Dear all,
The next talk in the IARCS Verification Seminar Series will be given by
Shibashis Guha, a faculty member at the School of Technology and Computer
Science at Tata Institute of Fundamental Research, Mumbai. The talk is
scheduled on Tuesday, November 1, at 1900 hrs IST (add to Google calendar
<https://calendar.google.com/calendar/event?action=TEMPLATE&tmeid=MGsxMHR2dT…>
).
The details of the talk can be found on our webpage (
https://fmindia.cmi.ac.in/vss/), and also appended to the body of this
email.
The Verification Seminar Series, an initiative by the Indian Association
for Research in Computing Science (IARCS), is a monthly, online
talk-series, broadly in the area of Formal Methods and Programming
Languages, with applications in Verification and Synthesis. The aim of this
talk-series is to provide a platform for Formal Methods researchers to
interact regularly. In addition, we hope that it will make it easier for
researchers to explore newer problems/areas and collaborate on them, and
for younger researchers to start working in these areas.
All are welcome to join.
Best regards,
Akash, Deepak, Madhukar, Srivathsan
=============================================================
Title: A Game of Pawns
Meeting Link:
https://us02web.zoom.us/j/89164094870?pwd=eUFNRWp0bHYxRVpwVVNoVUdHU0djQT09
(Meeting ID: 891 6409 4870, Passcode: 082194)
Abstract: We introduce and study pawn games; a class of two-player
turn-based zero-sum games in which the control of vertices changes
dynamically throughout the game. Pawn games naturally model ongoing
decision-making setting in which resources are transferable. Each vertex of
a pawn game is owned by a pawn. In each round of the game, the pawns are
partitioned between the two players. The player who moves the token from a
vertex is the player who controls the pawn that owns the vertex. A pawn
game is equipped with a mechanism, which the players apply after each round
in order to update the set of pawns that they control. We define several
grabbing-based mechanisms in which control of at most one pawn transfers at
the end of each round. We study the complexity of solving reachability pawn
games, where we parameterize the problem by the mechanism that is being
used and by restrictions on pawn ownership of vertices. For the positive
news, even though pawn games are exponentially-succinct turn-based games,
we identify some natural classes that can be solved in PTIME. For the
negative news, we identify some classes for which the problem is
EXPTIME-complete. Our EXPTIME-hardness results are based on a class of
games which we introduce and call Lock-and-Key games, and which may be of
independent interest.
This is a joint work with Guy Avni and Pranav Ghorpade.
Bio: Shibashis Guha is a faculty member at the School of Technology and
Computer Science at Tata Institute of Fundamental Research, Mumbai. Before
this, he was a postdoc at the Verification Group in Université libre de
Bruxelles and at The Hebrew University in the group of Prof. Orna
Kupferman. He did his PhD from the Department of Computer Science and
Engineering at IIT Delhi, under the supervision of Prof. S. Arun-Kumar. His
research interests include reactive synthesis, probabilistic systems, timed
automata, behavioural equivalences, formal methods and its intersection
with algorithmic game theory.
Dear all,
The 7th edition of the Indian SAT+SMT School will be held during 15-17
December 2022, at IIT Madras, co-located with FSTTCS 2022. This will be an
in-person event, for which you may register here:
https://sat-smt.in/registration.html
We invite entries for poster presentations and talks in the broad area of
SAT/SMT. If you are interested, please let us know by submitting this
Google form:
https://docs.google.com/forms/d/e/1FAIpQLScpAxed6T04Y2KSyacDMKpElTZQgVmd9dR…
The deadline for this is Nov. 15th (anywhere on earth). Note that a
print-out of presentation-slides may be used in place of posters during the
poster presentation.
We look forward to your participation. Needless to say, we'd be very happy
to clarify any questions you might have in this regard. Feel free to write
to us at indian.satsmt.school(a)gmail.com <mailto:indian.satsmt.school
@gmail.com <indian.satsmt.school(a)gmail.com>>.
Best regards,
Supratik Chakraborty, IIT Bombay
Ashutosh Gupta, IIT Bombay
Saurabh Joshi, SupraOracles
Kumar Madhukar, IIT Delhi
Kuldeep Meel, NUS
Subodh Sharma, IIT Delhi
UbiSec 2022 CFP with 5+Keynotes&10+Invited Talks&20+SIs: Deadline Extended to Oct. 30
Please accept our apologies if you receive multiple copies of this Final UbiSec 2022 Second Batch Call for Papers (CFPs) with Deadline October 30, 2022 (Final, No further extension will be granted).
============================== UbiSec 2022 ==============================
Conferences Pivoting to a Part-Virtual Platform
[UbiSec 2022] - Now Taking Place Part-Virtually
Due to the current COVID-19 situation, the UbiSec 2022 conference will be a combination of online and offline event. For authors who consider to present their papers online, please pay a half of author registration fees for each paper and show this "Half Registration Fees" information in the "Remarks" field in the registration form; For attendees who will join the conference online, please pay a half of attendee registration fees and show this "Half Registration Fees" information in the "Remarks" field in the registration form. For questions, contact [UbiSec2022 AT googlegroups DOT com].
Final CFPs of The Second International Conference on Ubiquitous Security (UbiSec 2022)
Zhangjiajie, China, December 28 - 31, 2022
Organizers:
Guangzhou University, China
Jishou University, China
http://ubisecurity.org/2022/
======================================================================
Keynote Speeches Section
You are welcome to attend 5+ Keynote Speeches offerred by world-renowned professors and industry leaders. The detailed information will appear soon.
(1) Keynote 1: Prof. Richard Hill, University of Huddersfield, UK
Title: Next Generation Security for Cyber Physical Systems
https://pure.hud.ac.uk/en/persons/richard-hill
(2) Keynote 2: Prof. Tien N. Nguyen, University of Queensland, Australia
Title: Intelligent Software Vulnerability Detection
https://personal.utdallas.edu/~tien.n.nguyen/
(3) Keynote 3: Prof. Omer Rana, Cardiff University, UK
Title: Security-Aware Task Execution across the Edge-Cloud Continuum
https://www.cardiff.ac.uk/people/view/118157-rana-omer
(4) Keynote 4: Prof. Kouichi SAKURAI, Kyushu University, Japan
Title: State and Issues of Non-Fungible Token from Technical Point of View
https://hyoka.ofc.kyushu-u.ac.jp/search/details/K000220/english.html
(5) Keynote 5: Prof. Deqing Zou, Huazhong University of Science and Technology, China
Title: Achieving Scalability and Interpretability Simultaneously in Detecting Multi-granularity Vulnerabilities
http://faculty.hust.edu.cn/zoudeqing/zh_CN/index.htm
======================================================================
Invited Talks Section
You are welcome to attend 10+ Invited Talks offerred by world-renowned professors and industry leaders. The detailed information will appear soon.
(1) Prof. Arcangelo Castiglione, University of Salerno, Italy
Title: New Insights on Cryptographic Hierarchical Access Control: Models, Schemes, and Analysis
https://docenti.unisa.it/026260/en/home
(2) Prof. Scott Fowler, Linkoping University, Sweden
Title: Optimize Industrial IoT HVAC by using Machine Learning
https://liu.se/en/employee/scofo47, https://sites.google.com/site/scofo47
(3) Prof. Wenjun Jiang, Hunan University, China
Title: Online user analysis and learning optimization
http://csee.hnu.edu.cn/people/jiangwenjun
(4) Prof. Ryan Ko, University of Queensland, Australia
Title: Operational Technology (OT) and Supply Chain Cyber Security: The Storm Approaching Us
https://itee.uq.edu.au/profile/1409/ryan-ko
(5) Prof. Qin Liu, Hunan University, China
Title: Secure Search in Cloud Computing and Emerging Applications
https://qinliu-hnu.github.io/
(6) Prof. Sabu M. Thampi, Kerala University of Digital Sciences, Innovation and Technology (KUDSIT), India
Title: Security and Privacy Issues in the Internet of Drones
http://www.sabumthampi.in
(7) Prof. Tian Wang, Beijing Normal University, China
Title: Distributed Mobile Computation Offloading and Edge Intelligence
https://cist.bnu.edu.cn/xygk/szdw/zgj/104104.html
(8) Prof. Carlos Becker Westphall, Federal University of Santa Catarina, Brazil
Title: Mutual Authentication with Multi-factor and Hybrid Approach to Intrusion Detection in IoT-Fog-Cloud Environment
https://lrg.ufsc.br/westphal/
(9) Prof. Yulei Wu, University of Exeter, UK
Title: Trustworthiness of anomaly detection for IIoT
http://empslocal.ex.ac.uk/people/staff/yw433/
(10) Prof. Yang Xu, Hunan University, China
Title: Blockchain-enabled Cloud Security: Frameworks and Solutions
http://csee.hnu.edu.cn/people/xuyang
======================================================================
Panel Discussions Section
You are welcome to attend 2+ Panel Discussions offerred by world-renowned professors and industry leaders. The detailed information will appear soon.
======================================================================
Special Issues Section
Distinguished papers, after further revisions, will be published in 20+ SCI & EI indexed special issues.
Here is the list of Special Issues that we will recommend high-quality papers for possible publication *:
(1) IEICE Transactions on Information and Systems (SCI & EI Indexed, Impact Factor: 0.559)
Special Section on Blockchain and Security (Pending).
(2) IEEE Journal of Selected Topics in Applied Earth Observations and Remote Sensing (SCI & EI Indexed, Impact Factor: 4.715)
Special Issue on Security and Privacy-preserving Solutions on Remote Sensing Data of Smart Cities
https://4d8xuv2577wggnmowfwzehpo-wpengine.netdna-ssl.com/wp-content/uploads…
Deadline for manuscript submissions: 28 February 2023.
(3) Sensors (SCI & EI Indexed, Impact Factor: 3.847)
Special Issue on Security and Privacy for Edge, Fog, and Cloud Computing; the Internet of Things and Mobile Crowdsensing
https://www.mdpi.com/journal/sensors/special_issues/SP_EFC
Deadline for manuscript submissions: 10 October 2023.
(4) Sensors (SCI & EI Indexed, Impact Factor: 3.847)
Special Issue on Fog/Edge Computing based Smart Sensing System
http://www.mdpi.com/journal/sensors/special_issues/FCSCS
Deadline for manuscript submissions: 31 March 2023.
(5) Sensors (SCI & EI Indexed, Impact Factor: 3.847)
Special Issue on Cyber Situational Awareness in Computer Networks
https://www.mdpi.com/journal/sensors/topical_collections/Cyber_Situational_…
Deadline for manuscript submissions: 31 March 2023.
