
2026 International Conference on Cybersecurity and Edge Computing
Keynote speakers

Jing-Ming Guo
National Taiwan University of Science and Technology, Taiwan, IEEE Fellow, AAIA Fellow
Prof. Guo received the Ph.D. degree from the Institute of Communication Engineering, National Taiwan University, Taipei, Taiwan, in 2004. He is currently a full Professor with the Department of Electrical Engineering, and Director of Advanced Intelligent Image and Vision Technology Research Center.
Prof. Guo is Chapter Chair of IEEE Signal Processing Society, Taipei Section, Board of Governor member of Asia Pacific Signal and Information Processing Association, and President of IET Taipei Local Network. He has been General Chair of many international conferences. He has been Technical Program Chair of many international conferences as well. He is/was Associate Editor of the IEEE Transactions on Image Processing, IEEE Transactions on Circuits and Systems for Video Technologies, IEEE Transactions on Multimedia, IEEE Signal Processing Letters, Information Sciences, Signal Processing, and Journal of Information Science and Engineering. He is a Fellow of IEEE and IET.
​
Speech Title: From AI to Generative AI: Cross-Domain Innovative Applications and Smart Healthcare
Abstract: This keynote addresses the paradigm shift from AI to Generative AI, emphasizing its cross-domain innovative applications and transformative potential in smart healthcare. It explores the evolution of AI technologies, challenges such as hallucination, bias, and high resource demands, and emerging solutions including Retrieval-Augmented Generation, mixture-of-experts, and multi-token prediction. Case studies demonstrate how generative AI enhances industrial efficiency, automates enterprise processes, and supports medical applications such as radiology report generation and disease diagnosis. By integrating spatial intelligence, robotics, and domain-specific innovations, this talk highlights pathways for responsible, sustainable, and impactful deployment of Generative AI across sectors.

Kwangjo Kim
Korea Advanced Institute of Science and Technology, South Korea, Emeritus, IACR Fellow, ACM member, IEEE Senior Member
​Kwangjo Kim is a professor in Graduate School of Information Securtity, School of Computing of KAIST. He received the B.S. and M.S. degrees of Electronic Engineering in Yonsei University, Korea in 1980 and 1883, respectively and Ph.D of Div. of Electrical and Computer Engineering in Yokohama National University, Japan in 1991. He has served as a board member of International Association for Cryptologic Research (IACR) from 2000 to 2004, chair of Asiacrypt Steering Committee from 2005 to 2008 and president of Korea Institute of Information Security and Cryptography(KIISC) in 2009. He was also a visiting professor in MIT (2005), UCSD(2005, KUSTAR,UAE(2012) and an education specialist in ITB, Indonesia (2013). He is currently a Korea Representative to IFIP TC-11, fellow of the IACR and honerable president of KIISC. His research interests include the theory of cryptology and information security and its application.
​
Speech Title: Securing Edge Computing against Quantum Threat using Post-Quantum Cryptography
Abstract: As quantum computing threatens traditional cryptography, especially in edge computing, this talk emphasizes the urgent need for adopting post-quantum cryptography (PQC). It presents a roadmap focused on cryptographic agility, inventory building, policy definition, and quantum-secure design to maintain security core principles like confidentiality, integrity, and availability. A key focus is our TTA standardization effort in Korea, which includes Part 1 (General) and Part 2 (SOLMAE Signature Scheme) of the NTRU lattice-based digital signatures, tailored for resource-constrained environments like edge computing.
The presentation compares the FALCON and SOLMAE signature schemes, highlighting SOLMAE’s practicality, simplified design, and its Python implementation. Looking ahead, it addresses the ongoing challenges of advancing PQC through innovation and rigorous formal development. The talk ultimately calls for immediate action to ensure long-term protection before quantum computing renders current security mechanisms at risk.

Peiying Zhang
China University of Petroleum (East China), China
Peiying Zhang received the Ph.D. degree from the School of Information and Communication Engineering, Beijing University of Posts and Telecommunications, Beijing, China, in 2019. He is currently an Professor with the College of Computer Science and Technology, China University of Petroleum (East China), Dongying, China. He has published multiple IEEE/ACM transactions/journal/magazine papers since 2016, such as IEEE Transactions on Industrial Informatics, IEEE Transactions on Intelligent Transportation Systems, IEEE Transactions on Vehicular Technology, IEEE Transactions on Network Science and Engineering, IEEE Transactions on Network and Service Management, IEEE Transactions on Emerging Topics in Computing, and IEEE Network. His research interests include semantic computing, future Internet architecture, network virtualization, and artificial intelligence for networking.,Dr. Zhang served as the Technical Program Committee of AAAI’24, AAAI’23, IEEE ICC’23, IEEE ICC’22, and INFOCOM Wireless-Sec 2023. He is the Leading Guest Editor of Drones, Mathematics, Electronics, Wireless Communications, and Mobile Computing. He is the editorial board of Drones, CMC-Computers, Materials and Continua, Mobile Information Systems, International Journal of Computational Intelligence Systems, and Artificial Intelligence and Applications.
​​
Speech Title: Secure and Privacy-Aware Edge Computing in Large-Scale Distributed Networks
Abstract: This keynote examines the security and privacy challenges of large-scale edge computing in low-latency environments such as 5G/6G networks, vehicular systems, and the Industrial Internet. It highlights the security paradox in which performance gains from edge intelligence come at the cost of expanded attack surfaces. The talk presents learning-driven and security-by-design solutions, including privacy-aware task offloading, federated multi-agent reinforcement learning, blockchain-enabled trust mechanisms, and explainable edge AI. Through applications in vehicular networks, unmanned aerial systems, and distributed IoT, the keynote demonstrates how these approaches jointly improve latency, reliability, and privacy, and outlines future directions toward intrinsic security and intelligent collaboration in next-generation edge-enabled networks.​

Ainuddin Wahid Bin Abdul Wahab
University of Malaya, Malaysia
Dr. AINUDDIN WAHID Received the BSc, and MSc degrees in Computer Science from the University of Malaya, Kuala Lumpur Malaysia, and the PhD degree in Multimedia Network from Surrey University, UK. He is currently working as an Associate Professor and the Deputy Dean (Research) with the Department of Computer Systems, Faculty of Computer Science and Information Technology, University of Malaya, Malaysia. His area of expertise includes Information Security, Information Hiding, Digital Forensics and Steganography. He is an Associate Editor of the Elsevier Journal of Information security and Applications (JISA).
​
Speech Title: The Theory, Techniques, and Philosophy of Digital Artefact
Abstract: This presentation explores the nature and philosophy of electronic evidence, defining a digital artefact as any sequence of bits that holds potential value for a legal case. It explains that digital objects are complex because they exist in multiple layers, ranging from physical storage to the applications users see on a screen. To find the truth, investigators use technical methods, such as hashing, to prove that data has not changed and unique noise patterns to identify the specific camera that captured an image. The slides also cover how to detect forgeries using Error Level Analysis and how to spot deepfakes through physiological inconsistencies. Finally, it discusses the gap between computer code and human intent, where the law must judge responsibility even when machines only follow logic. This work extends beyond simple file recovery to explore the fundamental principles of digital forensics and emerging threats, such as quantum computing.