johann-eder

Prof. Johann Eder

University of Klagenfurt, Austria

dplp Link

tai-chung

Prof. Tai M. Chung

Sungkyunkwan University, Korea

dplp Link

dirk-draheim

Prof. Dirk Draheim

Head of Large-Scale Systems Group of TUT
Tallinn University of Technology, Estonia

dplp Link

sun-jun

Assoc. Prof. Sun Jun

Singapore Management University, Singapore

dplp Link

tbc.

Accepted Papers

To be updated ...

Opening and Keynotes


◦ 08:30 AM on Nov 25, 2020 (GMT+7)

Opening Virtual Conferences ACOMP & FDSE 2020, Quy Nhon

By Conference Chairs


◦ 09:00 AM on Wed Nov 25, 2020 (GMT+7)

AI for CPS Cyber-Security

By Sun Jun (Singapore Management University, Singapore)


◦ 10:00 AM on Wed Nov 25, 2020 (GMT+7)

Big Data Analytics: Opportunities in Business and Service Revolution

By Jian Yang (Macquarie University, Australia)


◦ 09:00 AM on Thu Nov 26, 2020 (GMT+7)

Ensuring Security & Privacy Protection under COVID-19 Pandemic

By Tai M. Chung (Sungkyunkwan University, Korea)


◦ 03:00 PM on Thu Nov 26, 2020 (GMT+7)

Data Quality for Medical Data Lakelands

By Johann Eder (University of Klagenfurt, Austria)


◦ 04:00 PM on Thu Nov 26, 2020 (GMT+7)

Blockchain Technology: Intrinsic Technological and Socio-Economic Barriers

By Dirk Draheim (Tallinn University of Technology, Estonia)


Accepted Paper Screencasts


LNCS 12466


Invited Keynote

Blockchain Technology: Intrinsic Technological and Socio-Economic Barriers

Ahto Buldas, Dirk Draheim, Takehiko Nagumo and Anton Vedeshin

Live Speech at 04:00 PM on Thu Nov 26, 2020 (GMT+7)


Invited Keynote

Data Quality for Medical Data Lakelands

Johann Eder and Vladimir A. Shekhovtsov

Live Speech at 03:00 PM on Thu Nov 26, 2020 (GMT+7)


1. Authorization Policy Extension for Graph Databases

Aya Mohamed, Dagmar Auer, Daniel Hofer and Josef Küng


2. A Model-Driven Approach for Enforcing Fine-Grained Access Control for SQL Queries

Hoàng Nguyễn Phước Bảo and Manuel Clavel


3. On Applying Graph Database Time Modelsfor Security Log Analysis

Daniel Hofer, Markus Jäger, Aya Mohamed and Josef Küng


4. Integrating Web Services in Smart Devices using Information Platform based on Fog Computing Model

Takeshi Tsuchiya, Ryuichi Mochizuki, Hiroo Hirose, Tetsuyasu Yamada, Norinobu Imamura, Naoki Yokouchi, Keiichi Koyanagi, and Quang Tran Minh


5. Adaptive Contiguous Scheduling for Data Aggregation in Multichannel Wireless Sensor Networks

Van-Vi Vo, Tien-Dung Nguyen, Duc-Tai Le and Hyunseung Choo


6. Relating Network-Diameter and Network-Minimum-Degree for Distributed Function Computation

H. K. Dai and M. Toulouse


7. Growing Self-Organizing Maps for Metagenomic Visualizations Supporting Disease Classification

Hai Thanh Nguyen, Bang Anh Nguyen, My N. Nguyen, Quoc-Dinh Truong, Linh Chi Nguyen, Thao Thuy Ngoc Banh and Phung Duong Linh


8. On Norm-Based Locality Measures of 2-Dimensional Discrete Hilbert Curves

H. K. Dai and H. C. Su


9. A Comparative Study of Join Algorithms in Spark

Anh-Cang Phan, Thuong-Cang Phan and Thanh-Ngoan Trieu


10. Blockchain-based Forward and Reverse Supply Chains for E-Waste Management

Swagatika Sahoo and Raju Halder


11. A Pragmatic Blockchain Based Solution for Managing Provenance and Characteristics in Open Data Context

Tran Khanh Dang and Thu Duong Anh


12. OAK: Ontology-based Knowledge Map Model for Digital Agriculture

Quoc Hung Ngo, Tahar Kechadi and Nhien-An Le-Khac

To be updated ...


