Prof. Zhiwei Xu

Inner Mongolia University of Technology, China

Zhiwei Xu received the B.S. degree from University of Electronic Science and Technology of China, Chengdu, China, in 2002, and the Ph.D. degree from Institute of Computing Technology, Chinese Academy of Sciences, Beijing, China, in 2018. He is currently an associate professor and M.S. supervisor of Inner Mongolia University of Technology, while working as an adjunct professor in Institute of computing, Chinese Academy of Sciences. From January 2020 to July 2021, he worked towards visiting post-doctoral in the Department of Electrical and Computer Engineering, State University of New York at Stony Brook, Stony Brook, NY. His research interests include in-network data analysis, compact representation and modeling, and the related security and privacy problems. Prof. Xu has published 50+ research papers in IEEE TDSC, TCOM, TMC, and other high impact journals and well reputed international conferences proceeding in the area of Computer Network and Data Science. He is serving as a reviewer of IEEE TDSC, IEEE Infocom, AAAI and etc., the guest editor of a special issue of Applied Sciences, "Blockchain and Edge Computing Techniques for Emerging IoT Applications".

  • Invited Speech Abstract (Click)

    Speech Title: Advanced Feature Learning and Representation for AIoT

    Abstract: Artificial Intelligence (AI) provides a feasible technology to extract valuable knowledge from data gained through interconnected IoT devices and enable various intelligence applications. By incorporating AI’s computational power into IoT systems, AIoT (Artificial Intelligence of Things) is proposed and widely adopted in intelligent medical services, automated driving vehicles and other domains. Unfortunately, real-world data such as images, video, and other sensor data has not simply yielded to attempts to automated handcrafted and algorithmically define meaningful features for AI models and high-performance learning. To conquer this challenge, semi-supervised even unsupervised feature learning and representation has been applied to either raw data such as images or text, or to an initial set of data features, for faster training or advanced performance of downstream tasks, whereas the raw data was used directly. Considering the existing feature learning and representation is vulnerable to noise and different types of variance (e.g., dimension, illumination, viewpoint) in data, more advanced feature learning and representation for AIoT is extensively studied in terms of those for heterogeneous data, partially unaligned data, partially sample-missing data, etc..




 

Prof. Su-Cheng Haw

Multimedia University, Malaysia

Su-Cheng Haw is a Professor at Faculty of Computing and Informatics, Multimedia University, where she leads several funded research. She is the research center chairperson of Center for Web Engineering (CWE), which is multidisciplinary and encompasses diversify research from modeling and tools, implementation, testing and evaluation, and application in the areas such as Databases and Information Retrieval, Service Oriented Computing, IoT, e-Learning, and Statistical Analysis. In addition, she is also the Editor-in-Chief of Journal of Informatics and Web Engineering (JIWE).

Her research interests include XML databases, data warehousing, semantic web & ontology, data modeling, and recommender system. She has published around 120 articles in reputable journals and conferences. She serves in several editorial boards and participated as technical committee member and reviewer boards for several international conferences and journals. Besides, she also received several ad-hoc invitations to review journal/conference articles. She is currently a member of IEEE and MBOT professional membership.

  • Invited Speech Abstract (Click)

    Speech Title: Hybrid-based Recommender Systems

    Abstract: The amount of information and users has been increasing at a remarkable rate in recent years. This is where the recommender system comes in, recommender system is a system that generates a list of recommended products for the user. Recommender system has outshined as one of the important features in an e-Commerce portal. Several recommender techniques have been proposed, yet, problems such as cold-start item problem, cold-start user problem and data sparsity problem still existed. In this talk, some existing hybrid-based recommender system will be discussed focusing in retailer and e-commerce domain. In addition, possible research directions will be discussed based on the current trends and problems.




 

Prof. Hamidah Ibrahim

Universiti Putra Malaysia, Malaysia

HAMIDAH IBRAHIM is currently a professor in the Department of Computer Science at Universiti Putra Malaysia (UPM), Malaysia. She received her Ph.D. in Computer Science in 1998 from Cardiff University, UK, with a dissertation entitled Semantic Integrity Constraints Enforcement for a Distributed Database, guided by Prof. Alex Gray. She is a member of IEEE, IEEE Computer Society, and Association Computing Machinery (ACM). Her current research interests include databases (distributed, parallel, mobile, biomedical, XML) focusing on issues related to integrity maintenance/checking, ontology/schema/data integration, ontology/schema/data mapping, cache management, data security, transaction processing, query optimization, query reformulation, preference evaluation – context-aware, information extraction, concurrency control; and data management in mobile, grid, and cloud. She has received several research grants; among others are the Fundamental Research Grant Scheme (Ministry of Higher Education Malaysia), ScienceFund (Ministry of Science, Technology, and Innovation), and Research University Grant Putra. She has authored more than 300 scientific publications and book chapters. She serves as the editorial board member of several outstanding journals as well as reviewer of several scholarly journals like IEEE Access, Information Sciences, Journal of Supercomputing, etc.