(6) Sensors (SCI & EI Indexed, Impact Factor: 3.847)
Special Issue on Security, Trust and Privacy in New Computing Environments
https://www.mdpi.com/journal/sensors/topical_collections/STPNCE
Deadline for manuscript submissions: 31 March 2023.
(7) Connection Science (SCI & EI Indexed, Impact Factor: 1.972)
https://www.tandfonline.com/ccos20
Some selected conference papers will be recommended for possible publication in regular issues of this journal, with a sufficient amount of new materials added into the journal version.
Deadline for manuscript submissions: 31 March 2023.
(8) Computers, Materials & Continua (SCI & EI Indexed, Impact Factor: 3.86)
https://techscience.com/cmc/special_detail/human-centric_edge
Special Issue on AI Powered Human-centric Computing with Cloud and Edge
Deadline for manuscript submissions: 1 March 2023.
(9) Sensors (SCI & EI Indexed, Impact Factor: 3.847)
Special Issue on Cryptography and Security Protocol in Internet of Things
https://www.mdpi.com/journal/sensors/special_issues/CSPIOT
Deadline for manuscript submissions: 31 December 2022.
(10) Applied Sciences (SCI & EI Indexed, Impact Factor: 2.838)
Special Issue on Computational Methods for Next Generation Wireless and IoT Applications
https://www.mdpi.com/journal/applsci/special_issues/Generation_Wireless_IoT
Deadline for manuscript submissions: 31 December 2022.
(11) Sensors (SCI & EI Indexed, Impact Factor: 3.847)
Special Issue on Advanced Signal Processing and Human-Machine Interface for Healthcare Diagnostics and Bioengineering Applications
https://www.mdpi.com/journal/sensors/special_issues/advanced_signal_process…
Deadline for manuscript submissions: 20 December 2022.
(12) Information Sciences (SCI & EI Indexed, Impact Factor: 8.233)
Special Issue on Decentralized Trust Management with Intelligence
https://www.sciencedirect.com/journal/information-sciences/about/call-for-p…
Deadline for manuscript submissions: 1 December 2022.
(13) ISA Transactions (SCI & EI Indexed, Impact Factor: 5.468)
Special Issue on Security and Privacy of AI-based Automation Systems
http://ubisecurity.org/2022/share/CFP%20-%20ISA%20Transactions%20SI%20-%20S…
Deadline for manuscript submissions: 30 November 2022.
(14) Electronics (SCI & EI Indexed, Impact Factor: 2.690)
Special Issue on Cybersecurity and Privacy Issues in Cyber-Physical Systems and Industrial Control Systems
https://www.mdpi.com/journal/electronics/special_issues/cyber_industrial_co…
Deadline for manuscript submissions: 25 November 2022.
(15) IET Cyber-Physical Systems: Theory & Applications (EI Indexed)
Special Issue on IoT-based Secure Health Monitoring and Tracking through Estimated Computing
https://ietresearch.onlinelibrary.wiley.com/pb-assets/assets/23983396/Speci…
Deadline for manuscript submissions: 30 April 2023.
(16) International Journal of Computational Science and Engineering (IJCSE) (EI Indexed)
http://www.inderscience.com/browse/index.php?journalCODE=ijcse
Some selected conference papers will be recommended for possible publication in regular issues of this journal, with a sufficient amount of new materials added into the journal version.
Deadline for manuscript submissions: 31 March 2023.
(17) Cryptography (EI Indexed)
Special Issue on Privacy-Preserving Techniques in Cloud/Fog and Internet of Things
https://www.mdpi.com/journal/cryptography/special_issues/Privacy_Preserving…
Deadline for manuscript submissions: 10 January 2023.
(18) ACM Distributed Ledger Technologies: Research and Practice (ACM DLT) (EI Indexed)
Special Issue on Recent Advances of Blockchain Evolution: Architecture and Performance
https://dl.acm.org/pb-assets/static_journal_pages/dlt/pdf/DLT-SI-Recent-Adv…
Deadline for manuscript submissions: 15 December 2022.
(19) Organizational Cybersecurity Journal: Practice, Process and People
Special Issue on Organizational Cybersecurity Journal: Practice, Process and People
https://www.emeraldgrouppublishing.com/calls-for-papers/cybersecurity-highe…
Deadline for manuscript submissions: 30 March 2023.
(20) Acta Informatica Pragensia
Special Issue on Deep Learning Blockchain-enabled Technology for Improved Healthcare Industrial Systems
https://aip.vse.cz/corproof.php?tartkey=aip-000000-0305&fbclid=IwAR1veJzaae…
Deadline for manuscript submissions: 20 December 2022.
* More special issues will be available soon.
======================================================================
Welcome to participate in UbiSec 2022, Zhangjiajie, China, December 28 - 31, 2022! Zhangjiajie is an emerging tourist destination famous for its unique natural scenery and abundant tourism resources. It is located in the northwest of Hunan province, about 400 kilometers away from Changsha, the capital of Hunan province, covering a total area of 9,516 square kilometers, of which 76% are mountainous area. Out of its total population of 1.52 million, almost 77% belong to ethnic minority groups, including Tujia, Bai and Miao nationalities. Zhangjiajie National Forest Park was established by the State Council in 1982 as the first National Forest Park of China. Wulingyuan in Zhangjiajie was listed into the World Natural Heritage Catalogue by the UNESCO in 1992 and appraised as a national AAAAA scenic area. Zhangjiajie was awarded the title of "World Geological Park" in 2004. The amazing landscape here had been a source of creation of the CGI artist in the Avatar movie, and since the movie was released and achieved a great success, many tourists keeping coming to Zhangjiajie admiring this natural beauty.
The Second International Conference on Ubiquitous Security (UbiSec 2022) stems from three conference/symposium/workshop series:
(1) The well-established SpaCCS conference series with Springer LNCS: UbiSec is inspired by the SpaCCS style of three tracks (Security, Privacy, and Anonymity, "Spa" for short), which covers "Big Security" leveraging computation, communication and storage ("CCS" for short) systems and networks. UbiSec extends this style with three new tracks: Cyberspace Security, Cyberspace Privacy, and Cyberspace Anonymity.
(2) The UbiSafe symposium series: UbiSec follows the UbiSafe vision on "Ubiquitous Safety", also meaning that "YOU (will) BE SAFE" (pronounced "UbiSafe"). UbiSec extends this vision to "Ubiquitous Security", using "Big Security" to embrace NOT ONLY security, privacy and anonymity, BUT ALSO safety, reliability, dependability, trustworthiness and more, also meaning that "YOU (will) BE SEC(ure)" (pronounced "UbiSec").
(3) The IWCSS workshop series: UbiSec follows the IWCSS theme on "Cyberspace Security", with "Cyberspace" as the 5th national sovereign space besides the traditional four domains of land, sea, air, and aerospace. UbiSec extends this theme to "Ubiquitous Security", meaning that cyberspace will be secure, physical world will be secure, social networking systems will be secure, and thus "YOU (will) BE SECure"!
The UbiSec 2022 Conference ("The Conference" for short) is the second event in the series of conferences/symposia/workshops which are devoted to security, privacy and anonymity in cyberspace, physical world, and social networks. The Conference covers many dimensions including security algorithms and architectures, privacy-aware policies, regulations and techniques, anonymous computation and communication, encompassing fundamental theoretical approaches, practical experimental projects, and commercial application systems for cyberspace, physical world, and social networking systems. As applications of computer and information technology have permeated in every aspect of our daily life, the issues of security, privacy, and anonymity have become increasingly critical. The Conference will provide a forum for world-class researchers to gather and share their research achievements, emerging ideas and trends in the highly challenging research fields.
UbiSec 2022 follows the UbiSec 2021 conference in Guangzhou and also the traditions of previous successful SpaCCS/UbiSafe/IWCSS conference/symposium/workshop series, held in Nanjing, China (SpaCCS 2020/UbiSafe 2020), Guangzhou, China (IWCSS 2020); Altanta, USA (SpaCCS 2019/UbiSafe 2019), Guangzhou, China (IWCSS 2019); Melbourne, Australia (SpaCCS 2018/UbiSafe 2018), Guangzhou China (IWCSS 2018); Guangzhou, China (SpaCCS 2017/UbiSafe 2017/IWCSS 2017); Zhangjiajie, China (SpaCCS 2016/UbiSafe 2016); Helsinki, Finland (UbiSafe 2015); Beijing, China (UbiSafe 2014); Melbourne, Australia (UbiSafe 2013); Liverpool, UK (UbiSafe 2012); Changsha, China (UbiSafe 2011); Chengdu China (UbiSafe 2009); and Niagara Falls, Canada (UbiSafe 2007). The conference aims at bringing together researchers and practitioners in the world working in the research fields of security, privacy, and anonymity aspects of computer systems and networks. The conference will focus on broad areas of architectures, algorithms, techniques, and applications for cyberspace security, cyberspace privacy, and cyberspace anonymity.
UbiSec 2022 topics include, but are not limited to the following:
Track 1: Cyberspace Security
--Security Model and Architecture
--Software and System Security
--Trustworthy Computing
--Security in Cloud/Fog/Edge Computing and Pervasive/Ubiquitous Computing
--Machine Learning and AI Security
--Network Security
--Attacks and Defenses
--Intrusion Detection and Prevention
--Security in Web Services
--Security in Mobile Social Networks
--Security in Internet of Things
--Fraud and Cyber Crime
--Accounting and Auditing
--Applied Cryptography
--Database Security
--Authentication
--Forensics and Diagnostics for Security
--Information Hiding
--Security in Big Data and its Applications
--Blockchain and Distributed System Security
--Security in Hardware, Side Channels, and CyberPhysical Systems
--Security in Formal Methods and Programming Languages
Track 2: Cyberspace Privacy
--Economics, Policies, Metrics, and Mechanisms of Privacy
--Privacy Modeling and Analysis
--Privacy-Preserving Computing
--Privacy-Preserving Data Mining
--Privacy-Enhancing Technologies and Anonymity
--Privacy for Internet of Things
--Privacy in Big Data and its Applications
--Privacy-Preserving in Blockchain
--Privacy-Preserving in Mobile Social Networks
--Privacy-Preserving Crowdsensing
--Privacy-Preserving Deep Learning
Track 3: Cyberspace Anonymity
--Anonymous Data Mining and Data Sharing
--Anonymous Management in Trust Relationships
--Anonymous Video Analytics Technology
--Anonymity Metrics, Measures and Evaluations
--Anonymity Models, Hardware/Device of Anonymity
--Anonymity in Wireless Communication Systems
--Anonymous Communication Protocols
--Anonymity in Mobile, Ad Hoc, and Wireless Sensor Networks
--Anonymous Communication and Internet
--Anonymous Social Networks, Structural k-Anonymity in Social Networks
--Authentication Protocol Providing User Anonymity
--Anonymous Information Storage and Management
--Private and Anonymous Data Storage
--Anonymity, Pseudonymity & Identity Management
--Anonymity in Big Data and Cloud Scenarios
--Anonymity in Health and Medical Databases
--Anonymity in Sensor-Cloud Systems
--Anonymity in Edge Computing
IMPORTANT DATES
Paper Submission Deadline: October 30, 2022 (Second Batch, No further extension will be granted)
Author Notification: November 30, 2022 (Second Batch)
Author Registration Due: December 20, 2022 (Second Batch)
Camera-Ready Paper Due: December 20, 2022 (Second Batch)
Conference Dates: December 28 - 31, 2022
SUBMISSION and PUBLICATION INFORMATION
All presented papers in the conference will be published in the conference proceedings with Springer Communications in Computer and Information Science (CCIS). Papers must be clearly presented in English, must not exceed 14 pages in Springer CCIS format (or up to 20 pages with the pages over length charge), including tables, figures, references and appendices. Notice that accepted papers less than 12 pages will be tagged as Short Papers. Papers should be submitted through the EasyChair paper submission system at the conference website. Distinguished papers, after further revisions, will be considered for possible publication in SCI & EI indexed special issues of prestigious international journals. The program committee will select and give three "Best Paper Awards" for the conference. By submitting a paper to the conference, authors assure that if the paper is accepted, at least one author will attend the conference and present the paper.
