang, Dong Hoon Lee (30 mins.)

Session T2-B: Information and Software Watermarking

A Novel Relational Database Watermarking Algorithm
Yu Fu, Cong Jin, Chuanxiang Ma (30 mins.)

Informed Recognition in Software Watermarking
William Zhu (20 mins.)

 

 
Chengdu, China | April 11-12, 2007
© 2004-2006 Chinese University of Hong Kong, University of Arizona