Important Dates

March 1, 2022

Workshop Proposal Due

May 1, 2022

Paper Submission Deadline

June 10, 2022

Author Notification

July 5, 2022

Camera-ready and Registration

July 5, 2022

Registration Deadline

August 22-25, 2022

Conference Date



Title: Privacy and Transparency with Blockchain in the Era of Big Data, Machine Learning, IoT, and 5G

Speaker: Elisa Bertino

Purdue University, USA

About the Speaker

Robert H. DengElisa Bertino is Samuel Conte professor of Computer Science at Purdue University. She serves as Director of the Purdue Cyberspace Security Lab (Cyber2Slab). Prior to joining Purdue, she was a professor and department head at the Department of Computer Science and Communication of the University of Milan. She has been a visiting researcher at the IBM Research Laboratory in San Jose (now Almaden), at Rutgers University, at Telcordia Technologies. She has also held visiting professor positions at the Singapore National University and the Singapore Management University. Her main research interests include security, privacy, database systems, distributed systems, and sensor networks. Her recent research focuses on cybersecurity and privacy of cellular networks and IoT systems, and on edge analytics for cybersecurity. Elisa Bertino is a Fellow member of IEEE, ACM, and AAAS. She received the 2002 IEEE Computer Society Technical Achievement Award for “For outstanding contributions to database systems and database security and advanced data management systems”, the 2005 IEEE Computer Society Tsutomu Kanai Award for “Pioneering and innovative research contributions to secure distributed systems”, the 2019-2020 ACM Athena Lecturer Award, and the 2021 IEEE 2021 Innovation in Societal Infrastructure Award.


Technological advances, such as IoT devices, cyber-physical systems, smart mobile devices, cloud systems, data analytics, social networks and increased communication capabilities, are making possible to capture, and to quickly process and analyze huge amounts of data from which to extract information critical for many critical tasks, such as healthcare security and cyber security. In the area of cyber security, such tasks include user authentication, access control, anomaly detection, user monitoring, and protection from insider threat. By collecting and mining data concerning user travels, contacts and disease outbreaks one can predict disease spreading across geographical areas. And those are just a few examples. The use of data for those tasks raises however major privacy concerns. Collected data, even if anonymized by removing identifiers such as names or social security numbers, when linked with other data may lead to re-identify the individuals to which specific data items are related to. Also, as organizations, such as governmental agencies, often need to collaborate on security tasks, data sets are exchanged across different organizations, resulting in these data sets being available to many different parties. Privacy breaches may occur at many different layers and components in our interconnected systems. In this talk, I first present an interesting privacy attack that exploits paging occasion in 5G cellular networks. Such attack shows that achieving privacy is challenging and there is no unique technique that one can use; rather one must combine different techniques depending also on the intended use of data. Examples of these techniques and their applications are presented. Then, I discuss the notion of data transparency – critical for fair and correct data use, and how blockchain technologies can support data transparency.

Title: Achieving Cloud Data Security and Privacy in Zero Trust Environments

Speaker:Robert H. Deng

Singapore Management University, Singapore

About the Speaker

Robert H. DengRobert Deng is AXA Chair Professor of Cybersecurity, Director of the Secure Mobile Centre, and Deputy Dean for Faculty & Research, School of Computing and Information Systems, Singapore Management University. His research interests are in the areas of data security and privacy, network security, and applied cryptography. He received the Outstanding University Researcher Award from National University of Singapore, Lee Kuan Yew Fellowship for Research Excellence from SMU, and Asia-Pacific Information Security Leadership Achievements Community Service Star from International Information Systems Security Certification Consortium. He serves/served on the editorial boards of ACM Transactions on Privacy and Security, IEEE Security & Privacy, IEEE Transactions on Dependable and Secure Computing, IEEE Transactions on Information Forensics and Security, Journal of Computer Science and Technology, and Steering Committee Chair of the ACM Asia Conference on Computer and Communications Security. He is a Fellow of IEEE and Fellow of Academy of Engineering Singapore.


This talk will provide an overview on the design and implementation of a system for secure access, search, and computation of encrypted data in the cloud for enterprise users. The system is designed following the “zero trust” paradigm to protect data security and privacy even if cloud storage servers or user accounts are compromised. This is achieved using end-to-end (E2E) encryption in which encryption and decryption operations only take place at client devices. However, encryption must not hinder access, search and even computation of data by authorized users. There are numerous academic publications in this area and the choice of which cryptographic techniques to use could have significant impact on the system’s scalability and usability. We will share our experience in the design of the system architecture and selection of cryptographic techniques with a consideration to balance security, performance, and usability.

Title: Neurosymbolic Autonomy and the Quest for Smart(er) Decision-Making

Speaker:Alvaro Velasquez

Information Directorate of the Air Force Research Laboratory ,USA

About the Speaker

Robert H. DengAlvaro Velasquez leads the machine intelligence sub-portfolio of investments for the Information Directorate of the Air Force Research Laboratory (AFRL) in the United States. In this capacity, he manages and proposes new research directions and technology transitions for the Air Force in the fields of artificial intelligence and autonomous systems. This entails close collaboration with both the academic and private sectors. Alvaro received his PhD in Computer Science from the University of Central Florida and holds an interdisciplinary research record, including publications in artificial intelligence, combinatorial optimization, networking, cloud computing, and logic and circuit design. Alvaro is a recipient of numerous awards, including the National Science Foundation Graduate Research Fellowship Program (NSF GRFP) award, the University of Central Florida 30 Under 30 award, and best paper and patent awards from AFRL. He serves as Associate Editor of IEEE Transactions on Artificial Intelligence and his research is currently funded by the Air Force Office of Scientific Research.


Neurosymbolic Artificial Intelligence has experienced a renaissance and gained much traction in recent years as a potential “third wave” of AI to follow the tremendously successful second wave underpinned by statistical deep learning. This seeks the integration of neural learning systems and formal symbolic reasoning for more efficient, robust, and explainable AI. Such an integration holds much promise in areas like reinforcement learning and planning, where tremendous progress has been made in recent years, including great feats like the defeat of the world Go champion and powerful agents for real-time strategy games. However, the tremendous success of autonomous decision-making has highlighted its own shortcomings when it comes to data limitations, robustness, and trust, among other things. This talk presents some of these challenges and opportunities facing the development of neurosymbolic autonomy, how this differs from conventional neurosymbolic AI problems like classification and natural language processing, and potential implications to facilitating the broader adoption of autonomous solutions.


Copyright Blockchain-2022. Created and Maintained by Blockchain-2022 Web Team.