Keynote Speakers


Prof. Yulin Wang

Wuhan University, China


Prof. Yulin Wang is a full professor and PhD supervisor in International School of Software, Wuhan University, China. He got PhD degree in 2005 in Queen Mary, University of London, UK. Before that, he has worked in high-tech industry for more than ten years. He has involved many key projects, and hold 8 patents. He got his master and bachelor degree in 1990 and 1987 respectively from Xi-Dian University, and Huazhong University of Science and Technology(HUST), both in China. His research interests include digital rights management, digital watermarking, multimedia and network security, and signal processing. In recently 10 years, Prof. Wang has published as first author 3 books, 40 conference papers and 45 journal papers, including in IEEE Transactions and IEE proceedings and Elsevier Journals. Prof. Wang served as editor-in-chief for International Journal of Advances in Multimedia in 2010. He served as reviewer for many journals, including IEEE Transactions on Image Processing, IEEE Signal Processing Letters, Elsevier Journal of Information Sciences. He served as reviewer for many research funds, including National High Technology Research and Development Program of China ( ‘863’ project). Prof. Wang was the external PhD adviser of Dublin City University, Ireland during 2008-2010. He was the keynote speakers in many international conferences. He bas been listed in Marcus ‘who’s who in the world’ since 2008.
Speech Title: Digital Right Management in e-commerce based on Internet
Abstract: Different from hardware/firmware, digital media can be copied easily without any loss in quality and with nearly no material cost. Moreover, mass copying of the media is the simple duplication of one single copy. Since the digital media is needed to be rendered on user's device, we can pack the original media into protected form, binding with user's device. The device (machine) is in possession of the content on behalf of the user (human). For real situation, binding and mapping a user with a specific terminal may result in inconvenience. For example, the terminal device is out of order, or the user wants to transfer the media from his office PC to his laptop computer.


Since the content itself is completely in user's PC after being downloaded, we need to monitor the rendering program instead of the content itself to restrict user’s right on the content. Targeting on specific media or format, some DRM systems modify the existed rendering program or create their own rendering program for self-defined file format. In order to create universal DRM system, we need to allow the user to use their original rendering program, that is, neither customized rendering application nor customized specific content file format is required.


The content is processed into an all-in-one package before it is downloaded to the terminal. In order to achieve native control of the user's behavior on the terminal based on the basic rights stored the packed file, some technology is employed at the user’s PC, including binding the content with unique PC hardware fingerprint, intercepting illegal operation at kernel layer, and hiding bared intermediate file and related processes with root kit technology.


Prof Lili Yang
Loughborough University, UK
Professor of Southern University of Science and Technology; Visiting professor of North-eastern University in China; visiting professor of China University of Petroleum

Prof. Dr Lili Yang is a Reader in the School of Business and Economics at Loughborough University, UK. She has conducted a significant amount of research both independently and working in team. As the principal investigator she has led more than 12 projects and carried out 4 projects as co-investigator, which were funded by European Commission, EPSRC, DTI, Natural Environment Research Council, British Council, British Royal Society and industries such as BAE Systems etc. The total budget has reached to over £4 million. She has published over 85 journal and conference papers, produced some books. Her recent publications appear in the top journals such as Information Systems Research, European Journal of Operational Research, Technological Forecasting and Social Changes, to be named. She was invited by the UK Cabinet Office to give a presentation to their staff in London. She talked her research outcomes by invited on BBC Radio. Her research has generated great impact to the research community in the whole world.
Speech Title: Gdia: A Capturing Requirements Method for Emergency Response System
Abstract: Good information is vital for first responders in an emergency. However, although information systems can provide vast amounts of data, the information requirements of emergency first responders in complex, dynamic, ad hoc, and stressful environments cannot be systematically captured by existing requirement engineering (RE) approaches. Our study has proposed Goal Directed Information Analysis (GDIA) method which is based on but easier to use than an approach Goal Directed Cognitive Task Analysis (GDTA). We argue that goals are implicit and thus difficult to be captured from first responders because of the features of the emergency operations. GDIA starts from scenarios and has seven clearly-defined and repeatable steps, including task analysis, which then leads to a simpler and more accurate analysis of the goal structure, before the rest of the hierarchy, including decisions and information requirements is completed. A case study is presented by using this GDIA approach to retrieve information requirements and how an emergency response system has been developed. This work was supported by Department of Trade and Industry in the UK.


