Prof. S. V. Raghavan, Former Professor, IIT Madras, India

Former Professor of Computer Science and Engineering at IIT Madras, Technical Advisory Committee Chairs of NKN, NOFN, and DTH. Professor S. V. Raghavan is a member of the STNET Sub-committee of the Scientific Advisory Committee to the Cabinet (SAC-C) and is an expert member of many project review boards of MIT, AICTE, MHRD, and DRDO. He is a fellow of the Institution of Electronics & Telecommunication Engineers and the Computer Society of India. Professor S. V. Raghavan has made significant contributions to the creation of the Education and Research Network in India. He was the founder of ERNET. For over fifteen years (1985-1999), he played a key and pioneering role in ERNET. He is popularly known as the Chief Architect of NKN.

Prof. Takashi Nanya, The University of Tokyo, Japan

Prof. Takashi Nanya is a person having a wide experience of working in Research Laboratories, serving as a faculty, and also advisor to the industry. He is the mentor for CSE and ECE disciplines under Indo-Japan collaboration. He is helping IIITDM Jabalpur since its inception in curriculum development, arranging lectures by Japanese professors, fruitful visits of IIITDM faculty to Japan, and also students’ internships. He has been a key person for successful internships of IIITDMJ students in Canon. Prof. Takashi Nanya received the B.E. and M.E. degrees in Mathematical Engineering and Information Physics from the University of Tokyo, Japan, in 1969 and 1971, respectively, and his Ph.D. degree in Electrical Engineering from the Tokyo Institute of Technology, Japan in 1978. After working for Central Research Laboratories for around 10 years, he joined the Tokyo Institute of Technology. In 1996, he joined the University of Tokyo. From 2001 to 2004, he was the director of the Research Center for Advanced Science and Technology (RCAST), and a councilor of the University of Tokyo. During 2010-2014, he served as a full-time advisor in research and development for Canon Inc., Japan. He is Professor Emeritus of both the University of Tokyo and the Tokyo Institute of Technology. He is also a member of the Science Council of Japan. He is a Fellow of the IEEE and IEICE. In past years, he served as the Chair of IEEE-CS Technical Committee on Dependable Computing and Fault Tolerance, and the Chair of the Steering Committee of International Conference on Dependable Networks and Systems (DSN). He also served as a Vice-chair of the IFIP WG 10.4 "Dependable Computing and Fault Tolerance". He served as the General Chair of ASYNC, PRDC, DSN and ISAS, and as the Programme Committee Chair of FTCS and ASP-DAC. He served as an Associate Editor of IEEE Transactions on Computers and a Guest Editor of IEE Proceedings on Computer and Digital Techniques.

Title of the talk: Dependability of Cyber-Physical Systems
Abstract : We increasingly rely on cyber-physical systems featuring a tight integration of physical world and information systems that deliver a variety of services in every aspect of our daily life.Dependability, defined as a system’s ability to deliver services that can justifiably be trusted, is a vital attribute for such cyber-physical systems.
In this talk, we first introduce basic concepts of dependability including an integrated modelling with security, and then, presents known efforts toward design and implementation for dependability.We also discuss on dependability economics and further challenges toward higher-level dependability for cyber-physical systems.

Prof. Masahiro Fujita, The University of Tokyo, Japan

Prof. Masahiro Fujita received his Ph.D. in Information Engineering from the University of Tokyo in 1985 on his work on model checking of hardware designs by using logic programming languages. In 1985, he joined Fujitsu as a researcher and started to work on hardware automatic synthesis as well as formal verification methods and tools, including enhancements of BDD/SAT-based techniques. From 1993 to 2000, he was director at Fujitsu Laboratories of America and headed a hardware formal verification group developing a formal verifier for real-life designs having more than several million gates. The developed tool has been used in production internally at Fujitsu and externally as well. Since March 2000, he has been a professor at VLSI Design and Education Center of the University of Tokyo. He has done innovative work in the areas of hardware verification, synthesis, testing, and software verification-mostly targeting embedded software and web-based programs. He has been involved in a Japanese governmental research project for dependable system designs and has developed a formal verifier for C programs that could be used for both hardware and embedded software designs. The tool is now under evaluation jointly with industry under governmental support. He has authored and co-authored 10 books, and has more than 200 publications. He has been involved as program and steering committee member in many prestigious conferences on CAD, VLSI designs, software engineering, and more. His current research interests include synthesis and verification in SoC (System on Chip), hardware/software co-designs targeting embedded systems, digital/analog co-designs, and formal analysis, verification, and synthesis of web-based programs and embedded programs.