Excecutive General Chair
Guojun Wang, Guangzhou University, China
Local Organizing Chair
Jianfeng Li, Jishou University, China
General Chairs
Hanpin Wang, Guangzhou University, China
Richard Hill, University of Huddersfield, United Kingdom
Aniello Castiglione, University of Naples Parthenope, Italy
Program Chairs
Guojun Wang, Guangzhou University, China
Kim-Kwang Raymond Choo, University of Texas at San Antonio, USA
Jie Wu, Temple University, USA
Ernesto Damiani, Khalifa University, UAE/Universita' degli Studi di Milano, Italy
Program Vice Chairs
(1) Cyberspace Security Track
Qin Liu, Hunan University, China
Wenjia Li, New York Institute of Technology, USA
Jie Hu, University of Electronic Science and Technology of China, China
Saed Alrabaee, United Arab Emirates University, UAE
Charalambos (Harrys) Konstantinou, King Abdullah University of Science and Technology, Saudi Arabia
(2) Cyberspace Privacy Track
Yulei Wu, University of Exeter, United Kingdom
Wenjun Jiang, Hunan University, China
Saqib Ali, University of Agriculture Faisalabad, Pakistan
Md Tariqul Islam, Syracuse University, USA
Saad Khan, University of Huddersfield, United Kingdom
(3) Cyberspace Anonymity Track
Tian Wang, Beijing Normal University & UIC, China
A. S. M. Kayes, La Trobe University, Australia
Oana Geman, University of Suceava, Romania
Mamoun Alazab, Charles Darwin University, Australia
Hudan Studiawan, Institut Teknologi Sepuluh Nopember, Indonesia
Publicity Chairs
Carlos Becker Westphall, Federal University of Santa Catarina, Brazil
Scott Fowler, Linkoping University, Sweden
Peter Mueller, IBM Zurich Research Laboratory, Switzerland
Haroon Elahi, Umea University, Sweden
Yulei Wu, University of Exeter, United Kingdom
Xiangyong Liu, Guangzhou University, China
Workshop Chairs
Sabu M. Thampi, Kerala University of Digital Sciences, Innovation and Technology (KUDSIT), India
Arcangelo Castiglione, University of Salerno, Italy
Shuhong Chen, Guangzhou University, China
Publication Chairs
Tao Peng, Guangzhou University, China
Fang Qi, Central South University, China
Registration Chairs
Xiaofei Xing, Guangzhou University, China
Pin Liu, Central South University, China
Pengfei Yin, Jishou University, China
Conference Secretariat
Wenyin Yang, Foshan University, China
Web Chairs
Ziwei Xiao, Foshan University, China
Jianguo Jiang, Foshan University, China
Steering Committee
Guojun Wang, Guangzhou University, China (Chair)
Kim-Kwang Raymond Choo, University of Texas at San Antonio, USA (Chair)
Saqib Ali, University of Agriculture Faisalabad, Pakistan
Valentina E. Balas, Aurel Vlaicu University of Arad, Romania
Md Zakirul Alam Bhuiyan, Fordham University, USA
Jiannong Cao, The Hong Kong Polytechnic University, Hong Kong
Aniello Castiglione, University of Naples Parthenope, Italy
Scott Fowler, Linkoping University, Sweden
Oana Geman, University of Suceava, Romania
Richard Hill, University of Huddersfield, United Kingdom
Ryan Ko, University of Queensland, Australia
Kuan-Ching Li, Providence University, Taiwan
Jianhua Ma, Hosei University, Japan
Gregorio Martinez, University of Murcia, Spain
Peter Mueller, IBM Zurich Research Laboratory, Switzerland
Kouichi Sakurai, Kyushu University, Japan
Sabu M. Thampi, Indian Institute of Information Technology and Management - KeralaKerala University of Digital Sciences, Innovation and Technology (KUDSIT), India
Carlos Becker Westphall, Federal University of Santa Catarina, Brazil
Jie Wu, Temple University, USA
Yang Xu, Hunan University, China
Zheng Yan, Xidian University, China/Aalto University, Finland
Wenyin Yang, Foshan University, China
Haojin Zhu, Shanghai Jiao Tong University, China
Program Committee
Please check the "Program Committee" web page at the conference website for detail:
http://ubisecurity.org/2022/
Archived Conference Proceedings:
(1) UbiSec 2021 Conference Proceedings
https://link.springer.com/book/10.1007/978-981-19-0468-4
(2) SpaCCS 2020 Conference Proceedings
https://link.springer.com/book/10.1007/978-3-030-68851-6
SpaCCS 2020 Workshops Proceedings
https://link.springer.com/book/10.1007/978-3-030-68884-4
(3) SpaCCS 2019 Conference Proceedings
https://link.springer.com/book/10.1007/978-3-030-24907-6
SpaCCS 2019 Workshops Proceedings
https://link.springer.com/book/10.1007/978-3-030-24900-7
(4) SpaCCS 2018 Conference Proceedings
https://link.springer.com/book/10.1007/978-3-030-05345-1
(5) SpaCCS 2017 Conference Proceedings
https://link.springer.com/book/10.1007/978-3-319-72389-1
SpaCCS 2017 Workshops Proceedings
https://link.springer.com/book/10.1007/978-3-319-72395-2
(6) SpaCCS 2016 Conference Proceedings
https://link.springer.com/book/10.1007/978-3-319-49148-6
SpaCCS 2016 Workshops Proceedings
https://link.springer.com/book/10.1007/978-3-319-49145-5
Contact
Please email inquiries concerning UbiSec 2022 to Prof. Guojun Wang: csgjwang AT gmail DOT com and Conference Organizers: UbiSec2022 AT googlegroups.com.
Prof. Guojun Wang, Executive General Chair of UbiSec 2022
http://trust.gzhu.edu.cn/faculty/~csgjwang/
--
***********************************************************************
Dr. Guojun Wang, Pearl River Scholarship Distinguished Professor
Director of Institute of Computer Networks,
School of Computer Science and Cyber Engineering,
Guangzhou University, Guangzhou, Guangdong Province,
P. R. China, 510006
Tel/Fax: +86-20-39366920, Mobile: +86-13360581866
Email: csgjwang AT gzhu.edu.cn
http://trust.gzhu.edu.cn/faculty/~csgjwang/
***********************************************************************
--
Dr. Qin Liu
College of Computer Science and Electronic Engineering
Hunan University
Changsha, Hunan Province,P.R. China, 410082
Mobile: +86-13548577157
Email: gracelq628(a)hnu.edu.cn; gracelq628(a)126.com
Homepage: https://qinliu-hnu.github.io/
**************************************************************************************************
TrustData 2022 CFP with 5+Keynotes&10+Invited Talks&20+SIs: Deadline Extended to Oct. 30
We apologize if you receive multiple copies of this TrustData 2022 CFP.
We appreciate your great help if you forward this TrustData 2022 CFP to your colleages and friends.
**************************************************************************************************
Call for Papers for the 13th International Workshop on Trust, Security and Privacy for Big Data (TrustData 2022)
Venue & Dates:
Zhangjiajie, China, December 28 - 31, 2022
Conference Website:
http://ubisecurity.org/TrustData/2022/
-------------------------------------------------------------------------------------------------
Introduction
The proliferation of new technologies such as Internet of Things and cloud computing calls for innovative ideas to retrieve, filter, and integrate data from a large number of diverse data sources. Big Data is an emerging paradigm applied to datasets whose volume/velocity/variability is beyond the ability of commonly used software tools to manage and process the data within a tolerable period of time. More importantly, Big Data has to be of high value, and should be protected in an efficient way. Since Big Data involves a huge amount of data that is of high-dimensionality and inter-linkage, existing trust, security, and privacy measures for traditional databases and infrastructures cannot satisfy its requirements. Novel technologies for protecting Big Data are attracting researchers and practitioners with more and more attention.
Scope and Interests
TrustData 2022 is a part of UbiSec 2022 (http://ubisecurity.org/2022/), the Second International Conference on Ubiquitous Security. Topics of interest include, but are not limited to:
Trust Track
(1) Trust semantics, metrics, and models for Big Data
(2) Trust management and evaluation for Big Data
(3) Trusted systems, software, and applications for Big Data
(4) Trusted platform implementation technologies for Big Data
(5) Information quality/trustworthiness for Big Data
(6) Provenance of content for Big Data
(7) Trustworthiness of ratings/recommender systems for Big Data
Security Track
(1) Security model and architecture for Big Data
(2) Data mining security for Big Data
(3) Software and system security for Big Data
(4) Intrusion detection for Gigabit Networks
(5) Cryptography and Big Data
(6) Visualizing large scale security data
(7) Threat detection using Big Data analytics
(8) Human computer interaction challenges for Big Data security
(9) Data protection, integrity standards and policies
(10) Security and legislative impacts for Big Data
(11) Managing user access for Big Data
(12) Secure quantum communications
Privacy Track
(1) Privacy in Big Data applications and services
(2) Privacy in Big Data end-point input validation and filtering
(3) Privacy in Big Data integration and transformation
(4) Privacy in parallel and distributed computation
(5) Privacy in Big Data storage management
(6) Privacy in Big Data access control mechanisms
(7) Privacy in Big Data mining and analytics
(8) Privacy in Big Data sharing and visualization
(9) Big Data privacy policies and standards
Submission and Publication Information
The accepted papers from this workshop will be published in the conference proceedings with Springer Communications in Computer and Information Science (CCIS) . Submitted papers must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or a conference with proceedings.
