The 11th International Conference on Green, Pervasive and Cloud Computing
(GPC-2016)

May 6-8, 2016, Xi'an, China


Sponsored by









Keynote Speakers



Keqiu Li, Dalian University of Technology, China


Title: Research Situation and Challenges in RFID Systems

RFID is a type of wireless technique that can automatically identify or track the RFID tags attached to objects or even humans, and thus promoting an efficient and smart inventory and logistics management. In this talk, I will first introduce what is RFID and its advantages over the traditional barcode systems. Then, the current hop topics in RFID research area, such as RFID localization, authentication, human activity recognition, etc., will be summarized. After that, I will present some research work from my group, which focuses on investigating efficient solutions to typical large-scale RFID application problems, such as missing tag identification, RFID estimation with presence of blocker tag, and TOP-k queries in multi-category RFID systems, etc.At the end of this talk, I will discuss the existing challenges and new research directions when deploying RFID infrastructures in reality.

Bio: Keqiu Li is currently a full professor at the School of Computer Science and Technology, Dalian University of Technology, China. He got his bachelor and master degree both from Dalian University of Technology, China in 1994 and 1997, and his doctor degree from Japan Advanced Institute of Science and Technology, Japan in 2005. Keqiu Li was a research fellow at the University of Tokyo, Japan from Oct. 2005 to Sep. 2007. He had also five-year experience in industry. Keqiu Li's research interests include cloud computing, data center network, and wireless computing. Keqiu Li has published more than 100 technical papers in international journals and conferences. He is on the committee board for several international/national journals including IEEE TPDS and IEEE TC, and serves as organization chair/program chair/publication chair/program committee member for a couple of international conferences. Keqiu Li is a senior member of IEEE and CCF, and a member of ACM.




Kenli Li, Hunan University, China


Title: Scheduling Methods on Parallel and Cloud Systems

In the past few years, with the rapid development of heterogeneous computing systems (HCS), the issue of performance and energy consumption have attracted a great deal of attention. How to tradeoff the performance and the energy comsumption is currently a critical issue in designing and use HCS. In response to this challenge, many energy-aware scheduling algorithms have been developed primarily using the dynamic voltage-frequency scaling (DVFS) capability which has been incorporated into recent commodity processors. However, these techniques are unsatisfactory in minimizing both schedule length and energy consumption. To adress this issue, we divide the scheduling in parallel system into three stages, for each of which, we design efficient algorithms to fulfill. And based on them, the scheduling method which can efficient tradeoff the performance and energy is proposed. At the same time, it is extended to the multicore embedded system and the Cloud system. finally, the future work fields, to be done, are given.

Bio: Kenli Li, is currently a Professor at Hunan University (HNU), China. He has been a member a Distinguished Member of China Computer Federation (CCF), and the Chairman of Young Computer Scientists and Engineers Forum (YOCSEF) of CCF (2011-2012). He is also the Vice and Executive Director of National Supercomputing Center in Changsha, and the vice Dean of School of Information Science and Engineering. He received his PhD degree in Computer Software and Theory from Huazhong University of Science and Technology (HUST), in 2000, 2003, respectively. From 2004 to 2005, he has been a Visiting Scholar at the University of Illinois at Champaign-Urbana, USA. His research interests include parallel and distributed computing, supercomputing, cloud computing, and big data. As a principal investigator (PI), he has been responsible for twenty-one research projects including one Key Project granted by National Natural Science Foundation of China (NSFC). He has published more than 150 technical papers including more than 30 papers on IEEE/ACM Transactions. Dr. Li is the General Co-Chair of the 6th International Conference on Bio-Inspired Computing: Theories and Applications (BIC-TA), 2011; and the General Co-Chair of the 25th International Conference on Parallel Computational Fluid Dynamics (ParCFD), 2013, the fifteenth Conference on Algorithms and Architectures for Parallel Processing (ICA3PP 2015). He is currently the associate editor of IEEE Transactions on Computers. And he has been a reviewer for more than ten top journals including IEEE TC, IEEE TPDS, IEEE TSP, IEEE Trans. on Nanobioscience, IEEE Trans. on Cloud Computing, etc.




Hui Li, Xidian University, China


Title: Security Architecture and Key Techniques for 5G networks

The attractive features, such as Super-Fast, Ultra-low Latency, Connections Anywhere, UP/CP Decoupling, Software Orientated and Programmable, etc., drive the research on 5G to be hot recently and reveal the main trends of the future commerce network. However, these features also attract the attentions of network attackers, which may make the future 5G probably face the most serious and complicated attack situations since ever. In this case, to protect the security of the future 5G network, we need to clarify the security requirements and to propose an effective security architecture at the beginning of the 5G developing. In this talk, we will discuss the security architecture of 5G and some possible key security techniques for terminal, air interface, SDN/NFV, application layer and physical layers.

Bio: Hui Li, received B.Sc. degree from Fudan University in 1990, M.Sc. and Ph.D. degrees from Xidian University in 1993 and 1998. In 2009, he was with Department of ECE, University of Waterloo as a visiting scholar. Since 2005, he has been the professor in the school of Telecommunications Engineering, Xidian University, China. Now, he is the dean of school of Cyber Engineering. His research interests are in the areas of cryptography, wireless network security and information theory. He has published over 130 papers in academic journals and conferences and won the distinguished paper award in ASIACCS 2013. He served as TPC co-chair of ISPEC 2009 and IAS 2009, general co-chair of E-Forensic 2010, ProvSec 2011 and ISC 2011. Honorary Chair of NSS 2014, CS 2015 and ASIACCS 2016.