Assoc.  Prof. Arumuga Perumal

South Travancore Hindu College, India


Dr.S.Arumuga perumal , Assoc.Professor & Head of the Department of Computer Science and Research ,South Travancore Hindu College, Nagercoil, Tamilnadu, India and Chairman of IETE Trivandrum center received his M.S degree in Software Systems from BITS, Pilani , Ph.D. degree in computer science from Manonmaniam Sundaranar university and Chartered Engineer from Institution of Engineers(India) and Institution of Electronics and Telecommunication Engineers. He has extensive research interests including Internet of Things, Green computing and image processing. He has been a technical track chair, tutorial chair, publication chair, and session chair for more than 50 international conferences. He has published more than 100 international academic research papers. He is a Professional Engineer of Engineering council of India, Senior member of Computer society of India, Senior member of IEEE. Charted Engineer and Fellow of IE, Fellow of IETE, Fellow of IACSIT. He is involved in various academic activities such as curriculum development and professional society activities. He got Best teacher award from Tamilnadu Government, IETE Award, CSI award for academic excellence, Asiriar Chemmal award, and Eminent Engineer award from IE(I)-Madurai. He has successfully guided number of Ph.D scholars under his guidance and served as an advisor for industries.
Speech Title: Technology Integration for Smart Business Environment
Abstract: The Fast development of Network communication leads to the development of ICT which in turn leads to the development of innovative products, services, and business practices which is at the heart of value creation in today's new economy. Today, technology development in e-business is the leading source for the growth of world’s economy. The next ICT revolution will have a profound impact on our lives and the economy. Ubiquitous computing and the IOT are experiencing remarkable growth in the development of new businesses based on the use of new technologies and/or e-Business. Nowadays, The processes and tools that allow the business organization to use Internet-based technologies and infrastructure, both internally and externally, is increasing values to both the business organization and consumers. The next generation of Internet applications using Internet Protocol Version 6 (IPv6) would be able to communicate with devices attached to virtually all human-made objects because of the extremely large address space of the IPv6 protocol. This IoE system would therefore be able to identify any kind of object in the world located anywhere. In the future, through the concept of Internet of Everything (IoE), the light bulbs in shopping malls, home, offices will be an addressable intelligentunit with reduced energy consumption, and a global Device Management Controller (DMC) will be able to control and manage every single addressable smart device with in the network environment easily. Similarly, mobile robots and wireless smart devices will be able to interact and communicate with the environment intelligently, thereby adding more values to the business and society in an efficient, secure and reliable ways. Imagine living in a world of connected things that can intelligently and intuitively respond to what you need and want. Devices in your home, office and in the world around you could discover one another, connect and interact with in themselves, while adding personal context to situations, so they work for you. We call this “The Digital Sixth Sense”. We believe that when devices, places and people are intelligently connected, the impact on our daily life can be profound. And this will be made possible by the Internet of Everything (IoE) with enhanced security. We are working hard, using our leadership and knowledge within the mobile connected world, to help to create the fabric for IoE and for a smarter business environment.

  Organized by


  Co-organized by



  Contact Us

   Conference Secretary: Zeke. R. B. Zhou

   Address: Unit B on 15th Floor Eu Yan Sang

   Tower,Nos.11/15, Chatham Road South
   Kowloon, Hong Kong.

    Tel : +86-28-86528478 (China)
            +852-3500-0005 (Hong Kong)
            +1-313-263-4817 (USA)