About EISA 2022

With recent evolution of adversarial techniques, intrusions have become more complex that may threaten the security of various assets regarding information and applications. In addition, coordinated intrusions like worm outbreak can continue to be a major threat to information, system and network security in the near future. The popularity of Internet may generate a large volume of different types of sensitive information. Therefore, there is a need for emerging techniques, theories and applications to protect information and practical security.

The Third International Conference on Emerging Information Security and Applications (EISA) aims to provide a platform for researchers and practitioners across the world to exchange their ideas. It seeks original submissions that discuss practical or theoretical solutions to enhance the information and application security in practice.

Paper download link is EISA 2022 Paper Draft Link

A best paper award will be granted to the qualified papers.

Good quality papers will be invited to journal special issues: Journal of Information Security and Applications, Computers and Electrical Engineering, Heliyon (CS), Annals of Telecommunications, Sensor, International Journal of Distributed Sensor Networks, and International Journal of Applied Cryptography


-------------------------------------

Topics of interest include, but are not limited to the ones listed below.

- Cyber intelligence techniques
- Multimedia security
- Malware and unwanted software
- Vulnerability analysis and reverse engineering
- Usable security and privacy
- Intrusion detection and prevention
- Authentication and access control
- Anonymity and privacy
- Cryptographic protection
- Digital forensics
- Cyber physical systems security
- Adversarial learning
- Security measurement
- Security management and policies
- Hardware and physical security

-------------------------------------
Important Dates:

Submission Deadline: 20 July 15 August 2022 (Extended!)
Acceptance Notification: 15 September 2022
Camera Ready: 30 September 2022

Conference dates: 29-30 October, 2022
-------------------------------------

For questions, please contact us at:
eisa2022@easychair.org.


Organized by:

School of Computer, Central China Normal University, China

Central China Normal University Wollongong Joint Institute

Technical University of Denmark, Denmark

Communications in Computer and Information Science

News & Updates

20 May, 2022   EISA 2022 will provide several special issues, including JISA, CAEE, Sensors, IJDSN.

10 April, 2022   EISA 2022 submission link is available.

10 March, 2022   EISA 2022 website is online.

 Keynote Speakers

--

Professor Qiong Huang
Affiliation: South China Agricultural University, China
Title: Attribute-based Hierarchical Access Control with Extendable Policy

Learn More

Abstract

Attribute-based encryption scheme is a promising mechanism to realize one-to-many fine-grained access control which strengthens the security in cloud computing. However, massive amounts of data and various data sharing requirements bring great challenges to the complex but isolated and fixed access structures in most of the existing attribute-based encryption schemes.
In this talk, we introduce an attribute-based hierarchi- cal encryption scheme with extendable policy, called Extendable Hierarchical Ciphertext-Policy Attribute-Based Encryption (EH- CP-ABE), to improve the data sharing efficiency and security simultaneously. The scheme realizes the function of hierarchical encryption, in which, data with hierarchical access control relationships could be encrypted together flexibly to improve the efficiency. It also achieves external and internal extension of the access structure to further encrypt newly added hierarchical data without updating the original ciphertexts or with only a minor update depending on the data sharing requirements, which simplifies the encryption process and greatly reduces the computation overhead.

Bio

Professor Qiong Huang got his PhD degree from City University of Hong Kong in 2010, and joined South China Agricultural University (SCAU) in 2011. Now he is a professor and the dean of College of Mathematics and Informatics and College of Software Engineering, SCAU. He is also the director of Research Institute of Cyber Security of SCAU, and the director of Guangzhou Key Lab of Intelligent Agriculture. His main research interest is in cryptography, data privacy and blockchain technology. He has been PI of about 20 research grants, and is the receiver of Guangdong Natural Science Foundation for Distinguished Young Scholars. He has published about 150 apers in prestigious international conferences and journals, e.g. ASIACRYPT, PKC, CT-RSA, ESORICS, IEEE TIFS, IEEE TDSC, IEEE TC, IEEE TSC, TCS and etc. He has served as Program Chair of several international conferences, e.g. ProvSec 2021, and as PC member of more than 40 international conferences. He is also the receiver of the Fok Ying Tung Education Foundation Award for College and University Young Scholars, and the ACM Guangzhou Rising Star Award.


