2025 4th International Conference on Cryptography, Network Security and Communication Technology
Speakers
Home / Speakers


Invited Speakers

Kato Nei.png


Prof. Kato Nei

Northeastern University, Tokyo

Nei Kato is a full professor and the Dean at the Graduate School of Information Sciences, Tohoku University. He has studied computer networking, wireless mobile communications, satellite communications, ad hoc & sensor & mesh networks, UAV networks, AI, IoT, and Big Data. He is the Editor-in-Chief of the IEEE Internet of Things Journal, a fellow of The Engineering Academy of Japan, IEEE, and IEICE.


Title: Key Technologies of AI-based Communications towards 6G

Abstract:In both academia and industry, the exploration of 6G—a further advanced cellular communication technology—has already begun. As our society becomes increasingly digitalized, hyper-connected, and globally data-driven, future services are anticipated to rely heavily on virtually instantaneous, unlimited wireless connectivity. This presentation will outline the key drivers, challenges, and essential research topics associated with 6G. In particular, I will provide an overview of the cutting-edge technologies in this field, spanning aspects such as the physical layer, networking, and new use cases and service enablers. 






Prof. Bing Shi

Wuhan University of Technology, China

Shi Bing, Professor, Doctoral Supervisor, Vice Dean of the School of Computer and Artificial Intelligence. I graduated with a bachelor's and master's degree from the Department of Computer Science and Technology at Nanjing University, and a PhD from the School of Electronics and Computer Science at the University of Southampton in the United Kingdom, where I worked as a postdoctoral researcher. Dr. Shi Bing is mainly engaged in research related to artificial intelligence and service computing. He has led 4 national level scientific research projects and 4 research projects of the Ministry of Education. His research results are mainly based on artificial intelligence algorithms to solve decision-making in complex distributed scenarios. He has published more than 40 papers in authoritative journals and conferences recommended by the Chinese Computer Society (CCF), such as EAAI, ESWA, IOTJ, TNSM, KBS, ICWS, ICSOC, etc. The main course is a first-class course in Hubei Province, guiding students to participate in subject competitions and winning national and provincial awards multiple times. Dr. Shi Bing is a member of the Institute of Electrical and Electronics Engineers (IEEE), the International Computer Society (ACM), and the Chinese Computer Society (CCF), a member of the Service Computing Committee of the Chinese Computer Society, and a member of the Program Committee of authoritative international conferences such as AAMAS and ECAI.


Title: Economic Driven Resource Allocation and Task Offloading in Edge-Cloud Computing

Abstract:In the edge and cloud computing, how to offload the task and make the resource allocation is a key issue. Specifically, as a distributed system, it is difficult to use a centralized method to make the task offloading and resource allocation decision. In this speech, we discuss how to use economic-incentive based methods to make the task offloading and resource decisions in difficult scenarios, such as the edge system with moving users, uav-assisted edge computing systems and so on.


石兵.png



Aniruddha Bhattacharjya.png


Prof.Aniruddha Bhattacharjya

BCBRBAB INTERCONTINENTAL TRADING SOLUTIONS PRIVATE LIMITED

IEEE Senior Member

ACM Senior member, India

Aniruddha Bhattacharjya is a PhD Alumni of Tsinghua University. He was a PhD scholar (Chinese Government Scholarship (CGS) holder) in Beijing National Research Center for Information Science and Technology, Department of Electronic Engineering, Tsinghua University, Beijing, China under supervision of Prof. Xing Li (Present mentor) [ Late Prof. Wang Jing was his mentor]. This PhD work was supported by National Basic Research Program of China (2012CB316006), and National S&T Major Project (2015ZX03002010-002) and National Natural Science Foundation of China (No. 61631013). He got full travel and conference funding from Tsinghua University's School of Information Science and Technology (SIST) and the Key Laboratory of Universal Wireless Communications (Beijing University of Posts and Telecommunications), Ministry of Education, P.R.China (No.KFKT- 2014101) and National Basic Research Program of China (2012CB316000) to present his paper in Cambridge University, UK. He got full funding for his project from the Key Laboratory of Universal Wireless Communications (Beijing University of Posts and Telecommunications), Ministry of Education, P.R.China (No.KFKT- 2014101) also. Department URL https://www.ee.tsinghua.edu.cn/info/1039/1186.htm His research interests are Cryptography, Information security, Applications of cryptography and IoT and CPS securities etc. He got best paper award in ACM ICC 2016, in Cambridge University, U.K. He has published 48 above International conferences and journal papers and book chapters. He has 16 years above teaching and research experiences. He has a Chinese Innovation patent granted as on date with Tsinghua University's affiliation and as per the protocol of the university.