  • Invited Speech Abstract (Click)

    Speech Title: Energy-Efficient Skyline Query Processing in Wireless Sensor Networks

    Abstract: Query processing, a technique for retrieving objects from a database in a reliable and efficient way; has achieved tremendous success at both research and industry levels. It operates by retrieving only those data points that strictly satisfy the conditions specified in the query or returning an empty result if otherwise. Recent developments in query processing attempt to relax these stringent requirements, by retrieving the best, most preferred data points from a database. These queries known as skyline queries rely on the notion of Pareto dominance, have achieved significant success, as they are widely used in applications related to multi-criteria decision making; wherein several conflicting criteria need to be evaluated in the process of making decision. It is more challenging when there are too many criteria to be considered while the data points to be analysed are those generated and transmitted from sensing devices also known as sensing data. This group of sensors which constitutes a wireless sensor network monitors data points at different sites and transmits these data points to a central site for further analysis. Inevitably, the network lifetime is reduced due to energy consumption for transmitting these sensing data. Furthermore, with the growth of network sizes, the sensing data become massive. Intuitively, it is crucial to reduce the transmission energy consumption for energy- efficient of skyline query computation by filtering the unwarranted data points in the sensor networks. In this abstract, we surveyed the recent works that have been conducted in improving energy efficiency of skyline query computation of wireless sensors networks in terms of the total energy consumption, the maximum energy consumption, and the network lifetime. Hence, the following questions will be the main focus of the abstract: What are the challenges in computing skylines of sensing data particularly in wireless sensor networks? How to reduce the transmission energy consumption of wireless sensor networks for energy-efficient of skyline query computation? What are the limitations of existing energy-efficient models and the potential extension works that can be conducted in future?




 

Assoc. Prof. Yixiang Fang

The Chinese University of Hong Kong, Shenzhen, China

Dr. Yixiang Fang is an Associate Professor at the School of Data Science in the Chinese University of Hong Kong, Shenzhen. He received his Ph.D. Degree from the University of Hong Kong in 2017 and worked as a research fellow in the University of Hong Kong during 2017-2018 and University of New South Wales, Australia during 2018-2020. Dr. Fang’s general research interests mainly focus on the areas of data management, data mining, and artificial intelligence over big data, such as data management, data mining, graph neural network, representation learning over big graph data, and keyword search, geo-social network mining, and trajectory query over big spatial data. He has published over 60 papers in the areas of database, data mining, and artificial intelligence, and most of them were published in top-tier conferences (e.g., PVLDB, SIGMOD, ICDE, NeurIPS, and IJCAI) and journals (e.g., TODS, VLDBJ and TKDE). Particularly, one of his representative papers was selected as the One of the four Best Papers in SIGMOD 2020 (~4/458) and awarded as the 2021 ACM SIGMOD Research Highlight Award. Dr. Fang is an editorial board member of the journal of Information & Processing Management (IPM). He has also served as program committee members for several top conferences (e.g., PVLDB, ICDE, KDD, AAAI, and IJCAI) and invited reviewers for top journals (e.g., TKDE and VLDBJ) in the areas of database and data mining.

  • Invited Speech Abstract (Click)

    Speech Title: Cohesive Subgraph Search: From Theories to Algorithms and Real Applications

    Abstract: With the advent of a wide spectrum of recent applications (e.g., social media and knowledge bases), various big graphs are prevalent in many areas. An important component of these graphs is the cohesive subgraph, or subgraph containing vertices that are densely connected internally. Searching cohesive subgraphs, as a fundamental research topic in the network science, has found many real-world applications, such as friend recommendation, event organization, fraud detection, and network analysis. In this talk, I will present our recent series of works in cohesive subgraph search over big graphs. Particularly, I will focus on the topics of densest subgraph discovery, community search, and graph embedding-based subgraph search in this research area. The first one aims to efficiently discover the subgraph with the highest density, the second one queries dense communities from big graphs in an online manner, and the last one aims to exploit AI techniques to solve traditional graph data management problems. I will extensively discuss the challenges, theories, solutions, and applications for these topics. Moreover, I will point out a list of promising future research directions in this research area.