Senior lecturer Khoa Nguyen
Affiliation: University of Wollongong (UOW), Australia
Title: Towards Balancing Privacy and Accountability in Multiuser Authentication Systems

Learn More

Abstract

In the digital era, where most of our daily communications are done over computer networks, the problem of privacy protection has become increasingly important and challenging. To address this problem, various privacy-preserving cryptographic constructions have been proposed since the 1980s.
In this talk, I will focus on privacy-preserving cryptographic systems that provide users’ authentication in the multiuser setting. I will discuss a tension between users and authorities, between privacy and accountability in the existing systems. Then I will describe several recent innovative ideas for resolving this tension, aiming to achieve a “privacy vs. accountability” balance that is reasonably fair for both users and authorities.

Bio

Khoa Nguyen is currently a Senior Lecturer in the School of Computing and Information Technology, University of Wollongong (UOW), Australia. He received his PhD in Cryptography in 2014 at Nanyang Technological University (NTU), Singapore. Before joining UOW, he was a Presidential Postdoctoral Fellow and then a Senior Research Fellow at NTU. His main research interests include the designs and analyses of privacy-preserving and quantum-safe cryptographic protocols. He has published more than 40 papers, most of which are at high-ranked conferences and journals in cryptography and security, such as EUROCRYPT, CRYPTO, ASIACRYPT, PKC, Euro S&P, ESORICS, ACNS, IEEE Transactions, etc. He served as a Program Co-Chair of ProvSec 2020 (the 14th International Conference on Provable and Practical Security) and of ACISP 2022 (the 27th Australasian Conference on Information Security and Privacy). He also served as a Program Committee member of about 30 other conferences, including ASIACRYPT 2017 – 2021.


Assistant professor Tran Viet Xuan Phuong
Affiliation: Old Dominion University, America
Title: Lightweight computation for secure evaluating and privacy-preserving federated learning in IoT Environments

Learn More

Abstract

In recent years, we have witnessed a remarkable proliferation of networked intelligent devices - collectively known as the Internet of Things (IoT). The “smartness” of IoT is empowered by data-driven and learning-based techniques to enhance cognition, prediction, and decision-making. It often requires a sheer amount of data from various organizations and end users to be collected, transmitted, and processed. Privacy is a fundamental hurdle to such collective data aggregation and analysis across different entities.
In this talk, we will discuss about lightweight computation for secure evaluating/retrieval data, and privacy-preserving federated learning in IoT Environments. This goal will lead to the generation of new crypto models for IoT devices supporting Artificial Intelligence.

Bio

Tran Viet Xuan Phuong is currently a Research Assistant Professor at the School of Cybersecurity, University of Old Dominion University, USA. Before that, she was a Research Fellow at IC^2, School of Computing and Information Technology, University of Wollongong, and a Contributed Fellow at CSIRO – Data61. Her main research interests include applied cryptography for machine learning such as federated learning and deep learning, blockchain security, and IoT cybersecurity. She has published in the top tier of cryptography/security conferences and journals, including ACM CCS, ESORICS, IEEE INFOCOM, ACM ASIACCS, IEEE TIFS, IEEE TII, etc.


Senior Lecturer Yuntao Wang
Affiliation: Osaka University, Japan
Title: Recent Trends in Post-Quantum Cryptography

Learn More

Abstract

In the modern information society, public-key cryptosystems are preserving our private information and communication security. The security of current public-key cryptosystems such as RSA or ECC relies on the hardness of factoring large integers or solving discrete logarithm problems. However, it is proved that these computational problems can be solved in polynomial time by running Shor’s quantum algorithm in a practical quantum computer. This vulnerability has prompted research into post-quantum cryptography (PQC) using alternative mathematical problems that shall be secure in the era of quantum computers.
In this talk, I will give an overview of the progress and recent trends in post-quantum cryptography. In particular, I will introduce the PQC standardization project started by the US National Institute of Standards and Technology (NIST) in 2016. Four cryptosystems were selected to be standardized in 2022, including a lattice-based PKE/KEM and three (two lattice-based and one hash-based) digital signatures. I will show a general procedure for establishing a primitive lattice-based cryptosystem and explain the state-of-the-art security evaluation for lattice-based cryptosystems.