All papers need to be submitted electronically through the conference submission website (https://easychair.org/conferences/?conf=trustdata2022) with PDF format. The materials presented in the papers should not be published or under submission elsewhere. All presented papers in the conference will be published in the conference proceedings with Springer Communications in Computer and Information Science (CCIS). Papers must be clearly presented in English, must not exceed 14 pages in Springer CCIS format (or up to 20 pages with the pages over length charge), including tables, figures, references and appendices (https://www.springer.com/cn/computer-science/lncs/conference-proceedings-gu…). Notice that accepted papers less than 12 pages will be tagged as Short Papers. Distinguished papers, after further revisions, will be considered for possible publication in SCI & EI indexed special issues of prestigious international journals. By submitting a paper to the conference, authors assure that if the paper is accepted, at least one author will attend the conference and present the paper.
All presented papers in the conference will be published in the proceedings of the conference. Authors (at least one) of any accepted paper are requested to register at the conference.
Important Dates
Paper Submission Deadline: October 30, 2022 (Second Batch)
Author Notification: November 30, 2022 (Second Batch)
Author Registration Due: December 20, 2022 (Second Batch)
Camera-Ready Paper Due: December 20, 2022 (Second Batch)
Conference Dates: December 28 - 31, 2022
General Chairs
Qin Liu, Hunan University, China
Arun Kumar Sangaiah, VIT University, India
Wei Chang, Saint Joseph's University, USA
Program Chairs
Jiankun Hu, University of New South Wales at the Australian, Australia
Isaac Agudo, University of Malaga, Spain
Program Committee (In alphabetical order)
Habtamu Abie, Norwegian Computing Center/Norsk Regnesentral, Norway
Salima Benbernou, Universite Paris Descartes, France
Christian Callegari, The University of Pisa, Italy
Wei Chang, Saint Joseph's University, USA
Anupam Chattopadhyay, Nanyang Technological University, Singapore
John A. Clark University of York, UK
Alfredo Cuzzocrea, University of Trieste and ICAR-CNR, Italy
Sabrina De Capitani di Vimercati, Universita degli Studi di Milano, Italy
Yucong Duan, Hainan University, China
Sheikh M. Habib, Technical University of Darmstadt, Germany
Ching-Hsien Hsu, Chung Hua University, Taiwan
Hai Jiang, Arkansas State University, USA
Vana Kalogeraki, Athens University of Economics, Greece
Ryan Ko, University of Waikato, New Zealand
Ruggero Donida Labati, Universita degli Studi di Milano, Italy
Xin Liao, Hunan University, China
Giovanni Livraga, Universita degli Studi di Milano, Italy
Haibing Lu, Santa Clara University, USA
Joon S. Park, Syracuse University, USA
Roberto Di Pietro, Nokia Bell Labs, France
Vincenzo Piuri, Universita' degli Studi di Milano, Italy
Imed Romdhani, Edinburgh Napier University, UK
Bimal Roy, Indian Statistical Institute, India
Jun Shen, University of Wollongong, Australia
Dimitris E. Simos, SBA Research, Austria
Chao Song, University of Electronic Science and Technology of China, China
Chang-ai Sun, University of Science and Technology Beijing, China
Yuanyuan Sun, Huazhong University of Science and Technology, China
Luis Javier Garcia Villalba, Universidad Complutense de Madrid, Spain
Yunsheng Wang, Kettering University, USA
Mingzhong Wang, University of the Sunshine Coast, Australia
Yongdong Wu, Institute for Infocomm Research, Singapore
Hejun Wu, Sun Yat-Sen University, China
Muneer Masadeh Bani Yassein, Jordan University of Science and Technology, Jordan
Sherali Zeadally, University of Kentucky, USA
Peiyin Xiong, Hunan University of Science and Technology, China
Dengfeng Xiao, Hunan University of Science and Technology, China
Publicity Chairs
Weiwei Chen, Hunan University, China
Bo Ou, Hunan University, China
Webmaster
Ziyi Tang, Hunan University, China
Contact
Please email inquiries concerning TrustData 2022 to:
Prof. Qin Liu: gracelq AT 126 DOT com
Prof. Qin Liu's Homepage: https://qinliu-hnu.github.io/
======================================================================
Keynote Speeches Section
You are welcome to attend 5+ Keynote Speeches offerred by world-renowned professors and industry leaders. The detailed information will appear soon.
(1) Keynote 1: Prof. Richard Hill, University of Huddersfield, UK
Title: Next Generation Security for Cyber Physical Systems
https://pure.hud.ac.uk/en/persons/richard-hill
(2) Keynote 2: Prof. Tien N. Nguyen, University of Queensland, Australia
Title: Intelligent Software Vulnerability Detection
https://personal.utdallas.edu/~tien.n.nguyen/
(3) Keynote 3: Prof. Omer Rana, Cardiff University, UK
Title: Security-Aware Task Execution across the Edge-Cloud Continuum
https://www.cardiff.ac.uk/people/view/118157-rana-omer
(4) Keynote 4: Prof. Kouichi SAKURAI, Kyushu University, Japan
Title: State and Issues of Non-Fungible Token from Technical Point of View
https://hyoka.ofc.kyushu-u.ac.jp/search/details/K000220/english.html
(5) Keynote 5: Prof. Deqing Zou, Huazhong University of Science and Technology, China
Title: Achieving Scalability and Interpretability Simultaneously in Detecting Multi-granularity Vulnerabilities
http://faculty.hust.edu.cn/zoudeqing/zh_CN/index.htm
======================================================================
Invited Talks Section
You are welcome to attend 10+ Invited Talks offerred by world-renowned professors and industry leaders. The detailed information will appear soon.
(1) Prof. Arcangelo Castiglione, University of Salerno, Italy
Title: New Insights on Cryptographic Hierarchical Access Control: Models, Schemes, and Analysis
https://docenti.unisa.it/026260/en/home
(2) Prof. Scott Fowler, Linkoping University, Sweden
Title: Optimize Industrial IoT HVAC by using Machine Learning
https://liu.se/en/employee/scofo47, https://sites.google.com/site/scofo47
(3) Prof. Wenjun Jiang, Hunan University, China
Title: Online user analysis and learning optimization
http://csee.hnu.edu.cn/people/jiangwenjun
(4) Prof. Ryan Ko, University of Queensland, Australia
Title: Operational Technology (OT) and Supply Chain Cyber Security: The Storm Approaching Us
https://itee.uq.edu.au/profile/1409/ryan-ko
(5) Prof. Qin Liu, Hunan University, China
Title: Secure Search in Cloud Computing and Emerging Applications
https://qinliu-hnu.github.io/
(6) Prof. Sabu M. Thampi, Kerala University of Digital Sciences, Innovation and Technology (KUDSIT), India
Title: Security and Privacy Issues in the Internet of Drones
http://www.sabumthampi.in
(7) Prof. Tian Wang, Beijing Normal University, China
Title: Distributed Mobile Computation Offloading and Edge Intelligence
https://cist.bnu.edu.cn/xygk/szdw/zgj/104104.html
(8) Prof. Carlos Becker Westphall, Federal University of Santa Catarina, Brazil
Title: Mutual Authentication with Multi-factor and Hybrid Approach to Intrusion Detection in IoT-Fog-Cloud Environment
https://lrg.ufsc.br/westphal/
(9) Prof. Yulei Wu, University of Exeter, UK
Title: Trustworthiness of anomaly detection for IIoT
http://empslocal.ex.ac.uk/people/staff/yw433/
(10) Prof. Yang Xu, Hunan University, China
Title: Blockchain-enabled Cloud Security: Frameworks and Solutions
http://csee.hnu.edu.cn/people/xuyang
======================================================================
Panel Discussions Section
You are welcome to attend 2+ Panel Discussions offerred by world-renowned professors and industry leaders. The detailed information will appear soon.
======================================================================
Special Issues Section
Distinguished papers, after further revisions, will be published in 15+ SCI & EI indexed special issues.
Here is the list of Special Issues that we will recommend high-quality papers for possible publication*:
(1) IEICE Transactions on Information and Systems (SCI & EI Indexed, Impact Factor: 0.559)
Special Section on Blockchain and Security (Pending).
(2) Information Sciences (SCI & EI Indexed, Impact Factor: 6.795)
Special Issue on Decentralized Trust Management with Intelligence (Pending).
(3) Sensors (SCI & EI Indexed, Impact Factor: 3.576)
Special Issue on Fog/Edge Computing based Smart Sensing System
http://www.mdpi.com/journal/sensors/special_issues/FCSCS
Deadline for manuscript submissions: 31 March 2023.
(4) Sensors (SCI & EI Indexed, Impact Factor: 3.576)
Special Issue on Cyber Situational Awareness in Computer Networks
https://www.mdpi.com/journal/sensors/topical_collections/Cyber_Situational_…
Deadline for manuscript submissions: 31 March 2023.
(5) Sensors (SCI & EI Indexed, Impact Factor: 3.576)
Special Issue on Security, Trust and Privacy in New Computing Environments
https://www.mdpi.com/journal/sensors/topical_collections/STPNCE
Deadline for manuscript submissions: 31 March 2023.
(6) Connection Science (SCI & EI Indexed, Impact Factor: 1.972)
https://www.tandfonline.com/ccos20
Some selected conference papers will be recommended for possible publication in regular issues of this journal, with a sufficient amount of new materials added into the journal version.
Deadline for manuscript submissions: 31 March 2023.
(7) Sensors (SCI & EI Indexed, Impact Factor: 3.576)
Special Issue on Cryptography and Security Protocol in Internet of Things
https://www.mdpi.com/journal/sensors/special_issues/CSPIOT
Deadline for manuscript submissions: 31 December 2022.
(8) Applied Sciences (SCI & EI Indexed, Impact Factor: 2.679)
Special Issue on Computational Methods for Next Generation Wireless and IoT Applications
https://www.mdpi.com/journal/applsci/special_issues/Generation_Wireless_IoT
Deadline for manuscript submissions: 31 December 2022.
(9) Sensors (SCI & EI Indexed, Impact Factor: 3.576)
Special Issue on Advanced Signal Processing and Human-Machine Interface for Healthcare Diagnostics and Bioengineering Applications
https://www.mdpi.com/journal/sensors/special_issues/advanced_signal_process…
Deadline for manuscript submissions: 20 December 2022.