 

Assoc. Prof. Xiaofang Xia

Xidian University, China

Xiaofang Xia is currently an associate professor with the School of Computer Science and Technology, Xidian University, China. She was selected for the 8th China Association for Science and Technology Young Talents Entrustment Project in 2022. She received her Ph.D. degree in Control Theory and Control Engineering from Shenyang Institute of Automation, Chinese Academy of Sciences, China, in 2019. She was a visiting scholar at the Department of Computer Science, University of Alabama, USA, from August 2016 to February 2018. Her research interests are mainly in cyber physical systems, smart grid security, database management system and anomaly detection. She serves as the Principal Investigator for nearly 10 research grants, including National Natural Science Foundation of China, China Postdoctoral Science Foundation, and multiple enterprise cooperation projects. In these areas, she has published over 20 papers in Proceedings of the IEEE, IEEE TIFS, IEEE TII, IEEE TFS, IEEE TASE, IEEE TNSE, IEEE TETC, IEEE IOTJ, IEEE JBHI, Computers & Security, etc.

  • Invited Speech Abstract (Click)

    Speech Title: Group Testing based Methods for Efficient Electricity Theft Detection

    Abstract: Electricity theft is a widespread problem that causes tremendous economic losses for all utility companies around the globe. As many countries struggle to update their antique power systems to emerging smart grids, more and more smart meters are deployed throughout the world. Compared with analog meters which can be tampered with by only physical attacks, smart meters can be manipulated by malicious users with both physical and cyber-attacks for the purpose of stealing electricity. Thus, electricity theft will become even more serious in a smart grid than in a traditional power system if utility companies do not implement efficient solutions. Our goal is to identify all malicious users in a neighborhood area in a smart grid within the shortest detection time. We propose an adaptive binary splitting inspection (ABSI) algorithm and a Group Testing based Heuristic Inspection (GTHI) algorithm which adopt group testing methods to locate the malicious users. During the inspection process of our proposed scheme, the inspection strategy as well as the number of users in the groups to be inspected are adaptively adjusted. Simulation results show that the proposed ABSI and GTHI algorithms outperform existing methods.




 

Asst. Prof. Ronina Caoili Tayuan

University of Santo Tomas, Philippines

Asst. Prof. Ronina R. Caoili-Tayuan is a Computer Engineering graduate from Mapua University and teaching in the Institute of Information and Computing Sciences (IICS)-Information Technology Department at the University of Santo Tomas, where she teaches courses under the Internet of Things (IoT), and Network and Security specializations. She is one of the Education eLearning Specialists of the University. She holds a Master’s Degree in Computer Science major in Software Development from Mapua University (formerly Mapua Institute of Technology), and a Microsoft Certified Professional in Systems Administration from Microsoft Corporation. She is currently taking up her Doctorate Degree in Doctor in Information Technology at De La Salle University-Manila specialized in Health Informatics.

She is an author of Living in the IT Era book published last 2019 and another book that is published early in 2021 entitled IT Application Tools in Business. She is currently involved with CHED-RECPE Grant Research entitled “UST-IICS Student Academic Performance Evaluation through Data Mining and Analytics as Suggestive Input to Curriculum Improvement”. She has been a Technical Committee Reviewer of International Research funded by Government in Gulf College, Sultanate of Oman.

  • Invited Speech Abstract (Click)

    Speech Title: Safe Box: A Three-Factor Authentication Vault Version 3.0

    Abstract: Safe Box: A Three-factor Authentication Vault v3.0 intends to enhance the first version and second version of the project. This version uses facial recognition, PIN, RFID tag, and mobile application as the authentication methods for secure identification of authorized users. Every activity made from the Safe Box would be logged to the user’s mobile application. Any sign of unauthorized access would trigger the Raspberry Pi Camera to take a five-second video clip to send to the authorized user’s mobile application through Firebase and sound an alarm for five minutes. The average boot up time of the system is 40.497 seconds. 10 out of 10 times a valid face was recognized inside a well-lit room, and 4 out of 10 inside a dimly lit room for a valid face. This resulted in improving the facial recognition feature of the system. The average time that the safe box unlocks after pressing the unlock button on the mobile application takes 1.91 seconds with a strong internet signal. In conclusion, the Raspberry Pi can manage the whole system without the use of Arduino. The user would be able to choose between using RFID or the mobile application as the third authenticator for every time the user transaction for opening the safe box to further secure valuables from unauthorized access or theft. Included also in the mobile application is the status of the vault which made the user able to monitor the Safe Box. This had resulted in an improvement of the overall security delivered by the Safe Box for the valuables put in it by the users. The researchers recommend that the mobile application should be able to access real time footage from the vault’s camera and provide the safe box GPS to be able to locate it if an intruder has taken it away.




Copyright © The 6th International Conference on Data Storage and Data Engineering (DSDE 2023) All rights reserved.