Bio

Dr. Yuntao Wang is currently an Associate Professor (Senior Lecturer) at the Graduate School of Engineering, Osaka University, Japan. He graduated from the Faculty of Mathematics at Kyushu University with a Ph.D. in September 2018. From October 2018 to March 2020, he was a researcher in the CREST program at the University of Tokyo, Japan, and a postdoctoral fellow in the Japan Society for the Promotion of Science (JSPS). From April 2020 to February 2022, he was an Assistant Professor at the Japan Advanced Institute of Science and Technology (JAIST). His main research interests are quantum-resistant cryptography and algorithmic number theory, especially cryptanalysis and fundamental mathematical problems in lattice cryptography. He has made outstanding contributions to cryptanalysis on lattice-based cryptography. In particular, he has made a number of world records in solving high-dimensional hard lattice problems in the lattice challenge series held by TU Darmstadt, such as the shortest vector problem challenge, the ideal lattice challenge, the LWE challenge, etc. He has been the director of several research projects for the Japanese government (Grant-in-Aid for Research Activity Start-up, Grant-in-Aid for Scientific Research (C)), his university (JAIST Research grant for fundamental research), and other universities (Kyushu University IMI Joint Research Fund); he has also received JSPS Young Scientist Research Program grants from the Japanese government.


Call For Papers       

The International Conference on Emerging Information Security and Applications (EISA) aims to provide a platform for researchers and practitioners across the world to exchange their ideas. It seeks original submissions that discuss practical or theoretical solutions to enhance the information and application security in practice.

-------------------------------------

Topics of interest include, but are not limited to the ones listed below.

- Cyber intelligence techniques
- Multimedia security
- Malware and unwanted software
- Vulnerability analysis and reverse engineering
- Usable security and privacy
- Intrusion detection and prevention
- Authentication and access control
- Anonymity and privacy
- Cryptographic protection
- Digital forensics
- Cyber physical systems security
- Adversarial learning
- Security measurement
- Security management and policies
- Hardware and physical security

Important Dates

Submission Deadline 20 July 15 August 2022 (AoE)
Acceptance Notification 15 September 2022
Camera-ready Copy Due 30 September 2022
Conference 29-30 October 2022

Author Instructions

Authors are invited to submit original papers. All papers need to be submitted electronically through the website (https://easychair.org/conferences/?conf=eisa2022) with PDF format. Submitted papers must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or a conference with proceedings. Papers must be clearly presented in English, must not exceed 18 pages (and up to 20 pages with well-marked references and appendix) for Regular Papers and 12 pages Short Paper in Springer LNCS/CCIS format (https://www.springer.com/gp/computer-science/lncs/conference-proceedings-guidelines), including tables, figures, references and appendices. Papers will be selected based on their originality, significance, relevance, and clarity of presentation assessed by at least three reviewers. Submission of a paper should be regarded as a commitment that, should the paper be accepted, at least one of the authors will register and attend the conference to present the work. Submissions do not need to be anonymous. A best paper award will be granted.

Submission link: EISA 2022 Submission Link

The proceeding of this year’s conference will be published by Springer (CCIS Proceedings). Author instructions and LaTeX/Word templates for LNCS/CCIS publications can be found via the following link.

Springer LNCS/CCIS Author Information

Journal Special Issues

Selected papers from EISA 2022 will be invited to consider submission (after significant extension) for special issues:


Journal of Information Security and Applications, Computers and Electrical Engineering, Heliyon (CS), Annals of Telecommunications, Sensor, International Journal of Distributed Sensor Networks, and International Journal of Applied Cryptography

Organising Committee

General Chairs

Anthony TS Ho, University of Surrey, UK
Sokratis K. Katsikas, Norwegian University of Science and Technology, Norway
Weizhi Meng, Technical University of Denmark, Denmark

Program Chairs

Debiao He, Wuhan University, China
Rongxing Lu, University of New Brunswick, Canada
Jiageng Chen, Central China Normal University, China

Publicity Chairs

Pei Li, Central China Normal University, China
Chunhua Su, University of Aizu, Japan

Publication Chair

Shixiong Yao, Central China Normal University, China
Wenjuan Li, Hong Kong Polytechnic University, China