(10) Electronics (SCI & EI Indexed, Impact Factor: 2.397)
Special Issue on Cybersecurity and Privacy Issues in Cyber-Physical Systems and Industrial Control Systems
https://www.mdpi.com/journal/electronics/special_issues/cyber_industrial_co…
Deadline for manuscript submissions: 25 November 2022.
(11) Sensors (SCI & EI Indexed, Impact Factor: 3.576)
Special Issue on Security and Privacy for Edge, Fog, and Cloud Computing; the Internet of Things and Mobile Crowdsensing
https://www.mdpi.com/journal/sensors/special_issues/SP_EFC
Deadline for manuscript submissions: 10 October 2022 (with possible extension later).
(12) International Journal of Computational Science and Engineering (IJCSE) (EI Indexed)
http://www.inderscience.com/browse/index.php?journalCODE=ijcse
Some selected conference papers will be recommended for possible publication in regular issues of this journal, with a sufficient amount of new materials added into the journal version.
Deadline for manuscript submissions: 31 March 2023.
(13) Distributed Ledger Technologies: Research and Practice (DLT) (EI Indexed)
Special Issue on Recent Advances of Blockchain Evolution: Architecture and Performance
https://dl.acm.org/pb-assets/static_journal_pages/dlt/pdf/DLT-SI-Recent-Adv…
Deadline for manuscript submissions: 15 December 2022.
(14) Acta Informatica Pragensia
Special Issue on Deep Learning Blockchain-enabled Technology for Improved Healthcare Industrial Systems
https://aip.vse.cz/corproof.php?tartkey=aip-000000-0305&fbclid=IwAR1veJzaae…
Deadline for manuscript submissions: 20 December 2022.
* More special issues will be available soon.
======================================================================
--
Dr. Qin Liu
College of Computer Science and Electronic Engineering
Hunan University
Changsha, Hunan Province,P.R. China, 410082
Mobile: +86-13548577157
Email: gracelq628(a)hnu.edu.cn; gracelq628(a)126.com
Homepage: https://qinliu-hnu.github.io/
Please accept our apologies if you receive multiple copies of this Final UbiSec 2022 Second Batch Call for Papers (CFPs) with Deadline October 30, 2022 (Final, No further extension will be granted).
============================== UbiSec 2022 ==============================
Conferences Pivoting to a Part-Virtual Platform
[UbiSec 2022] - Now Taking Place Part-Virtually
Due to the current COVID-19 situation, the UbiSec 2022 conference will be a combination of online and offline event. For authors who consider to present their papers online, please pay a half of author registration fees for each paper and show this "Half Registration Fees" information in the "Remarks" field in the registration form; For attendees who will join the conference online, please pay a half of attendee registration fees and show this "Half Registration Fees" information in the "Remarks" field in the registration form. For questions, contact [UbiSec2022 AT googlegroups DOT com].
Final Call for Papers (CFPs) of The Second International Conference on Ubiquitous Security (UbiSec 2022)
Zhangjiajie, China, December 28 - 31, 2022
Organizers:
Guangzhou University, China
Jishou University, China
http://ubisecurity.org/2022/
======================================================================
Keynote Speeches Section
You are welcome to attend 5+ Keynote Speeches offerred by world-renowned professors and industry leaders. The detailed information will appear soon.
(1) Keynote 1: Prof. Richard Hill, University of Huddersfield, UK
Title: Next Generation Security for Cyber Physical Systems
https://pure.hud.ac.uk/en/persons/richard-hill
(2) Keynote 2: Prof. Tien N. Nguyen, University of Queensland, Australia
Title: Intelligent Software Vulnerability Detection
https://personal.utdallas.edu/~tien.n.nguyen/
(3) Keynote 3: Prof. Omer Rana, Cardiff University, UK
Title: Security-Aware Task Execution across the Edge-Cloud Continuum
https://www.cardiff.ac.uk/people/view/118157-rana-omer
(4) Keynote 4: Prof. Kouichi SAKURAI, Kyushu University, Japan
Title: State and Issues of Non-Fungible Token from Technical Point of View
https://hyoka.ofc.kyushu-u.ac.jp/search/details/K000220/english.html
(5) Keynote 5: Prof. Deqing Zou, Huazhong University of Science and Technology, China
Title: Achieving Scalability and Interpretability Simultaneously in Detecting Multi-granularity Vulnerabilities
http://faculty.hust.edu.cn/zoudeqing/zh_CN/index.htm
======================================================================
Invited Talks Section
You are welcome to attend 10+ Invited Talks offerred by world-renowned professors and industry leaders. The detailed information will appear soon.
(1) Prof. Arcangelo Castiglione, University of Salerno, Italy
Title: New Insights on Cryptographic Hierarchical Access Control: Models, Schemes, and Analysis
https://docenti.unisa.it/026260/en/home
(2) Prof. Scott Fowler, Linkoping University, Sweden
Title: Optimize Industrial IoT HVAC by using Machine Learning
https://liu.se/en/employee/scofo47, https://sites.google.com/site/scofo47
(3) Prof. Wenjun Jiang, Hunan University, China
Title: Online user analysis and learning optimization
http://csee.hnu.edu.cn/people/jiangwenjun
(4) Prof. Ryan Ko, University of Queensland, Australia
Title: Operational Technology (OT) and Supply Chain Cyber Security: The Storm Approaching Us
https://itee.uq.edu.au/profile/1409/ryan-ko
(5) Prof. Qin Liu, Hunan University, China
Title: Secure Search in Cloud Computing and Emerging Applications
https://qinliu-hnu.github.io/
(6) Prof. Sabu M. Thampi, Kerala University of Digital Sciences, Innovation and Technology (KUDSIT), India
Title: Security and Privacy Issues in the Internet of Drones
http://www.sabumthampi.in
(7) Prof. Tian Wang, Beijing Normal University, China
Title: Distributed Mobile Computation Offloading and Edge Intelligence
https://cist.bnu.edu.cn/xygk/szdw/zgj/104104.html
(8) Prof. Carlos Becker Westphall, Federal University of Santa Catarina, Brazil
Title: Mutual Authentication with Multi-factor and Hybrid Approach to Intrusion Detection in IoT-Fog-Cloud Environment
https://lrg.ufsc.br/westphal/
(9) Prof. Yulei Wu, University of Exeter, UK
Title: Trustworthiness of anomaly detection for IIoT
http://empslocal.ex.ac.uk/people/staff/yw433/
(10) Prof. Yang Xu, Hunan University, China
Title: Blockchain-enabled Cloud Security: Frameworks and Solutions
http://csee.hnu.edu.cn/people/xuyang
======================================================================
Panel Discussions Section
You are welcome to attend 2+ Panel Discussions offerred by world-renowned professors and industry leaders. The detailed information will appear soon.
======================================================================
Special Issues Section
Distinguished papers, after further revisions, will be published in 20+ SCI & EI indexed special issues.
Here is the list of Special Issues that we will recommend high-quality papers for possible publication *:
(1) IEICE Transactions on Information and Systems (SCI & EI Indexed, Impact Factor: 0.559)
Special Section on Blockchain and Security (Pending).
(2) IEEE Journal of Selected Topics in Applied Earth Observations and Remote Sensing (SCI & EI Indexed, Impact Factor: 4.715)
Special Issue on Security and Privacy-preserving Solutions on Remote Sensing Data of Smart Cities
https://4d8xuv2577wggnmowfwzehpo-wpengine.netdna-ssl.com/wp-content/uploads…
Deadline for manuscript submissions: 28 February 2023.
(3) Sensors (SCI & EI Indexed, Impact Factor: 3.847)
Special Issue on Security and Privacy for Edge, Fog, and Cloud Computing; the Internet of Things and Mobile Crowdsensing
https://www.mdpi.com/journal/sensors/special_issues/SP_EFC
Deadline for manuscript submissions: 10 October 2023.
(4) Sensors (SCI & EI Indexed, Impact Factor: 3.847)
Special Issue on Fog/Edge Computing based Smart Sensing System
http://www.mdpi.com/journal/sensors/special_issues/FCSCS
Deadline for manuscript submissions: 31 March 2023.
(5) Sensors (SCI & EI Indexed, Impact Factor: 3.847)
Special Issue on Cyber Situational Awareness in Computer Networks
https://www.mdpi.com/journal/sensors/topical_collections/Cyber_Situational_…
Deadline for manuscript submissions: 31 March 2023.
(6) Sensors (SCI & EI Indexed, Impact Factor: 3.847)
Special Issue on Security, Trust and Privacy in New Computing Environments
https://www.mdpi.com/journal/sensors/topical_collections/STPNCE
Deadline for manuscript submissions: 31 March 2023.
(7) Connection Science (SCI & EI Indexed, Impact Factor: 1.972)
https://www.tandfonline.com/ccos20
Some selected conference papers will be recommended for possible publication in regular issues of this journal, with a sufficient amount of new materials added into the journal version.
Deadline for manuscript submissions: 31 March 2023.
(8) Computers, Materials & Continua (SCI & EI Indexed, Impact Factor: 3.86)
https://techscience.com/cmc/special_detail/human-centric_edge
Special Issue on AI Powered Human-centric Computing with Cloud and Edge
Deadline for manuscript submissions: 1 March 2023.
(9) Sensors (SCI & EI Indexed, Impact Factor: 3.847)
Special Issue on Cryptography and Security Protocol in Internet of Things
https://www.mdpi.com/journal/sensors/special_issues/CSPIOT
Deadline for manuscript submissions: 31 December 2022.
(10) Applied Sciences (SCI & EI Indexed, Impact Factor: 2.838)
Special Issue on Computational Methods for Next Generation Wireless and IoT Applications
https://www.mdpi.com/journal/applsci/special_issues/Generation_Wireless_IoT
Deadline for manuscript submissions: 31 December 2022.
(11) Sensors (SCI & EI Indexed, Impact Factor: 3.847)
Special Issue on Advanced Signal Processing and Human-Machine Interface for Healthcare Diagnostics and Bioengineering Applications
https://www.mdpi.com/journal/sensors/special_issues/advanced_signal_process…
Deadline for manuscript submissions: 20 December 2022.
(12) Information Sciences (SCI & EI Indexed, Impact Factor: 8.233)
Special Issue on Decentralized Trust Management with Intelligence
https://www.sciencedirect.com/journal/information-sciences/about/call-for-p…
Deadline for manuscript submissions: 1 December 2022.
(13) ISA Transactions (SCI & EI Indexed, Impact Factor: 5.468)
Special Issue on Security and Privacy of AI-based Automation Systems
http://ubisecurity.org/2022/share/CFP%20-%20ISA%20Transactions%20SI%20-%20S…
Deadline for manuscript submissions: 30 November 2022.