Title of the talk: Security Enhancement for Deep Learning on Many Cores with Ring Connections
Abstract: First we introduce an optimum mapping method based from sequential behavior to parallel computation on many cores with ring connection. It is based on SAT formulation plus inductive analysis and guarantees the optimality, i.e., with M cores, guaranteed speed up by M times is achieved.
Then taking matrix-vector products as target computations, discussions on security issues of the deep learning computations are given. When N by N matrices are multiplied with length N vectors on M cores, if N is dividable by M, its scheduling has regularity, and the generated ways of the computations can be identified by only observing the values of data transfers among cores. But if N is not dividable by M or the matrices are sparse, the generated ways of computations becomes very complicated, and there seems no way to understand the computations by observing the values of data transfers among cores.
Several experimental results on scheduling are presented to show the enhancements of the security, i.e., the weights used for deep learning cannot be identified with the values of data transfers among cores.

Prof. Kouichi Sakurai, Kyushu University, Japan

Dr. Kouichi Sakurai received the B.S. degree in mathematics from the Faculty of Science, Kyushu University in 1986. He received the M.S. degree in applied science in 1988, and the Doctorate in engineering in 1993 from the Faculty of Engineering, Kyushu University. He was engaged in research and development on cryptography and information security at the Computer and Information Systems Laboratory at Mitsubishi Electric Corporation from 1988 to 1994. From 1994, he worked for the Dept. of Computer Science of Kyushu University in the capacity of associate professor, and became a full professor there in 2002. He was working also with the Institute of Systems & Information Technologies and Nanotechnologies, as the chief of Information Security laboratory, for promoting research co-operations among the industry, university and government under the theme "Enhancing IT-security in social systems" by 2016. He has been successful in generating such co-operation between Japan, China and Korea for security technologies as the leader of a Cooperative International Research Project supported by the National Institute of Information and Communications Technology (NICT) during 2005-2006. Moreover, in March 2006, he established research co-operations under a Memorandum of Understanding in the field of information security with Professor Bimal Kumar Roy, the first time Japan has partnered with The Cryptology Research Society of India (CRSI). Now he is also working with Advanced Telecommunications Research institute international from October 2019. Professor Sakurai has published more than 350 academic papers around cryptography and information security (See:http://www.informatik.uni-trier.de/~ley/db/indices/a-tree/s/Sakurai:Kouichi.html)

Title of the talk: Cyber Chain Technology for Trust and Security of Society 5.0
Abstract: Japan is now taking the lead to realize Society 5.0 from Industry 4.0, which would create a society where we could resolve many social issues by incorporating the 4th industrial revolution (including oT, big data, AI, robot, and/or the sharing economy) not only into every industry but also extending to our social life. On this project, Trust and Security of Cyber-Physical Space with our Human Society are one of the important R&D topics. This talk introduces recent technologies of Supply Chain and BlockChain related to Society 5.0.

Prof. Hiroshi Imai, The University of Tokyo, Japan

Prof. Hiroshi Imai is a Professor at the Department of Information Science, Graduate School of Information Science and Technology, The University of Tokyo, Japan. He has contributed in many areas of Mathematics and Computer Science including approximation algorithms, discrete mathematics, computational geometry, combinatorial optimization, data compressions. His notable works on Quantum computing and quantum cryptography have laid foundations for many secure authentication systems. Prof. Imai’s present projects are on development of ‘Zero-Knowledge Interactive Proof System’ and study of ‘Matroids and Oriented Matroids’ apart from other important projects in Computer Science.

Title of the talk: Impact of Quantum Cryptography
Abstract: Quantum information processing provides us a perfect secure cryptosystem, generally called Quantum Cryptography, such as quantum key distribution protocol called BB84. This talk presents the state-of-the-art of advanced quantum cryptography, and its implications to modern cryptosystem such as RSA, the most well-knoown public-key cryptosystem and future post-quantum cryptography research.

Dr. Ponnurangam Kumaraguru, IIIT Delhi, India

Prof. Ponnurangam Kumaraguru ("PK") is an Associate Professor at IIIT-Delhi and is currently on sabbatical as a Visiting Associate Professor at IIIT Hyderabad. He is a TEDx and an ACM Distinguished speaker & ACM India Eminent Speaker. PK received his Ph.D. from the School of Computer Science at Carnegie Mellon University (CMU). His Ph.D. thesis work on anti-phishing research at CMU contributed in creating an award-winning startup - Wombat Security Technologies, wombatsecurity.com. Wombat was recently acquired for USD 225 Million. In addition to his contributions to academia, PK is on advisory role on various government organizations and a Fortune 500 company. He is also part of various Board of Studies of different academic institutes across the country. He has co-authored research papers in the field of Privacy and Security in Online Social Media, Cyber Security, Computational Social Science, Data Science for Social Good, amongst others. He is passionate about solving societal problems using technologies, especially contributing to the domain of social computing. PK and his students have played an integral role in developing a technology used by over 80+ State and Central Government agencies in India. He has spent time making notable contributions at organizations like IBM India Research Labs, Adobe Research Labs – India, Universidade Federal de Minas Gerais (UFMG) – Brazil, and Max Planck Institute for Software Systems – Germany. PK has served as a Program Committee member at prestigious conferences like WWW, CHI, PETs, ICWSM, CSCW, AsiaCCS. He was the Founding Head of Cybersecurity Education and Research Centre (CERC) at IIIT-Delhi. PK started and successfully manages PreCog (precog.iiitd.edu.in), a research group at IIIT-Delhi.