Program Committee

Muhammad Rizwan Asghar, The University of Auckland, New Zealand
Francesco Buccafurri, University of Reggio Calabria, Italy
Jiageng Chen, Central China Normal University, China
Yunhe Feng, University of Washington, USA
Debasis Giri, Maulana Abul Kalam Azad University of Technology, India
Debiao He, Wuhan University, China
Shoichi Hirose, University of Fukui, Japan
Romain Laborde, University Paul Sabatier, France
Costas Lambrinoudakis, University of Piraeus, Greece
Giovanni Livraga, University of Milan, Italy
Wenjuan Li, Hong Kong Polytechnic University, China
Rongxing Lu, University of New Brunswick, Canada
Sjouke Mauw, University of Luxembourg, Luxembourg
Weizhi Meng, Technical University of Denmark, Denmark
Jun Shao, Zhejiang Gongshang University, China
Ketil Stoelen, SINTEF, Norway
Chunhua Su, Aizu University, Japan
Gang Tan, The Pennsylvania State University, USA
Je Sen Teh, Universiti Sains Malaysia, Malaysia
Hao Wang, Shandong Normal University, China
Haoyu Wang, Beijing University of Posts and Telecommunications, China
Licheng Wang, Beijing University of Posts and Telecommunications, China
Qianhong Wu, Beihang University, China
Zhe Xia, Wuhan University of Technology, China
Wun-She Yap, Universiti Tunku Abdul Rahman, Malaysia

Steering Committee

Jiageng Chen, Central China Normal University, China
Liqun Chen, University of Surrey, UK
Steven Furnell, University of Nottingham, UK
Anthony TS Ho, University of Surrey, UK
Sokratis K. Katsikas, Norwegian University of Science and Technology, Norway
Javier Lopez, University of Malaga, Spain
Weizhi Meng, Technical University of Denmark, Denmark (Chair)

Accepted Papers

1. Fei Chen, Zhengzheng Yan and Liang Gu. Towards Low-Latency Big Data Infrastructure at Sangfor
2. Thi Quynh Nguyen, Romain Laborde, Abdelmalek Benzekri, Arnaud Oglaza and Mehdi Mounsif. AutoRoC-DBSCAN: automatic tuning of DBSCAN to detect malicious DNS tunnels
3. Anushree Belel, Ratna Dutta and Sourav Mukhopadhyay. Hierarchical Identity Based Inner Product Functional Encryption for Privacy Preserving Statistical Analysis without q-type assumption
4. Yang Liu, Qi Feng, Cong Peng, Min Luo and Debiao He. Asymmetric Secure Multi-Party Signing Protocol for the Identity-Based Signature Scheme in the IEEE P1363 Standard for Public Key Cryptography
5. Guoheng Wei, Yanlin Qin and Wei Fu. Secure and Efficient Certificateless Authentication Key Agreement Protocol in VANET
6. Yen Yee Chan, Cher-Yin Khor, Je Sen Teh, Wei Jian Teng and Norziana Jamil. Differential Cryptanalysis of Lightweight Block Ciphers SLIM and LCB
7. Zhe Xia, Yichen Yang, Hua Shen and Mingwu Zhang. A Multi-Task Mobile Crowdsensing Scheme with Conditional Privacy Preserving for Vehicle Networks
8. Pei Li, Liliu Tan, Shixiong Yao and Jiageng Chen. Parallel Validity Analysis of the Boomerang Attack Model
9. Ye Li, Jiale Zhang, Junwu Zhu and Wenjuan Li. HBMD-FL:Heterogeneous Federated Learning Algorithm Based On Blockchain and Model Distillation
10. Jiaxin Deng, Simin Chen, Jiageng Chen and Weizhi Meng. A Survey on Discrete Gaussian Samplers in Lattice Based Cryptography
11. Dayin Zhang, Xiaojun Chen and Jinqiao Shi. An Efficient Federated Convolutional Neural Network Scheme with Differential Privacy
12. Yi Xiong, Shixiong Yao and Pei Li. D2CDIM:DID-based Decentralized Cross-domain Identity Management with Privacy-Preservation and Sybil-Resistance
13. Yunfeng Cui, Wenbin Zhai, Liang Liu, Youwei Ding and Wanying Lu. Link Aware Aggregation Query with Privacy-preserving Capability in Wireless Sensor Networks

 Conference Schedule


Program (Beijing Time, GMT+8)


Day 1(29 October 2022)


9:20-9:30

Welcome (Session Chair:Jiageng Chen,Central China Normal Univeristy)