(14) Electronics (SCI & EI Indexed, Impact Factor: 2.690)
Special Issue on Cybersecurity and Privacy Issues in Cyber-Physical Systems and Industrial Control Systems
https://www.mdpi.com/journal/electronics/special_issues/cyber_industrial_co…
Deadline for manuscript submissions: 25 November 2022.
(15) IET Cyber-Physical Systems: Theory & Applications (EI Indexed)
Special Issue on IoT-based Secure Health Monitoring and Tracking through Estimated Computing
https://ietresearch.onlinelibrary.wiley.com/pb-assets/assets/23983396/Speci…
Deadline for manuscript submissions: 30 April 2023.
(16) International Journal of Computational Science and Engineering (IJCSE) (EI Indexed)
http://www.inderscience.com/browse/index.php?journalCODE=ijcse
Some selected conference papers will be recommended for possible publication in regular issues of this journal, with a sufficient amount of new materials added into the journal version.
Deadline for manuscript submissions: 31 March 2023.
(17) Cryptography (EI Indexed)
Special Issue on Privacy-Preserving Techniques in Cloud/Fog and Internet of Things
https://www.mdpi.com/journal/cryptography/special_issues/Privacy_Preserving…
Deadline for manuscript submissions: 10 January 2023.
(18) ACM Distributed Ledger Technologies: Research and Practice (ACM DLT) (EI Indexed)
Special Issue on Recent Advances of Blockchain Evolution: Architecture and Performance
https://dl.acm.org/pb-assets/static_journal_pages/dlt/pdf/DLT-SI-Recent-Adv…
Deadline for manuscript submissions: 15 December 2022.
(19) Organizational Cybersecurity Journal: Practice, Process and People
Special Issue on Organizational Cybersecurity Journal: Practice, Process and People
https://www.emeraldgrouppublishing.com/calls-for-papers/cybersecurity-highe…
Deadline for manuscript submissions: 30 March 2023.
(20) Acta Informatica Pragensia
Special Issue on Deep Learning Blockchain-enabled Technology for Improved Healthcare Industrial Systems
https://aip.vse.cz/corproof.php?tartkey=aip-000000-0305&fbclid=IwAR1veJzaae…
Deadline for manuscript submissions: 20 December 2022.
* More special issues will be available soon.
======================================================================
Welcome to participate in UbiSec 2022, Zhangjiajie, China, December 28 - 31, 2022! Zhangjiajie is an emerging tourist destination famous for its unique natural scenery and abundant tourism resources. It is located in the northwest of Hunan province, about 400 kilometers away from Changsha, the capital of Hunan province, covering a total area of 9,516 square kilometers, of which 76% are mountainous area. Out of its total population of 1.52 million, almost 77% belong to ethnic minority groups, including Tujia, Bai and Miao nationalities. Zhangjiajie National Forest Park was established by the State Council in 1982 as the first National Forest Park of China. Wulingyuan in Zhangjiajie was listed into the World Natural Heritage Catalogue by the UNESCO in 1992 and appraised as a national AAAAA scenic area. Zhangjiajie was awarded the title of "World Geological Park" in 2004. The amazing landscape here had been a source of creation of the CGI artist in the Avatar movie, and since the movie was released and achieved a great success, many tourists keeping coming to Zhangjiajie admiring this natural beauty.
The Second International Conference on Ubiquitous Security (UbiSec 2022) stems from three conference/symposium/workshop series:
(1) The well-established SpaCCS conference series with Springer LNCS: UbiSec is inspired by the SpaCCS style of three tracks (Security, Privacy, and Anonymity, "Spa" for short), which covers "Big Security" leveraging computation, communication and storage ("CCS" for short) systems and networks. UbiSec extends this style with three new tracks: Cyberspace Security, Cyberspace Privacy, and Cyberspace Anonymity.
(2) The UbiSafe symposium series: UbiSec follows the UbiSafe vision on "Ubiquitous Safety", also meaning that "YOU (will) BE SAFE" (pronounced "UbiSafe"). UbiSec extends this vision to "Ubiquitous Security", using "Big Security" to embrace NOT ONLY security, privacy and anonymity, BUT ALSO safety, reliability, dependability, trustworthiness and more, also meaning that "YOU (will) BE SEC(ure)" (pronounced "UbiSec").
(3) The IWCSS workshop series: UbiSec follows the IWCSS theme on "Cyberspace Security", with "Cyberspace" as the 5th national sovereign space besides the traditional four domains of land, sea, air, and aerospace. UbiSec extends this theme to "Ubiquitous Security", meaning that cyberspace will be secure, physical world will be secure, social networking systems will be secure, and thus "YOU (will) BE SECure"!
The UbiSec 2022 Conference ("The Conference" for short) is the second event in the series of conferences/symposia/workshops which are devoted to security, privacy and anonymity in cyberspace, physical world, and social networks. The Conference covers many dimensions including security algorithms and architectures, privacy-aware policies, regulations and techniques, anonymous computation and communication, encompassing fundamental theoretical approaches, practical experimental projects, and commercial application systems for cyberspace, physical world, and social networking systems. As applications of computer and information technology have permeated in every aspect of our daily life, the issues of security, privacy, and anonymity have become increasingly critical. The Conference will provide a forum for world-class researchers to gather and share their research achievements, emerging ideas and trends in the highly challenging research fields.
UbiSec 2022 follows the UbiSec 2021 conference in Guangzhou and also the traditions of previous successful SpaCCS/UbiSafe/IWCSS conference/symposium/workshop series, held in Nanjing, China (SpaCCS 2020/UbiSafe 2020), Guangzhou, China (IWCSS 2020); Altanta, USA (SpaCCS 2019/UbiSafe 2019), Guangzhou, China (IWCSS 2019); Melbourne, Australia (SpaCCS 2018/UbiSafe 2018), Guangzhou China (IWCSS 2018); Guangzhou, China (SpaCCS 2017/UbiSafe 2017/IWCSS 2017); Zhangjiajie, China (SpaCCS 2016/UbiSafe 2016); Helsinki, Finland (UbiSafe 2015); Beijing, China (UbiSafe 2014); Melbourne, Australia (UbiSafe 2013); Liverpool, UK (UbiSafe 2012); Changsha, China (UbiSafe 2011); Chengdu China (UbiSafe 2009); and Niagara Falls, Canada (UbiSafe 2007). The conference aims at bringing together researchers and practitioners in the world working in the research fields of security, privacy, and anonymity aspects of computer systems and networks. The conference will focus on broad areas of architectures, algorithms, techniques, and applications for cyberspace security, cyberspace privacy, and cyberspace anonymity.
UbiSec 2022 topics include, but are not limited to the following:
Track 1: Cyberspace Security
--Security Model and Architecture
--Software and System Security
--Trustworthy Computing
--Security in Cloud/Fog/Edge Computing and Pervasive/Ubiquitous Computing
--Machine Learning and AI Security
--Network Security
--Attacks and Defenses
--Intrusion Detection and Prevention
--Security in Web Services
--Security in Mobile Social Networks
--Security in Internet of Things
--Fraud and Cyber Crime
--Accounting and Auditing
--Applied Cryptography
--Database Security
--Authentication
--Forensics and Diagnostics for Security
--Information Hiding
--Security in Big Data and its Applications
--Blockchain and Distributed System Security
--Security in Hardware, Side Channels, and CyberPhysical Systems
--Security in Formal Methods and Programming Languages
Track 2: Cyberspace Privacy
--Economics, Policies, Metrics, and Mechanisms of Privacy
--Privacy Modeling and Analysis
--Privacy-Preserving Computing
--Privacy-Preserving Data Mining
--Privacy-Enhancing Technologies and Anonymity
--Privacy for Internet of Things
--Privacy in Big Data and its Applications
--Privacy-Preserving in Blockchain
--Privacy-Preserving in Mobile Social Networks
--Privacy-Preserving Crowdsensing
--Privacy-Preserving Deep Learning
Track 3: Cyberspace Anonymity
--Anonymous Data Mining and Data Sharing
--Anonymous Management in Trust Relationships
--Anonymous Video Analytics Technology
--Anonymity Metrics, Measures and Evaluations
--Anonymity Models, Hardware/Device of Anonymity
--Anonymity in Wireless Communication Systems
--Anonymous Communication Protocols
--Anonymity in Mobile, Ad Hoc, and Wireless Sensor Networks
--Anonymous Communication and Internet
--Anonymous Social Networks, Structural k-Anonymity in Social Networks
--Authentication Protocol Providing User Anonymity
--Anonymous Information Storage and Management
--Private and Anonymous Data Storage
--Anonymity, Pseudonymity & Identity Management
--Anonymity in Big Data and Cloud Scenarios
--Anonymity in Health and Medical Databases
--Anonymity in Sensor-Cloud Systems
--Anonymity in Edge Computing
IMPORTANT DATES
Paper Submission Deadline: October 30, 2022 (Second Batch, No further extension will be granted)
Author Notification: November 30, 2022 (Second Batch)
Author Registration Due: December 20, 2022 (Second Batch)
Camera-Ready Paper Due: December 20, 2022 (Second Batch)
Conference Dates: December 28 - 31, 2022
SUBMISSION and PUBLICATION INFORMATION
All presented papers in the conference will be published in the conference proceedings with Springer Communications in Computer and Information Science (CCIS). Papers must be clearly presented in English, must not exceed 14 pages in Springer CCIS format (or up to 20 pages with the pages over length charge), including tables, figures, references and appendices. Notice that accepted papers less than 12 pages will be tagged as Short Papers. Papers should be submitted through the EasyChair paper submission system at the conference website. Distinguished papers, after further revisions, will be considered for possible publication in SCI & EI indexed special issues of prestigious international journals. The program committee will select and give three "Best Paper Awards" for the conference. By submitting a paper to the conference, authors assure that if the paper is accepted, at least one author will attend the conference and present the paper.