13. A Novel Approach to Diagnose ADHD Using Virtual Reality

Seung Ho Ryu, Soohwan Oh, Sangah Lee and Tai-Myoung Chung


14. A Three-way Energy Efficient Authentication Protocol using Bluetooth Low Energy

Thao L. P. Nguyen, Tran Khanh Dang, Tran Tri Dang, and Ai Thao Nguyen Thi


15. Clustering-based Deep Autoencoders for Network Anomaly Detection

Van Quan Nguyen, Viet Hung Nguyen, Nhien-An Le-Khac and Van Loi Cao

To be updated ...


16. Flexible Platform for Integration, Collection, and Analysis of Social Media for Open Data Providers in Smart Cities

Thanh-Cong Le, Quoc-Vuong Nguyen and Minh-Triet Tran


17. Post-quantum Digital-signature Algorithms on Finite 6-dimensional Non-commutative Algebras

Nikolay A. Moldovyan, Dmitriy N. Moldovyan, Alexander A. Moldovyan, Hieu Minh Nguyen, Le Hoang Tuan Trinh

To be updated ...


18. Malicious-Traffic Classification using Deep Learning with malicious packet bytes and arrival time

Ingyom Kim and Tai-Myoung Chung

To be updated ...


19. Detecting Malware based on Dynamic Analysis Techniques using Deep Graph Learning

Nguyen Minh Tu, Nguyen Viet Hung, Phan Viet Anh, Cao Van Loi and Nathan Shone


20. Understanding the Decision of Machine learning based Intrusion Detection Systems

Quang-Vinh Dang


21. Combining Support Vector Machines for Classifying Fingerprint Images

The-Phi Pham, Minh-Thu Tran-Nguyen, Minh-Tan Tran and Thanh-Nghi Do


22. Toward an Ontology for Improving Process Flexibility

Nguyen Hoang Thuan, Hoang Phuong Ai, Majo George, Mathews Nkhoma and Pedro Antunes


23. Sentential Semantic Dependency Parsing for Vietnamese

Tuyen Thi-Thanh Do and Dang Tuan Nguyen


24. An In-depth Analysis of OCR Errors for Unconstrained Vietnamese Handwriting

Quoc-Dung Nguyen, Duc-Anh Le, Nguyet-Minh Phan, and Ivan Zelinka

To be updated ...


CCIS 1306


1. On the Potential of Numerical Association Rule Mining

Minakshi Kaushik, Rahul Sharma, Sijo Arakkal Peious, Mahtab Shahin, Sadok Ben Yahia, Dirk Draheim


2. Applying Mobile Peer-to-Peer Networks For Decentralized Customer-to-Customer Ecommerce Model

Tu Kha Huynh, Hai-Duong Le, Sinh Van Nguyen, Ha Manh Tran


3. An Elastic Data Conversion Framework for Data Integration System

Tran Khanh Dang, Ta Manh Huy and Nguyen Le Hoang

To be updated ...


4. A Novel Model using CDN, P2P, and IPFS for Content Delivery

Tien-Thao Nguyen, Ba-Lam Do


5. Deep Learning Model for Predicting Student Performance

Tran Thanh Dien, Luu Hoai-Sang, Nguyen Thanh-Hai, Nguyen Thai-Nghe


6. Py_ape: Data Acquiring, Extracting, Cleaning and Schema Matching in Python

Bich-Ngan T. Nguyen, Phuong N.H. Phạm, Vu Thanh Nguyen, Phan Quoc Viet, Le Dinh Tuan, Vaclav Snasel


7. Improving ModSecurity WAF with Machine Learning methods

Improving ModSecurity WAF with Machine Learning Methods


8. An Elastic Anonymization Framework for Open Data

Trung Hieu Le, Tran Khanh Dang

To be updated ...