General Chairs



9:30-10:15

Keynote 1 (Session Chair: Jiageng Chen,Central China Normal Univeristy)

Title:Attribute-based Hierarchical Access Control with Extendable Policy

Qiong Huang,South China Agricultural University, China



10:15-11:00

Keynote 2 (Session Chair: Jiageng Chen,Central China Normal Univeristy)

Title:Towards Balancing Privacy and Accountability in Multiuser Authentication Systems

Khoa Nguyen,University of Wollongong (UOW), Australia



11:00-11:10

Short Break



11:10-12:10

Session 1 (Session Chair: Weizhi Meng, Technical University of Denmark)

• Asymmetric Secure Multi-Party Signing Protocol for the Identity-Based Signature Scheme in the IEEE P1363 Standard for Public Key Cryptography

Yang Liu, Qi Feng, Cong Peng, Min Luo and Debiao He

• A Multi-Task Mobile Crowdsensing Scheme with Conditional Privacy Preserving for Vehicle Networks

Zhe Xia, Yichen Yang, Hua Shen and Mingwu Zhang

• Towards Low-Latency Big Data Infrastructure at Sangfor

Fei Chen, Zhengzheng Yan and Liang Gu



12:10-13:30

Lunch Break



13:30-14:15

Keynote 3 (Session Chair: Pei Li, Central China Normal Univeristy)

Title:Recent Trends in Post-Quantum Cryptography

Yuntao Wang,Osaka University, Japan



14:15-14:25

Short break



14:25-16:05

Session 2(Session Chair: Pei Li, Central China Normal Univeristy)

• Differential Cryptanalysis of Lightweight Block Ciphers SLIM and LCB

Yen Yee Chan, Cher-Yin Khor, Je Sen Teh, Wei Jian Teng and Norziana Jamil

• Parallel Validity Analysis of the Boomerang Attack Model

Pei Li, Liliu Tan, Shixiong Yao and Jiageng Chen

• A Survey on Discrete Gaussian Samplers in Lattice Based Cryptography

Jiaxin Deng, Simin Chen, Jiageng Chen and Weizhi Meng

• Hierarchical Identity Based Inner Product Functional Encryption for Privacy Preserving Statistical Analysis without q-type assumption

Anushree Belel, Ratna Dutta and Sourav Mukhopadhyay

• AutoRoC-DBSCAN: automatic tuning of DBSCAN to detect malicious DNS tunnels

Thi Quynh Nguyen, Romain Laborde, Abdelmalek Benzekri, Arnaud Oglaza and Mehdi Mounsif







Day 2(30 October 2022)


9:00-9:45

Keynote 4 (Session Chair: Shixiong Yao, Central China Normal Univeristy)

Title:Lightweight computation for secure evaluating and privacy-preserving federated learning in IoT Environments

Tran Viet Xuan Phuong,Old Dominion University, America



9:45-9:55

Short Break



9:55-11:35

Session 3(Session Chair: Shixiong Yao, Central China Normal Univeristy)

• HBMD-FL:Heterogeneous Federated Learning Algorithm Based On Blockchain and Model Distillation

Ye Li, Jiale Zhang, Junwu Zhu and Wenjuan Li

• Secure and Efficient Certificateless Authentication Key Agreement Protocol in VANET

Guoheng Wei, Yanlin Qin and Wei Fu

• An Efficient Federated Convolutional Neural Network Scheme with Differential Privacy

Dayin Zhang, Xiaojun Chen and Jinqiao Shi

• D2CDIM:DID-based Decentralized Cross-domain Identity Management with Privacy-Preservation and Sybil-Resistance

Yi Xiong, Shixiong Yao and Pei Li

• Link Aware Aggregation Query with Privacy-preserving Capability in Wireless Sensor Networks

Yunfeng Cui, Wenbin Zhai, Liang Liu, Youwei Ding and Wanying Lu



11:35-11:45

Closing Remarks(Session Chair: Jiageng Chen,Central China Normal University)



Registration Information

Registration payment is required by 15 October 2022 for EACH accepted paper in the first & second round submission. This deadline will be strictly enforced. Failure to pay the registration fee will result in the exclusion of the papers from the Conference Proceedings.