Excecutive General Chair
Guojun Wang, Guangzhou University, China
Local Organizing Chair
Jianfeng Li, Jishou University, China
General Chairs
Hanpin Wang, Guangzhou University, China
Richard Hill, University of Huddersfield, United Kingdom
Aniello Castiglione, University of Naples Parthenope, Italy
Program Chairs
Guojun Wang, Guangzhou University, China
Kim-Kwang Raymond Choo, University of Texas at San Antonio, USA
Jie Wu, Temple University, USA
Ernesto Damiani, Khalifa University, UAE/Universita' degli Studi di Milano, Italy
Program Vice Chairs
(1) Cyberspace Security Track
Qin Liu, Hunan University, China
Wenjia Li, New York Institute of Technology, USA
Jie Hu, University of Electronic Science and Technology of China, China
Saed Alrabaee, United Arab Emirates University, UAE
Charalambos (Harrys) Konstantinou, King Abdullah University of Science and Technology, Saudi Arabia
(2) Cyberspace Privacy Track
Yulei Wu, University of Exeter, United Kingdom
Wenjun Jiang, Hunan University, China
Saqib Ali, University of Agriculture Faisalabad, Pakistan
Md Tariqul Islam, Syracuse University, USA
Saad Khan, University of Huddersfield, United Kingdom
(3) Cyberspace Anonymity Track
Tian Wang, Beijing Normal University & UIC, China
A. S. M. Kayes, La Trobe University, Australia
Oana Geman, University of Suceava, Romania
Mamoun Alazab, Charles Darwin University, Australia
Hudan Studiawan, Institut Teknologi Sepuluh Nopember, Indonesia
Publicity Chairs
Carlos Becker Westphall, Federal University of Santa Catarina, Brazil
Scott Fowler, Linkoping University, Sweden
Peter Mueller, IBM Zurich Research Laboratory, Switzerland
Haroon Elahi, Umea University, Sweden
Yulei Wu, University of Exeter, United Kingdom
Xiangyong Liu, Guangzhou University, China
Workshop Chairs
Sabu M. Thampi, Kerala University of Digital Sciences, Innovation and Technology (KUDSIT), India
Arcangelo Castiglione, University of Salerno, Italy
Shuhong Chen, Guangzhou University, China
Publication Chairs
Tao Peng, Guangzhou University, China
Fang Qi, Central South University, China
Registration Chairs
Xiaofei Xing, Guangzhou University, China
Pin Liu, Central South University, China
Pengfei Yin, Jishou University, China
Conference Secretariat
Wenyin Yang, Foshan University, China
Web Chairs
Ziwei Xiao, Foshan University, China
Jianguo Jiang, Foshan University, China
Steering Committee
Guojun Wang, Guangzhou University, China (Chair)
Kim-Kwang Raymond Choo, University of Texas at San Antonio, USA (Chair)
Saqib Ali, University of Agriculture Faisalabad, Pakistan
Valentina E. Balas, Aurel Vlaicu University of Arad, Romania
Md Zakirul Alam Bhuiyan, Fordham University, USA
Jiannong Cao, The Hong Kong Polytechnic University, Hong Kong
Aniello Castiglione, University of Naples Parthenope, Italy
Scott Fowler, Linkoping University, Sweden
Oana Geman, University of Suceava, Romania
Richard Hill, University of Huddersfield, United Kingdom
Ryan Ko, University of Queensland, Australia
Kuan-Ching Li, Providence University, Taiwan
Jianhua Ma, Hosei University, Japan
Gregorio Martinez, University of Murcia, Spain
Peter Mueller, IBM Zurich Research Laboratory, Switzerland
Kouichi Sakurai, Kyushu University, Japan
Sabu M. Thampi, Indian Institute of Information Technology and Management - KeralaKerala University of Digital Sciences, Innovation and Technology (KUDSIT), India
Carlos Becker Westphall, Federal University of Santa Catarina, Brazil
Jie Wu, Temple University, USA
Yang Xu, Hunan University, China
Zheng Yan, Xidian University, China/Aalto University, Finland
Wenyin Yang, Foshan University, China
Haojin Zhu, Shanghai Jiao Tong University, China
Program Committee
Please check the "Program Committee" web page at the conference website for detail:
http://ubisecurity.org/2022/
Archived Conference Proceedings:
(1) UbiSec 2021 Conference Proceedings
https://link.springer.com/book/10.1007/978-981-19-0468-4
(2) SpaCCS 2020 Conference Proceedings
https://link.springer.com/book/10.1007/978-3-030-68851-6
SpaCCS 2020 Workshops Proceedings
https://link.springer.com/book/10.1007/978-3-030-68884-4
(3) SpaCCS 2019 Conference Proceedings
https://link.springer.com/book/10.1007/978-3-030-24907-6
SpaCCS 2019 Workshops Proceedings
https://link.springer.com/book/10.1007/978-3-030-24900-7
(4) SpaCCS 2018 Conference Proceedings
https://link.springer.com/book/10.1007/978-3-030-05345-1
(5) SpaCCS 2017 Conference Proceedings
https://link.springer.com/book/10.1007/978-3-319-72389-1
SpaCCS 2017 Workshops Proceedings
https://link.springer.com/book/10.1007/978-3-319-72395-2
(6) SpaCCS 2016 Conference Proceedings
https://link.springer.com/book/10.1007/978-3-319-49148-6
SpaCCS 2016 Workshops Proceedings
https://link.springer.com/book/10.1007/978-3-319-49145-5
Contact
Please email inquiries concerning UbiSec 2022 to Prof. Guojun Wang: csgjwang AT gmail DOT com and Conference Organizers: UbiSec2022 AT googlegroups.com.
Prof. Guojun Wang, Executive General Chair of UbiSec 2022
http://trust.gzhu.edu.cn/faculty/~csgjwang/
--
***********************************************************************
Dr. Guojun Wang, Pearl River Scholarship Distinguished Professor
Director of Institute of Computer Networks,
School of Computer Science and Cyber Engineering,
Guangzhou University, Guangzhou, Guangdong Province,
P. R. China, 510006
Tel/Fax: +86-20-39366920, Mobile: +86-13360581866
Email: csgjwang AT gzhu.edu.cn
http://trust.gzhu.edu.cn/faculty/~csgjwang/
***********************************************************************
--
Dr. Qin Liu
College of Computer Science and Electronic Engineering
Hunan University
Changsha, Hunan Province,P.R. China, 410082
Mobile: +86-13548577157
Email: gracelq628(a)hnu.edu.cn; gracelq628(a)126.com
Homepage: https://qinliu-hnu.github.io/
Dear all,
The next talk in the IARCS Verification Seminar Series will be given by
Shibashis Guha, a faculty member at the School of Technology and Computer
Science at Tata Institute of Fundamental Research, Mumbai. The talk is
scheduled on Tuesday, November 1, at 1900 hrs IST (add to Google calendar
<https://calendar.google.com/calendar/event?action=TEMPLATE&tmeid=MGsxMHR2dT…>
).
The details of the talk can be found on our webpage (
https://fmindia.cmi.ac.in/vss/), and also appended to the body of this
email.
The Verification Seminar Series, an initiative by the Indian Association
for Research in Computing Science (IARCS), is a monthly, online
talk-series, broadly in the area of Formal Methods and Programming
Languages, with applications in Verification and Synthesis. The aim of this
talk-series is to provide a platform for Formal Methods researchers to
interact regularly. In addition, we hope that it will make it easier for
researchers to explore newer problems/areas and collaborate on them, and
for younger researchers to start working in these areas.
All are welcome to join.
Best regards,
Akash, Deepak, Madhukar, Srivathsan
=============================================================
Title: A Game of Pawns
Meeting Link:
https://us02web.zoom.us/j/89164094870?pwd=eUFNRWp0bHYxRVpwVVNoVUdHU0djQT09
(Meeting ID: 891 6409 4870, Passcode: 082194)
Abstract: We introduce and study pawn games; a class of two-player
turn-based zero-sum games in which the control of vertices changes
dynamically throughout the game. Pawn games naturally model ongoing
decision-making setting in which resources are transferable. Each vertex of
a pawn game is owned by a pawn. In each round of the game, the pawns are
partitioned between the two players. The player who moves the token from a
vertex is the player who controls the pawn that owns the vertex. A pawn
game is equipped with a mechanism, which the players apply after each round
in order to update the set of pawns that they control. We define several
grabbing-based mechanisms in which control of at most one pawn transfers at
the end of each round. We study the complexity of solving reachability pawn
games, where we parameterize the problem by the mechanism that is being
used and by restrictions on pawn ownership of vertices. For the positive
news, even though pawn games are exponentially-succinct turn-based games,
we identify some natural classes that can be solved in PTIME. For the
negative news, we identify some classes for which the problem is
EXPTIME-complete. Our EXPTIME-hardness results are based on a class of
games which we introduce and call Lock-and-Key games, and which may be of
independent interest.
This is a joint work with Guy Avni and Pranav Ghorpade.
Bio: Shibashis Guha is a faculty member at the School of Technology and
Computer Science at Tata Institute of Fundamental Research, Mumbai. Before
this, he was a postdoc at the Verification Group in Université libre de
Bruxelles and at The Hebrew University in the group of Prof. Orna
Kupferman. He did his PhD from the Department of Computer Science and
Engineering at IIT Delhi, under the supervision of Prof. S. Arun-Kumar. His
research interests include reactive synthesis, probabilistic systems, timed
automata, behavioural equivalences, formal methods and its intersection
with algorithmic game theory.
***********************************************************************
First Call for Papers
ABZ 2023: International Conference on Rigorous State Based Methods
LORIA, Université de Lorraine, Nancy, France.
May 30-June 2, 2023
https://abz2023.loria.fr
***********************************************************************
----------------
Important dates
----------------
Workshops/Tutorials
Workshop proposal submission: November 01, 2022
Workshop notification: November 15, 2022
Tutorial proposal submission: February 16, 2023
Case Study Track
Abstract submission: December 05, 2022
Paper submission: December 18, 2022
Notification: January 28, 2023 Final version: March 06, 2023
Main Track
Abstract submission: January 16, 2023
Paper submission: January 23, 2023
(including research/short/industry papers)
Notification: March 6, 2023 Final version: March 27, 2023
Doctoral Symposium
Paper submission: January 23, 2023
Notification: March 6, 2023 Final version: March 27, 2023
Conference
Workshops and Tutorials : May 30, 2023
ABZ 2023 conference: May 31-June 02, 2023
----------
About ABZ
----------
The ABZ conference is dedicated to the cross-fertilization of
state-based and machine-based formal methods, like Abstract State
Machines (ASM), Alloy, B, TLA, VDM and Z, that share a common conceptual
foundation and are widely used in both academia and industry for the
design and analysis of hardware and software systems. The conference
aims for a vital exchange of knowledge and experience among the research
communities around different formal methods.
The name ABZ goes back to the first conference in London in 2008,
where the ASM, B and Z conference series were merged into a joint
event. In the following years other formal methods were added,
e.g. Alloy in 2010 (Orford, Canada), VDM in 2012 (Pisa, Italy), and
TLA + in 2014 (Toulouse, France). After the also successful 2016
conferences in Linz, Austria and 2018 in Southampton, UK, it was
decided to name the conference "ABZ: International Conference on
Rigorous State Based Methods", to stress the openness for further
state-based formal methods. We hope to continue many fruitful
discussions between representatives of the individual methods in the
past, which will bring us closer to the common goal of this research
community: the creation of reliable and safe software. ABZ2020 and
ABZ2021 were the two first new entitled conferences planned in Ulm but
virtually organised.
