Welcome to ICSEB 2017
2017 International Conference on Software and e-Business (ICSEB 2017) will be held in Hong Kong during December 28-30, 2017

Keynote Speakers


Keynote Speaker I

Prof. Yulin Wang
Wuhan University, China


Prof. Yulin Wang is a full professor and PhD supervisor in International School of Software, Wuhan University, China. He got PhD degree in 2005 in Queen Mary, University of London, UK. Before that, he has worked in high-tech industry for more than ten years. He has involved many key projects, and hold 8 patents. He got his master and bachelor degree in 1990 and 1987 respectively from Xi-Dian University, and Huazhong University of Science and Technology(HUST), both in China. His research interests include digital rights management, digital watermarking, multimedia and network security, and signal processing. In recently 10 years, Prof. Wang has published as first author 3 books, 40 conference papers and 45 journal papers, including in IEEE Transactions and IEE proceedings and Elsevier Journals. Prof. Wang served as editor-in-chief for International Journal of Advances in Multimedia in 2010. He served as reviewer for many journals, including IEEE Transactions on Image Processing, IEEE Signal Processing Letters, Elsevier Journal of Information Sciences. He served as reviewer for many research funds, including National High Technology Research and Development Program of China ( ‘863’ project). Prof. Wang was the external PhD adviser of Dublin City University, Ireland during 2008-2010. He was the keynote speakers in many international conferences. He bas been listed in Marcus ‘who’s who in the world’ since 2008.
Speech Title: Image Authentication and Tamper Localization
Image authentication can be used in many fields, including e-government, e-commerce, national security, news pictures, court evidence, medical image, engineering design, and so on. Since some content-preserving manipulations, such as JPEG compression, contrast enhancement, and brightness adjustment, are often acceptable—or even desired—in practical application, an authentication method needs to be able to distinguish them from malicious tampering, such as removal, addition, and modification of objects. Therefore, the traditional hash-based authentication is not suitable for the application. As for the semi-fragile watermarking technique, it meets the requirements of the above application at the expense of severely damaging image fidelity.
In this talk, we propose a hybrid authentication technique based on what we call fragile hash value. The technique can blindly detect and localize malicious tampering, while maintaining reasonable tolerance to conventional content-preserving manipulations. The hash value is derived from the relative difference between each pair of the selected DCT AC coefficient in a central block and its counterpart which is estimated by the DC values of the center block and its adjacent blocks. In order to maintain the relative difference relationship when the image undergoes legitimate processing, we make a pre-compensation for the AC coefficients. The technique is superior to semi-fragile techniques, especially in image fidelity, tolerance range of legitimate processing, and/or the ability to detect and localize the tampered area. Due to its low computational cost, the algorithm can be used in real-time image or video frame authentication.

Keynote Speaker II

Prof. Shuanghua Yang
Southern University of Science and Technology, China

Prof. Shuang-Hua Yang is an Associate Dean of Graduate School and a chair professor in Computer Science at Southern University of Science and Technology (SUSTech). He spent over 20 years in the UK Higher Education Institutions before joining SUSTech. He joined Loughborough University in 1997 as a research assistant, and progressing to a research fellow in 1999, a lecturer in 2000, a senior lecturer in 2003, a professor in 2006, and Head of Department of Computer Science in 2014. His educational history originated in China where he received a BSc in 1983, an MSc in 1986, both from the Petroleum University and a PhD in 1991 from Zhejiang University. He was awarded a Doctor of Science (DSc) degree, a higher doctorate degree, in 2014 from Loughborough University to recognize his scientific achievement in his academic career. He is a fellow of the Institute of Engineering and Technology (IET) since 2014, a fellow of the Institute of Measurement and Control since 2005, and a senior member of IEEE since 2003. He was selected as a national Thousand Talent Scheme expert in China in 2016. He was awarded the 2010 Honeywell Prize by the Institute of Measurement and Control in the UK in recognition of his contribution to home automation research. He was the author of four research monographs and over 200 academic journal papers. His research interests focus on Internet of Things, Cyber-Physical System, Wireless Sensor networks and Safety Critical Systems. 

Keynote Speaker III

Prof Lili Yang
Loughborough University, UK

Professor of Southern University of Science and Technology; Visiting professor of North-eastern University in China; visiting professor of China University of Petroleum

Prof. Dr Lili Yang is a Reader in the School of Business and Economics at Loughborough University, UK. She has conducted a significant amount of research both independently and working in team. As the principal investigator she has led more than 12 projects and carried out 4 projects as co-investigator, which were funded by European Commission, EPSRC, DTI, Natural Environment Research Council, British Council, British Royal Society and industries such as BAE Systems etc. The total budget has reached to over £4 million. She has published over 85 journal and conference papers, produced some books. Her recent publications appear in the top journals such as Information Systems Research, European Journal of Operational Research, Technological Forecasting and Social Changes, to be named. She was invited by the UK Cabinet Office to give a presentation to their staff in London. She talked her research outcomes by invited on BBC Radio. Her research has generated great impact to the research community in the whole world.

Keynote Speaker IV

Assoc. Prof. Simon James Fong
University of Macau, Macau

Simon Fong graduated from La Trobe University, Australia, with a 1st Class Honours BEng. Computer Systems degree and a PhD. Computer Science degree in 1993 and 1998 respectively. Simon is now working as an Associate Professor at the Computer and Information Science Department of the University of Macau. He is a co-founder of the Data Analytics and Collaborative Computing Research Group in the Faculty of Science and Technology. Prior to his academic career, Simon took up various managerial and technical posts, such as systems engineer, IT consultant and e-commerce director in Australia and Asia. Dr. Fong has published over 373 international conference and peer-reviewed journal papers, mostly in the areas of data mining, data stream mining, big data analytics, meta-heuristics optimization algorithms, and their applications. He serves on the editorial boards of the Journal of Network and Computer Applications of Elsevier, IEEE IT Professional Magazine, and various special issues of SCIE-indexed journals.

Invited Speaker I

Assoc. Prof. Norihiro Kamide
Teikyo University, Japan

Norihiro Kamide received his Ph.D. in Information Science from Japan Advanced Institute of Science and Technology in 2000. He is now an associate professor of Teikyo University. His main research areas are Logic in Computer Science, Mathematical Logic and Philosophical Logic. He is interested in non-classical logics and their applications to Software Science and Artificial Intelligence. He is now especially interested in model checking, logic programming and knowledge representation.
Speech Title: Paraconsistent model checking: Logics, translations and examples
Model checking is a formal and automated technique for verifying concurrent systems. Paraconsistent model checking, which is also called inconsistency-tolerant model checking, is a model checking paradigm that can appropriately verify systems with inconsistencies. Logics, translations and examples for paraconsistent model checking are presented in this talk. Paraconsistent linear-time temporal logic (pLTL) and paraconsistent computation-tree logic (pCTL), which can suitably represent inconsistency-tolerant reasoning, are introduced. These new logics are natural extensions of the standard temporal logics: linear-time temporal logic (LTL) and computation-tree logic (CTL), typically used in model checking. Translations from pLTL and pCTL into LTL and CTL, respectively, are defined, and theorems for embedding pLTL and pCTL into LTL and CTL, respectively, are proved using these translations. These embedding theorems allow us to reuse the standard LTL- and CTL-based model checking algorithms to verify inconsistent systems that are modeled and described by pLTL and pCTL. Some illustrative examples for paraconsistent model checking are also presented on the basis of the proposed logics and translations.