Registration Fee

Registration Type Registration Fee (in CNY)
Author Registration 1600
Participant Registration Free

How to register

Fill out the registration form for foreign attendees or registration form for attendees from Mainland China with all required details and email the filled form to yaosx@ccnu.edu.cn with the subject of your email "EISA 2022 Registration for #PAPER-ID(if applicable)#NAME" (where PAPER-ID is the submission number of your paper and NAME is the author name). In the email please include:
1) A copy of the bank draft or bank wire receipt or Transaction ID of your registration fee payment.
2) Name of the author who will give presentation during the conference.

Mode of payment

Payment should be made by fund transfer or depositing registration fees in the Bank account provided below.

  • For foreign Residients:
  • Account Name: Central China Normal University
    Account No: 559957528361
    Recipient Bank:BANK OF CHINA WUHAN GUANGBUTUN BRANCH
    SWIFT Code of the bank:BKCHCNBJ600
    Remark:“EISA2022# Paper ID# Name”

  • For Chinese Residients:
  • 单位名称:华中师范大学
    单位账号:559957528361
    开户银行:中国银行武汉广埠屯支行
    单位地址:武汉市洪山区珞喻路152号
    汇款备注信息:“EISA2022#论文编号#姓名”

If you have any question about the registration or need any assistance, please do not hesitate to contact us by yaosx@ccnu.edu.cn.

Venue

EISA 2020 will be held associate with SpaCCS 2020 at Nanjing Golden Eagle Shangmei Hotel (No. 1688 Shuanglong Avenue, Jiangning District, Nanjing).

Location

Address: No. 1688 Shuanglong Avenue, Jiangning District, Nanjing, China.

Information on Visa Applications

All participants of ISPEC2018 should be very careful about visa requirements and should make travel plan in advance enough. Visitors are fully responsible for acquiring all documents needed for entering Japan.

Japan provides waiver of visa requirements with more than 60 countries and regions. Please refer to the recent status on the visa waiver program from the Ministry of Foreign Affairs of Japan (MOFA).

If you need a visa for attendance, you should prepare all required documents according to the visa information page by MOFA. If you have any questions, please contact diplomatic establishments of Japan in your residential area.

We will issue an invitation letter ONLY for those who have presentation(s) at ISPEC2018 upon request. If you need an invitation letter for visa application, please send the following documents to
(ispec2018-visa *at* ml.cc.tsukuba.ac.jp)
(please replace *at* with @.)
after paying the registration fee via ISPEC2018 website and fixing your accommodation during the conference. (You can download a copy of participation information sheet and schedules of stay sheet from here.)

  • Filled participation information sheet for invitation letter (MS-word and PDF format).
  • Photo-copy of your passport (PDF format). (The page which your photo and passport number are included.)
  • Photo-copy of student identification card (PDF format), if you are student. (The page(s) which your photo, name, and ID number are included.)
  • Photo-copy of employee identification card (PDF format), if you are an employee. (The page(s) which your photo, name, and ID number are included.)
  • Filled schedules of your stay sheet (MS-word or PDF format) with a proof of your stay (e.g., a confirmation e-mail, a receipt or an invoice from your accommodation).


We will respond with a detailed procedure for invitation letter request. Please make sure to make a registration for ISPEC2018 before the request.

Notices:

  • Visa application to MOFA may take a long time. Please do it well before the deadline!
  • We will normally respond to the first request in a few days.
  • After receiving all required information, we will normally handle your requests in 1 or 2 weeks and the letter will be sent by a postal mail.
  • We do not issue any form of "a letter of guarantee"
  • We will issue invitation letters only for those who have presentation(s) at ISPEC2018.
  • We hold rights to request any additional information and/or to decline your application for invitation letters.
  • In case you need a document to be submitted to your organization prior to applying Visa, just let us know immediately.
  • Registration cannot be cancelled once the Visa application related documents have been sent out to you.

About privacy:

According to the Act on the Protection of Personal Information Held by Independent Administrative Agencies and others of Japan, the information submitted to ISPEC2018 in this page will be kept secret and used only for processing the invitation letter requests. In some cases, ISPEC2018 will share those information with a part of organizing committee members concerned for resolving issues (e.g. checking registration status and paper acceptance etc.). We will not use any information received for other purposes, except those required by laws and rules of Japan.


If you have any question, please contact: ispec2018-info@ml.cc.tsukuba.ac.jp

LNCS CCIS CCNU JI Technical Univesity of Denmark SPTAGE Lab