9. A Computer Virus Detection Method based on Information from PE Structure of Files combined with Deep Learning Models

Vu Thanh Nguyen, Vu Thanh Hien, Le Dinh Tuan, Mai Viet Tiep, Nguyen Hoang Anh, Pham Thi Vuong


10. Automatic Attendance System based on Face Recognition using HOG Features and Cosine Distance

Nguyen Thanh-Hai, Cong Tinh Dao, Nguyen Minh Thao Phan, Cham Ngoc Thi Nguyen, Tai Tan Phan, Pham Huynh-Ngoc


11. Ontology-based Shrimp and Fish Disease Diagnosis

An C. Tran, M. Fukuzawa

To be updated ...


12. Evaluation of Deep Learning based Methods for Plant Disease Identification

Vu Thanh Nguyen, Triet Quang Duong, Tuan Dinh Le, Anh Thi Dieu Nguyen


13. Uberwasted App for Reporting and Collecting Waste using Location based and Deep Learning Technologies

Binh Thanh Nguyen, Dat Ho Tan, Hien Vo Thi Dieu, Dat Nguyen Khac 2 , Huy Truong Dinh


14. A Flexible Internet of Things Architecture for Data Gathering and Monitoring System

Khuat Duc Anh, Le Dinh Huynh, Phan Duy Hung


15. Recognition and Quantity Estimation of Pastry Images Using Pre-training Deep Convolutional Networks

An C. Tran, Nghi C. Tran, Nghia Duong-Trung

To be updated ...


16. Multivariate Time Series Forecasting for Sensor Data with Deep Learning

Nguyen Thai-Nghe, Nguyen Thanh-Hai


17. A Template-based Approach for Generating Vietnamese References from Flat MR Dataset in Restaurant Domain

Dang Tuan Nguyen, Trung Tran


18. Medical Sensor Data Synthesis System for Digital Therapeutics based on a Diabetic Foot Ulcer Treatment System

Jayun Hyun, Seo Hu Lee, Ha Min Son, Ji-Ung Park, Tai-Myoung Chung


19. An Approach for Skin Lesions Classification with a Shallow Convolutional Neural Network

Hiep Xuan Huynh, Loan Thanh Thi Truong, Cang Anh Phan, Hai Thanh Nguyen


20. Detection and Classification of Brain Hemorrhage Using Hounsfield Unit and Deep Learning Techniques

Anh-Cang Phan, Hung-Phi Cao, Thanh-Ngoan Trieu, Thuong-Cang Phan


21. Inflammatory Bowel Disease Classification Improvement with Metagenomic Data Binning using Mean-shift Clustering

Nhi Yen Kim Phan, Hai Thanh Nguyen


22. Incremental Learning on Object Detection: a Novel Approach in Pornography Classification

Hoang-Loc Tran , Quang-Huy Nguyen, Dinh-Duy Phan, Thanh-Thien Nguyen, Khac-Ngoc-Khoi Nguyen, Duc-Lung Vu

To be updated ...


23. Proposing the Development of Dataset of Cartoon Character using DCGAN Model

Phat Nguyen Huu, Thuong Nguyen Thi Mai, Quang Tran Minh, Hieu Nguyen Trong

To be updated ...


24. Feature Selection using Local Interpretable Model-agnostic Explanations on Metagenomic Data

Nguyen Thanh-Hai, Toan Bao Tran, An Cong Tran, Nguyen Thai-Nghe


25. ORB for Detecting Copy-Move Regions with Scale and Rotation in Image Forensics

Kha-Tu Huynh, Tu-Nga Ly, Thuong Le-Tien


26. A Convex Optimization based Method for Color Image Reconstruction

Nguyen Thi Hong Anh, Nguyen Duy Viet Toan, Le Hong Trang

To be updated ...


