Home | Committees | Call for Papers | Paper Submission | Registration | Program | Best Papers


Program Information

Online Link


Program at a glance

December 12 December 13 December 14 December 15
09:00-09:30 Session #2
09:30-10:00
10:00-10:30 Session #6 Session #9
10:30-11:00
11:00-11:30 Coffee Break Ending
Organize Meeting
Session #3
11:30-12:00
12:00-12:30 Lunch Break
Lunch Break
12:30-13:00
13:00-13:30
13:30-14:00 Session #7
Session #4
14:00-14:30 Registration
14:30-15:00
15:00-15:30 Openning
Keynote Speech
15:30-16:00 Coffee Break
Coffee Break
Session #8
16:00-16:30 Break Time Session #5
Session #1
Ending
16:30-17:00
17:00-17:30
17:30-18:00

Program on December 12

December 12 (Saturday)
14:00-15:00 Registration
15:00-15:10 Openning
15:10-16:00 Keynote Speech
16:00-16:10 Break Time
16:10-17:10 Session #1
1. The Implementation of IoT-based Smart Laboratory Management System
2. The Implementation of Smart Aquarium System with Intelligent Sensors
3. A Study on the Mechanism of Blockchain Cryptocurrency Implementation: Learning Coin of Campus
4. Attitudes of Single Parents and Children for EFL Co-Learning Schedules of Digital Picture Storybooks

Keynote Speech

    Abstract
  • The 3G and 4G mobile communications had been developed for many years. The 5G mobile communication is scheduled to be launched in 2020. In the future, a wireless network is of various size of cells and different type of communication technologies, forming a special architecture of Heterogeneous Networks (HetNet). Under the complex network architecture, interference and handover problems are critical challenges in access network. How to efficiently manage small cells and to choose an adequate access mechanism for the better quality of service is a vital research issue. Traditional network architecture can no longer support existing network requirements. It is necessary to develop a novel network architecture. Therefore, this keynote speech will share a solution of deep learning-based B5G mobile network which can enhance and improve communication performance through combing some specific technologies. e.g., deep learning, fog computing, cloud computing, cloud radio access network (C-RAN) and fog radio access network (F-RAN).

    Short Bio
  • Han-Chieh Chao received his M.S. and Ph.D. degrees in Electrical Engineering from Purdue University, West Lafayette, Indiana, in 1989 and 1993, respectively. He is currently a professor with the Department of Electrical Engineering, National Dong Hwa University, where he also serves as president. He is also with the Department of Computer Science and Information Engineering, National Ilan University, Taiwan. He was the Director of the Computer Center for Ministry of Education Taiwan from September 2008 to July 2010. His research interests include IPv6, Cross-Layer Design, Cloud Computing, IoT, and 5G Mobile Networks. He has authored or co-authored 4 books and has published about 400 refereed professional research papers. He has completed more than 150 MSEE thesis students and 11 Ph.D. students. He serves as the Editor-in-Chief for the Institution of Engineering and Technology Networks, the Journal of Internet Technology, the International Journal of Internet Protocol Technology, and the International Journal of Ad Hoc and Ubiquitous Computing. He is a Fellow of IET (IEE) and a Chartered Fellow of the British Computer Society. Dr. Chao has been ranked as the top 10 Computer Scientists in Taiwan for 2020 by Guide2Research. Due to Dr. Chao’s contribution of suburban ICT education, he has been awarded the US President's Lifetime Achievement Award and International Albert Schweitzer Foundation Human Contribution Award in 2016.