Qingguo Zhou, Lanzhou University, China


Title: The Development of ADS in China: Perspectives

With the fast increase on the amount of nuclear waste in China, the safe disposal of nuclear waste as well as the potential for nuclear fuel breeding and advanced energy generation is becoming a critical issue. The Chinese Academy of Sciences (CAS) initiated the Accelerator Driven Sub-Critical System (ADS) program in 2011 under the framework of a Strategic Technology Pilot Project, where the ultimate goal of this program is to develop an industrial scale ADS facility for the safe disposal of nuclear waste and advanced fission energy systems, by integrating a high-power superconducting proton accelerator, a heavy metal spallation target and a sub-critical nuclear reactor. In cooperation with Institute of Modern Physics, Chinese Academy of Sciences located in Lanzhou, our team has focused on how to assist the design of spallation target in recent years. Attention was given to two scientific issues: designing a parallel framework to realize the simulation process of massive granular flow effectively and designing a conversion mechanism to generate MCNP input file automatically. Based on the aforementioned issues, we aim at developing an ADS spallation target assisted visualization system through GPU-CUDA technology.
In this talk, we mainly present solutions on how to realize simulation of granular flow based on DEM as well as visualization of spallation target through cluster of GPUs effectively and converting traditional geometric model represented by BREP to MCNP recognized model format that represented by CSG. In our work, there are still some open issues that need to be discussed and will be solved in the future. Although ADS has problems that need to be solved, it is still the leading trend of nuclear energy development.

Bio: Prof. Qingguo Zhou, PhD, is an IET Fellow and awardee of Program for New Century Excellent Talents in University by Ministry of Education, China. Now he is the vice director of Engineering Research Center of Open Source Software and Real-time Systems, Ministry of Education. He is also the director of Distributed and Embedded System Lab (DSLab), Lanzhou University. He received IBM Real-Time Innovation Award in 2007, Google Faculty Award in 2011 and 2015, and Google Research Award in 2012. He has been the director for Real Time Linux Foundation since 2007. His research interests include Parallel Processing, Safety Critical System, and Embedded Real-Time System. Recently, Prof. Zhou is focusing on boost the development of COOC (Cooperative Open Online Courses).




Aniello Castiglione, Department of Computer Science, University of Salerno, Italy


Title: Emerging Challenges in Anomaly Detection: How to Deal with Recent Security Threats

With the widespread development of the Internet and the ever increasing success of network-centric applications in substantially any sector of the everyday’s life, the need of detecting and preventing network-originated abuses in real time is more and more important, in order to guarantee appropriate protection and reaction capabilities against the huge amount of emerging security threats. Many solutions and tools are already available for checking the traffic flows and spotting anomalous usage patterns or malicious behaviors, but most of them are substantially unable to cope with unknown phenomena (e.g., 0-day attacks). In fact, the concept of normal or anomalous behavior is a very elusive one, since it depends on a large number of variable factors, often not immediately evident, associated to usual network activities and resource usage. Hence, a new generation of self-learning models that adaptively consider and understand the hidden relationships between these factors and the innermost dynamics underlying the involved networks and applications, is needed in order to effectively recognize security threats and react to them.
Accordingly the main focus of this keynote is outlining, by starting from a survey of the currently available approaches, the new direction for future developments in anomaly detection. This will be accomplished by considering the problem from several perspectives, ranging from the traditional analysis techniques, based on acquiring knowledge about normal and anomalous events through a statistical idealization of past observations, to newer approaches based on chaos theory and nonlinear analysis. The latter approaches can be more helpful in understanding the above phenomena by observing them simultaneously on multiple time scales, thanks to the projection of the observations in a multi-dimensional and more feature-rich space.
All these techniques are empowered and complemented by a host of methodologies originally born in the machine-learning framework and adapted for providing a deterministic interpretation of the complex traffic dynamics associated to normal and anomalous events.
Additional future research opportunities originate from the consideration that different properties and criteria could be applied for inferring more sophisticated traffic features, that can be used to obtain a deeper and more comprehensive understanding about traffic profiles associated to security-related events.

Bio: Aniello Castiglione (S’04–M’08) received the Ph.D. degree in Computer Science from the University of Salerno, Italy. He is currently a Research Assistant with the University of Salerno and received the Italian National Habilitation as Associate Professor in Computer Science. He is Adjunct Professor at the Department of Educational Science (“Computer Foundations”) and at the Department of Computer Science (class “Ethical Hacking and Penetration Testing”) of University of Salerno (Italy), as well as Adjunct Professor at the School of Engineering at the University of Naples Federico II (Naples) (class “Computer Foundations”).
He has published more than 125 papers in international journals and conferences. His current research interests include Information Forensics, Digital Forensics, Security and Privacy on Cloud, Communication Networks, and Applied Cryptography. He is a member of several associations, including ACM and IEEE. He served as the Program Chair and TPC Member in around 100 international conferences. One of his papers (published on the IEEE TDSC) has been selected as the “Featured Article” in the IEEE Cybersecurity initiative.
He serves as a Reviewer for several international journals and is a Managing Editor of two ISI-ranked international journals. He also acts as a Reviewer for around 50 international journals. He acted as a Guest Editor in several journals and serves as an Editor for several editorial boards of international journals. He has been involved in forensic investigations, collaborating with several Law Enforcement Agencies, as a consultant.


The 11th International Conference on Green, Pervasive and Cloud Computing (GPC-2016)
Copyright © 2015-2016 GPC-2016. All rights reserved.