27. Cost Effective Control Plane Design for Service Assurance in Software Defined Service Function Chaining

Dokyung Lee, Syed Muhammad Raza, Moonseong Kim, Hyunseung Choo


28. Method used Model of Fuzzy Time Series based on Hedge Algebras Employed Relationship Groups Following Time Points for Forecasting Time Series

Nguyen Dinh Thuan, Hoang Tung


29. Finding Maximum Stable Matchings for the Student-Project Allocation Problem with Preferences over Projects

Hoang Huu Viet, Le Van Tan, Son Thanh Cao


SHORT PAPERS


1. Data Privacy in its Three Forms - A Systematic Review

Amen Faridoon, Mohand Tahar Kechadi


2. Incremental Learning for Classifying Vietnamese Herbal Plant

Phan Duy Hung, Nguyen Tien Su


3. Using Topic Models to Label Documents for Classification

Khang Nhut Lam, Lam Thanh Truong, Jugal Kalita


4. Genome-Wide Association Analysis for Oat Genetics using Support Vector Machines

Hiep Xuan Huynh, Toan Bao Tran, Quyen Ngoc Pham, Hai Thanh Nguyen


5. Develop High School Students Recommendation System Based on Ontology

Thanh Nguyen Vu, Thi Dieu Anh Nguyen, Tuan Dinh Le


6. Digital Signatures using Hardware Security Modules for Electronic Bills in Vietnam: Open Problems and Research Directions

Minh-Tuan Truong, Quang-Vinh Dang


7. Automatic Vietnamese Passport Recognition on Android Phones

Phan Duy Hung, Bui Thi Loan


8. A Third-Party Intelligent System for Preventing Call Phishing and Message Scams

Manh-Hung Tran, Trung Ha Le Hoai, Hyunseung Choo


sun-jun

Associate Professor Jun Sun

Bio: SUN, Jun is currently an associate professor at Singapore Management University (SMU). He received Bachelor and PhD degrees in computing science from National University of Singapore (NUS) in 2002 and 2006. In 2007, he received the prestigious LEE KUAN YEW postdoctoral fellowship. He has been a faculty member since 2010. He was a visiting scholar at MIT from 2011-2012. Jun's research interests include software engineering, formal methods, program analysis and cyber-security. He is the co-founder of the PAT model checker. To this date, he has more than 200 journal articles or peer-reviewed conference papers, many of which are published at top-tier venues.

Country: Singapore

Affiliation: Singapore Management University, Singapore

DBLP: Link

Research interests: formal methods, software engineering, cyber-security

Keynote Topic: AI for CPS Cyber-Security

Cyber-Physical Systems (CPS) are often safety-critical yet they are challenging to analyze. In this talk, I will introduce our recent attempts on solving research problems associated with cyber-security of CPS with techniques developed in the machine learning and software engineering community. Firstly, I will show a practical approach which applies program mutation and machine learning to attest CPS, so as to detect code-modification attacks. Secondly, I will present our effort on developing an efficient and effective fuzzer for CPS, to identify security vulnerabilities. Both techniques have been evaluated on real-world CPS. The talk is based on our papers at IEEE S&P 2018, ICSE 2018, ASE 2019 and ISSTA 2020.

dirk-draheim

Professor Dirk Draheim

Bio: Dirk Draheim is a full professor of information systems and head of the Information System Group at Tallinn University of Technology (TalTech). The TalTech IS Group is deeply involved into the design and implementation of the Estonian e-Governance ecosystem.