Title of the talk: Social Media Risk Communication & #Elections2019
Abstract: Selfies have become a prominent medium for self-portrayal onsocial media. Unfortunately, certain social media users go to extreme lengths to click selfies, which puts their lives at risk. 230+ individuals have died since March 2014 until January 2019 while trying to click selfies. We have been curating selfie deaths, building technologies to nudge users while taking dangerous selfies, e.g. Location Marker Saftie https://www.facebook.com/saftiebot/ and a camera Saftie Camera http://bit.ly/saftie-cam. We have made all the data and code that we have built public at http://labs.precog.iiitd.edu.in/killfie/ More recently we have started analysing distracted driving using Snapchat and we are in the process of characterising the problem. Will discuss about these risk communication efforts that we are pursuing through the social media content. 

Social Media, today, is playing a very important role in the politics of almost every nation. In India, there has been a boom in social media political campaigns, which was more marked in the 2014 General Elections. We are building a  portal http://bit.ly/elections19 to analyze the 2019 data and help see through the data that is getting generated on social media. We are finding some interesting patterns, one of them being sharp raise and fall of the followers http://precog.iiitd.edu.in/blog/2019/02/08/twitters-suspect-users-affects-indian-political-handles/ Will discuss some insights from our analysis until now. 

Dr. Sumanta Sarkar, TCS Innovation Labs, Hyderabad, India

Sumanta Sarkar did his PhD at Indian Statistical Institute, Kolkata. He was a postdoctoral researcher at INRIA, France and University of Calgary, Canada. Currently he is a research scientist in TCS Innovation Labs, Hyderabad, INDIA. His area of research is in Cryptography, Coding Theory, Blockchain Technology, and IoT security.

Title of the talk: IoT Security: Importance of Lightweight Cryptography
Abstract: Internet of Things (IoT) is one of the trending technologies. IoT is a fantastic idea which can change the way we live today. However, it is to be noted that there is a huge risk associated with this if IoT devices are not deployed properly. There have been several incidents reported where security in IoT networks has been compromised. Therefore, it is crucial to deploy encryption algorithms in IoT devices. However, as these devices are low resourced, the standard encryption algorithms like AES and RSA do not fit there. Lightweight Cryptography is an area that is focused on research and development of cryptographic algorithms that are suitable for resource constrained devices.
In this talk I will be speaking on the design of lightweight Block ciphers, the way one can build such ciphers, and also about the limitations.

Mr. Dattaram Rao, IBM India

Dattaram is a Senior Data Scientist and Architect in IoT CoC analytics Services team. He got his degree in Instrumentation and Electronics in 2003 and later completed his specialization in Statistics and Machine learning from IIM, Bangalore in 2011. His core experience is in developing AI/Machine learning based analytical solutions for Industry clients from Oil and Energy, Power, Automotive Manufacturing, Mining, Elevators and consumer electronics. He has led many FOAK projects and has built strong competencies in pre-sales, post-sales, technical consultation, execution of pilot, PoC’s and Cross collaboration. In his previous positions, he has also extensively worked with IBM research teams on creation of Machine learning libraries for Real Time analytics. Dattaram has authored articles, blogs, IBM redbook, patents, and has two publications in International Conference on analytics. His co-authored paper on ‘HMM Models for Aircraft Health Monitoring’ had won the Best Research Paper Award.

Title of the talk: Industry 4.0 and Digitization of assets: Challenges and Solutions
Abstract: The session would cover the key aspects of Industry 4.0 journey for Manufacturing Enterprises, the business benefits and the value proposition. The session would also reflect on key data security issues that arises from the Digitization of assets and the risk associated with data leakages. Lastly, session would provide key insights on the trends on the IT side - cloud infrastructure, data persistence,analytics and the security aspects.

Mr. Maithili Sharan Gupta, Spl Director General of Police (Police Reforms) Madhya Pradesh at police department, Madhya Pradesh

Mr. Gupta is an experienced Director General with a demonstrated history of working in the law enforcement industry. he is skilled in Operations Management, Analytical Skills, and Team Building. He is a strong military and protective services professional with a M Tech focused in Industrial Engineering from Indian Institute of Technology, Delhi. At present he is working on seven projects which may change capability of India.