He is also Senior Member of IEEE Communication Society and Senior Member of IEEE Computer Society. From 2010 he is working with 500 and above International conferences voluntarily of IEEE, ACM, and other renowned publishers'conferences. This year he is working as reviewer with IEEE ICC'24 - IoTSN Symposium, IEEE WCNC 2024 - Track 1, and IEEE WCNC 2024 - Track 3 and others. He is Guest Editor for Several SCI indexed Journals.  He is Reviewer for prestigious SCI journals like:

1. ACM Computing Surveys 

2. IEEE Transactions on Industrial Informatics

3. IT Professional (IEEE Computer Society)

4. IEEE Access

5. IEEE Sensors Journal

6. Future Generation Computer Systems

7. Information Sciences

8. Computers & Security

9. Cluster Computing

10. International Journal of Computers and Applications (IJCA)

11. MPDI Journals like - I.Drones , II.Sustainability III.Sensors IV.Processes V.Energies VI.Applied Sciences VII.Symmetry VIII.Electronics IX.Networks X.Cryptography XI.Future Internet XII.Economics XII.Telecom etc.


Title: Apply of a trusted third party (TTP) to the blockchain-based electronic service (e-service)
Abstract: Trusted Third Party (TTP) is very popular in this present era. This  Trusted Third Party (TTP) can be applied to the blockchain-based electronic service (e-service) in the form of a durable medium. Here an e-service which is storing, managing, and processing sensitive electronic documents is proposed. The developed e-service meets the requirements of both Polish law (related to the durable medium) and market needs. Firstly, the functional requirements were defined. Subsequently, the adequate e-service was designed, and then implemented in a real company in Poland. Due to the nature of the durable medium e-service, the presented research combines scientific and implementation aspects. The designed and implemented e-service is secure (because of using the immutable blockchain technology merged with symmetric and asymmetric cryptographic algorithms) and trusted (by using TTP as the e-service provider, as well as an independent arbitrator monitoring the document storage and processing flow). Finally, the presented approach was experimentally verified using Hyperledger Besu—a blockchain implementation platform. During the realization of two designed test scenarios, over 30,000 transactions were added to the blockchain. Furthermore, security analyses were performed regarding inherent blockchain properties, the use of cryptographic algorithms, and potential cyberattacks and vulnerabilities.



Prof. Xingpo Ma

Xinyang Normal University,China

Xingpo MA obtained his doctor’s degree from Central South University in 2013 in Hunan Changsha, P.R. China. He is currently an associate professor and master's supervisor in Xinyang Normal University, where he got his honorary titles of the young backbone teacher of Xinyang Normal University (XYNU), the young Nanhu scholar of XYNU, the urgently-needed talent for the Internet of Things (IoT) awarded by the Ministry of Industry and Information Technology of P.R. China, and the excellent guidance teacher for bachelor’s thesis in Henan Province in 2022 and 2024, respectively. He had done research for one year in the Commonwealth Scientific and Industrial Research Organization (CSIRO) in Australia as a visiting scholar from 2017. 3 to 2018. 3. His research interests include UAV-assisted big data collection in large-scale IoT, secure federated learning in IoT, and secure fine-grained query processing in IoT. He has published more than 30 papers, many of which have been published in top journals, such as the IEEE Internet of Things Journal. He has received one first prize and three second prizes in the Excellent Science and Technology Paper Award for Higher Education Institutions in Henan Province, and was nominated for the second prize of the 2022 Henan Science and Technology Award.


Title: Secure and Efficient Top-k Query Processing in Internet of Things

Abstract: Top-k query is an important kind of queries in Internet of Things, since it can retrieve the most valuable data from a large amount of sensed data items generated by IoT sensing devices. However, because of the limited resources (e.g., storage and computation capacity) and the short communication radius, how to obtain the correct Top-k query result efficiently from the distributed IoT devices is challenging. Moreover, in hostile environments, adversaries are more inclined to compromise some important IoT nodes, such as the data storage nodes or IoT edge computing servers, to undermine the privacy and completeness of the query results. Thus, it is also an important work to design some secure Top-k query processing schemes to ensure the safety of the queries. This report presents some secure and efficient Top-k query processing schemes in several IoT environmet, such as wireless sensor networks (WSNs), Two-tiered wireless sensor networks (TWSNs), two-tired mobile sensor networks (TMWSNs), and the sensor-cloud systems. It hopes that the presentation can bring new ideas for the researchers who are interested in such a field.




马行坡.png