Program on December 13

December 13 (Sunday)
09:00-11:00 Session #2
9. Towards Story-based Summarization of Narrative Multimedia
23. Breaking a Masked AES Implementation Using a Deep Learning-based Attack
24. Toward Software-Defined Moving Target Defense for Secure Service Deployment Enhanced with a User-Defined Orchestration
29. Efficient healthcare service based on Stacking Ensemble
50. A Study on the Application of Technical Assessment Methodology(TAM) for Cyber Security in Nuclear Power Plant
32. Anomaly detection in time-series data environment
34. Machine Learning-based Profiling Attack Method in RSA Prime-Multiplication
37. Blueprint for a secure container to protect data in edge cloud computing environment
11:00-11:20 Coffee Break
11:20-12:20 Session #3
(IITP Smart Signage Workshop)
47. Reunion block for high magnification histopathology microscopic image analysis
48. Whole Slide Image Classification and Segmentation using DeepLearning
61. A Classification method of Fake News based on Ensemble Learning
30. Efficient data processing method for edge intelligence based on SVM
12:20-13:40 Lunch Break
13:40-15:40 Session #4
43. A Study on the Digital Forensic Method for Decentralized Web Service
44. Study on Hybrid Cloud-based Cyber Threat Intelligence Sharing Model Requirements Analysis
45. CERT Training Platform over the Event-Recordable Container
46. Fault Injection Method for AES implemented in hardware without artificial triggering
39. Novel Single-Trace ML Profiling Attacks on NIST 3 Round candidate Dilithium
40. Comments on "Securing implantable cardiac medical devices: Use of radio frequency energy harvesting"
41. Research on PEB-LDR Data Analysis Technique for DLL Injection Detection on ICS Engineering Workstation
42. A Formal Security Verification on He and Zeadally's Authentication Protocol for IMD-Enabled Ambient Assisted Living System
15:40-16:00 Coffee Break
16:00-18:00 Session #5
51. XGBoost based Packer Identification study using Entry point
52. Neural network system using geometric mean
53. Detection and Analysis Technique for Manipulation Attacks on PLC Control Logic
54. Study on Anomaly Detection Technique in an Industrial Control System Based on Machine Learning
55. Suggest a Secure Energy Trading Model based on a Blockchain
56. A Brief Survey on Security Vulnerabilities of Mobile Baseband
57. Automatic Seed Generation based Hybrid Fuzzing for Code Coverage Efficiency
58. Machine Learning based Malware Detection with the 2019 KISA Data Challenge Dataset

Program on December 14

December 14 (Monday)
10:00-12:00 Session #6
10. BlockChain develops student positioning system on campus
11. Developing a Model to Explore Consumer Buying Behaviors through Long Short-Term Memory
12. A Clicks-and-Mortar Smart System
13. Developing Intelligent Feeding Systems based on Deep Learning
14. Training analysis of double canoe based on IOT
15. Construction of Diving Record Wearable Device Based on IOT
16. On the establishment of e-referee for sailing ships based on deep learning
17. Weights Fine Tuning of Convolutional Neural Network based on Simulated Annealing Algorithm
12:00-13:30 Lunch Break
13:30-15:30 Session #7
18. Building Sustainable Business Indices for Hotel Industry from Green Supply Chain Perspective
19. Understand the public insurance purchase orientation through the triangle theory of love
20. Understanding users' switching behavior of hypermarket marketing methods: An empirical study from the perspective of push-pull-mooring framework
21. An Effective Multi-Swarm Algorithm for Optimizing Hyperparameters of DNN
22. An Effective Optimizer based on Global and Local Searched Experiences for Short-term Electricity Consumption Forecasting
25. An Effective Algorithm based on Search Economics for Multi-Objective Optimization
26. The Development of UAV-based Air Quality Monitor System
27. Intelligent Controlling System in Aquaculture
15:30-15:50 Coffee Break
15:50-16:20 Session #8
28. A Smart Monitoring System in Fish Farm
33. The Whale Optimization Algorithm for Hyperparameter Optimization in Network-Wide Traffic Speed Prediction
38. A Value-added Platform of Intelligent Home-care Management of Elderly for Improving Work Willingness of Home-care workers
59. An Image Processing Approach for Improving the Recognition of Cluster-like Spheroidized Carbides
60. Graphite Classification of Gray Cast Iron in Metallographic via a Deep Learning Approach
49. Proposed On-site Document Sharing System using FIDO
16:20-16:30 Ending

Program on December 15

December 15 (Tuesday)
10:00-11:00 Session #9
5. Security Protection with Dynamic Assigned Address Mechanism in Industrial Control Systems
6. Differential Privacy Protection with Group Onion Routing based on AI-based URL Classification
7. MiningBreastCancer: Selection of Candidate Gene Associated with Breast Cancer via Comparison between Data Mining of TCGA and Text Mining of PubMed
8. An intelligent secure and reliable patrol system
11:00-11:10 Ending
11:10-13:00 Organize Meeting

Sponsored by ACM and Korean Institute of Smart Media
Hosted by BK21 Convergence Engineering for Intelligent Drone, Sejong University & BK21 FAST Artificial Intelligence Convergence Center, Gachon University