Dirk holds a Diploma in computer science from Technische Universität Berlin, a PhD from Freie Universität Berlin and a habilitation from the University of Mannheim. Until 2006 he worked as a Researcher at Freie Universität Berlin. From 2006-2008 he was area manager for database systems at the Software Competence Center Hagenberg, Linz, as well as Adjunct Lecturer in information systems at the Johannes-Kepler-University Linz. From 2008-2016 he was head of the data center of the University of Innsbruck and, in parallel, Adjunct Reader at the Faculty of Information Systems of the University of Mannheim. Dirk is co-author of the Springer book "Form-Oriented Analysis" and author of the Springer books "Business Process Technology", "Semantics of the Probabilistic Typed Lambda Calculus" and "Generalized Jeffrey Conditionalization". Dirk Draheim is a member of the ACM.

Country: Germany

Affiliation: Tallinn University of Technology, Estonia

DBLP: Link

Research interests: design and implementation of large-scale information systems

Keynote Topic: The Blockchain Technology Stack: Intrinsic Technological and Socio-Economic Barriers

Since the introduction of Bitcoin in 2009 and its immense resonance in media, we have seen a plethora of envisioned blockchain solutions. Usually, such blockchain solutions claim to be disruptive. Often, such disruptiveness takes the form of a proclaimed blockchain revolution. In this paper, we want to look at blockchain technology from a neutral, analytical perspective. Our aim is to understand technological and socio-economic barriers to blockchain solutions that are intrinsic in the blockchain technology stack itself. We look into the permissionless blockchain as well as the permissioned blockchain. We start with a characterization of cryptocurrency as one-tiered uncollateralized M1 money. We proceed with defining essential modes of communication (basic authentication, signature, registered letter, contract, order) and how they are digitized classically. We review potential blockchain solutions for these modes of communication, heavily based on socio-economic considerations. At the technical level, we discuss scalability issues and potential denial-of-service attacks, both with novel insights. On the other hand, we also look into three successful blockchain solutions and explain their design. Now: what is the blockchain revolution and how realistic is it? Will it shake up of our institutions? Or, vice versa: does it rely on the re-design of our institutions instead? Can we design useful blockchain solutions independent of fundamental institutional re-design? It is such questions which have motivated us to compile this paper and we hope that we can bring some light to them, at least to create some awareness for them.

johann-eder

Professor Johann Eder

Bio: Johann Eder is full professor for Information and Communication Systems in the Department of Informatics-Systems of the Alpen-Adria Universität Klagenfurt, Austria. From 2005-2013 he served as Vice President of the Austrian Science Funds (FWF). He held positions at the Universities of Linz, Hamburg and Vienna and was visiting scholar at AT&T Shannon Labs, NJ, USA, the University of California Santa Barbara, CA, USA, and the New Jersey Institute of Technology, NJ, USA.

Johann Eder published more than 190 papers in peer reviewed international journals, conference proceedings, and edited books. He chaired resp. served in numerous program committees for international conferences and as editor and referee for international journals.

Country: Austria

Affiliation: University of Klagenfurt, Austria

DBLP: Link

Research interests: The research interests of Johann Eder are information systems engineering, business process management, and data management for medical research. A particular focus of his work is the evolution of information systems and the modelling and management of temporal information and temporal constraints. Another focus is the application of information technology for medical research in particular information systems for biobanking. He successfully directed numerous competitively funded research projects on workflow management systems, temporal data warehousing, process modelling with temporal constraints, application interoperability and evolution, information systems modelling, information systems for medical research, etc.

Keynote Topic: Data Quality for Medical Data Lakelands

Medical research requires biological material and data. Medical studies from data with unknown or questionable quality are useless or even dangerous, as evidenced by recent examples of withdrawn studies. Medical data sets consist of highly sensitive personal data, which has to be protected carefully and is only available for research after approval of ethics committees. These data sets, therefore, cannot be stored in central data warehouses or even in a common data lake but remain in a multitude of data lakes, which we call Data Lakelands. An example for such a Medical Data Lakelands are the collections of samples and their annotations in the European federation of biobanks (BBMRI-ERIC). We discuss the quality dimensions for data sets for medical research and the requirements for providers of data sets to in terms of both quality of meta-data and meta-data of data quality documentation with the aim to support researchers to effectively and efficiently identify suitable data sets for medical studies.