ABZ 2023 will have a main conference track, a case study track,
tutorials and workshops.
---------------
Main ABZ Track
---------------
Contributions are solicited on all aspects of the theory and
applications of ASMs, Alloy, B, TLA, VDM, Z and other state-based rigour
approaches in software/hardware engineering, including the development
of tools and industrial applications. The program spans from theoretical
and methodological foundations to practical applications, emphasizing
system engineering methods and tools that are distinguished by
mathematical rigor and have proved to be industrially viable. The main
goal of the conference is to contribute to the integration of accurate
state- and machine-based system development methods, clarifying their
commonalities and differences to better understand how to combine
different approaches for accomplishing the various tasks in modeling,
experimental validation, mathematical verification of reliable
high-quality hardware/software systems. Although organized to host
several formal methods in a single event, editorial control of the joint
conference is vested in one integrated program committee.
-----------------
Case Study Track
-----------------
As successfully practiced since ABZ 2014, the 10th edition of ABZ will
again include special sessions dedicated to an industrial case study. We
explicitly invite you to also submit contributions to case studies from
previous conferences, which substantially extend the solutions presented
there in one aspect or another. Possible enhancements could be new proof
techniques, more elegant modeling, generation, verification, or
validation of executable code, etc.
See https://abz2023.loria.fr/case-study for a detailed description of
the new case study and links to the previous ones.
--------------------------------
Workshop and Tutorial Proposals
--------------------------------
Workshops and tutorials will be associated with the main event ABZ.
Proposals are solicited in areas related to the conference topics.
A workshop proposal should contain the title of the workshop, a short
description of the scientific content, the names and brief CVs of the
workshop organizers, the intended PC for the workshop, the duration of
the workshop, and the expected number of participants.
A tutorial proposal should contain the title of the tutorial, a short
description of the scientific content, the names and brief CVs of the
tutorial presenters and the duration.
Please submit your proposals to dominique dot mery at loria.fr.
------------
Submissions
------------
Four kinds of contributions are invited:
* Full Research papers: full papers of not more than 16 pages in LNCS
format, which have to be original, unpublished and not submitted elsewhere.
* Short presentations of work in progress, and tool demonstrations.An
extended abstract of not more than 6 pages is expected and will be reviewed.
* Application in industry papers: reporting on work or experiences on
the application of state based formal methods in industry. An extended
abstract of not more than 8 pages is expected and will be reviewed. It
is also an interesting option for industrial practitioners who sometimes
face too many constraints to prepare a full paper.
* Answers to case study papers: full papers of not more than 16
pages in LNCS format reporting on the experiments conducted with
any of the state based techniques in the scope of ABZ 2023. We
also expect a link to a webpage, where the produced models can be
downloaded.
* Contribution to doctoral symposium:This is an excellent opportunity
for PhD students to present their ongoing work and receive valuable
feedback from the ABZ community. Please submit a short paper of no more
than 4 pages
Accepted papers will appear in the Springer LNCS proceedings. The
deadlines for the different kinds of contributions see above.
-------------------
Organization
-------------------
Conference Chairs:
Uwe Glässer (CoChair), Simon Fraser University, Canada
Dominique Méry (CoChair), Université de Lorraine & LORIA, France
Case Study Chair:
José Creissac Campos, Departamento de Informática - Universidade do
Minho, Portugal. Philippe Palanque, Interactive Critical Systems - IRIT-
Univ. Toulouse, France
For further questions concerning ABZ 2023, please contact us at
dominique dot mery at loria.fr
**************************************************************************************************
We apologize if you receive multiple copies of this TrustData 2022 CFP.
We appreciate your great help if you forward this TrustData 2022 CFP to your colleages and friends.
**************************************************************************************************
Call for Papers for the 13th International Workshop on Trust, Security and Privacy for Big Data (TrustData 2022)
Venue & Dates:
Zhangjiajie, China, December 28 - 31, 2022
Conference Website:
http://ubisecurity.org/TrustData/2022/
-------------------------------------------------------------------------------------------------
Introduction
The proliferation of new technologies such as Internet of Things and cloud computing calls for innovative ideas to retrieve, filter,
and integrate data from a large number of diverse data sources. Big Data is an emerging paradigm applied to datasets whose
volume/velocity/variability is beyond the ability of commonly used software tools to manage and process the data within a tolerable
period of time. More importantly, Big Data has to be of high value, and should be protected in an efficient way. Since Big Data
involves a huge amount of data that is of high-dimensionality and inter-linkage, existing trust, security, and privacy measures for
traditional databases and infrastructures cannot satisfy its requirements. Novel technologies for protecting Big Data are attracting
researchers and practitioners with more and more attention.
Scope and Interests
TrustData 2022 is a part of UbiSec 2022 (http://ubisecurity.org/2022/), the Second International Conference on Ubiquitous Security.
Topics of interest include, but are not limited to:
Trust Track
(1) Trust semantics, metrics, and models for Big Data
(2) Trust management and evaluation for Big Data
(3) Trusted systems, software, and applications for Big Data
(4) Trusted platform implementation technologies for Big Data
(5) Information quality/trustworthiness for Big Data
(6) Provenance of content for Big Data
(7) Trustworthiness of ratings/recommender systems for Big Data
Security Track
(1) Security model and architecture for Big Data
(2) Data mining security for Big Data
(3) Software and system security for Big Data
(4) Intrusion detection for Gigabit Networks
(5) Cryptography and Big Data
(6) Visualizing large scale security data
(7) Threat detection using Big Data analytics
(8) Human computer interaction challenges for Big Data security
(9) Data protection, integrity standards and policies
(10) Security and legislative impacts for Big Data
(11) Managing user access for Big Data
(12) Secure quantum communications
Privacy Track
(1) Privacy in Big Data applications and services
(2) Privacy in Big Data end-point input validation and filtering
(3) Privacy in Big Data integration and transformation
(4) Privacy in parallel and distributed computation
(5) Privacy in Big Data storage management
(6) Privacy in Big Data access control mechanisms
(7) Privacy in Big Data mining and analytics
(8) Privacy in Big Data sharing and visualization
(9) Big Data privacy policies and standards
Submission and Publication Information
The accepted papers from this workshop will be published in the conference proceedings with Springer Communications in Computer and
Information Science (CCIS) . Submitted papers must not substantially overlap with papers that have been published or that are
simultaneously submitted to a journal or a conference with proceedings.
All papers need to be submitted electronically through the conference submission website (https://easychair.org/conferences/?
conf=trustdata2022) with PDF format. The materials presented in the papers should not be published or under submission elsewhere.
All presented papers in the conference will be published in the conference proceedings with Springer Communications in Computer and
Information Science (CCIS). Papers must be clearly presented in English, must not exceed 14 pages in Springer CCIS format (or up to
20 pages with the pages over length charge), including tables, figures, references and appendices
(https://www.springer.com/cn/computer-science/lncs/conference-proceedings-gu…). Notice that accepted papers less than 12
pages will be tagged as Short Papers. Distinguished papers, after further revisions, will be considered for possible publication in
SCI & EI indexed special issues of prestigious international journals. By submitting a paper to the conference, authors assure that
if the paper is accepted, at least one author will attend the conference and present the paper.
All presented papers in the conference will be published in the proceedings of the conference. Authors (at least one) of any
accepted paper are requested to register at the conference.
Important Dates
Paper Submission Deadline: October 30, 2022 (Second Batch)
Author Notification: November 30, 2022 (Second Batch)
Author Registration Due: December 20, 2022 (Second Batch)
Camera-Ready Paper Due: December 20, 2022 (Second Batch)
Conference Dates: December 28 - 31, 2022
General Chairs
Qin Liu, Hunan University, China
Arun Kumar Sangaiah, VIT University, India
Wei Chang, Saint Joseph's University, USA
Program Chairs
Jiankun Hu, University of New South Wales at the Australian, Australia
Isaac Agudo, University of Malaga, Spain
Program Committee (In alphabetical order)
Habtamu Abie, Norwegian Computing Center/Norsk Regnesentral, Norway
Salima Benbernou, Universite Paris Descartes, France
Christian Callegari, The University of Pisa, Italy
Wei Chang, Saint Joseph's University, USA
Anupam Chattopadhyay, Nanyang Technological University, Singapore
John A. Clark University of York, UK
Alfredo Cuzzocrea, University of Trieste and ICAR-CNR, Italy
Sabrina De Capitani di Vimercati, Universita degli Studi di Milano, Italy
Yucong Duan, Hainan University, China
Sheikh M. Habib, Technical University of Darmstadt, Germany
Ching-Hsien Hsu, Chung Hua University, Taiwan
Hai Jiang, Arkansas State University, USA
Vana Kalogeraki, Athens University of Economics, Greece
Ryan Ko, University of Waikato, New Zealand
Ruggero Donida Labati, Universita degli Studi di Milano, Italy
Xin Liao, Hunan University, China
Giovanni Livraga, Universita degli Studi di Milano, Italy
Haibing Lu, Santa Clara University, USA
Joon S. Park, Syracuse University, USA
Roberto Di Pietro, Nokia Bell Labs, France
Vincenzo Piuri, Universita' degli Studi di Milano, Italy
Imed Romdhani, Edinburgh Napier University, UK
Bimal Roy, Indian Statistical Institute, India
Jun Shen, University of Wollongong, Australia
Dimitris E. Simos, SBA Research, Austria
Chao Song, University of Electronic Science and Technology of China, China
Chang-ai Sun, University of Science and Technology Beijing, China
Yuanyuan Sun, Huazhong University of Science and Technology, China
Luis Javier Garcia Villalba, Universidad Complutense de Madrid, Spain
Yunsheng Wang, Kettering University, USA
Mingzhong Wang, University of the Sunshine Coast, Australia
Yongdong Wu, Institute for Infocomm Research, Singapore
Hejun Wu, Sun Yat-Sen University, China
Muneer Masadeh Bani Yassein, Jordan University of Science and Technology, Jordan
Sherali Zeadally, University of Kentucky, USA
Peiyin Xiong, Hunan University of Science and Technology, China
Dengfeng Xiao, Hunan University of Science and Technology, China
Publicity Chairs
Weiwei Chen, Hunan University, China
Bo Ou, Hunan University, China
Webmaster
Ziyi Tang, Hunan University, China
Contact
Please email inquiries concerning TrustData 2022 to:
Prof. Qin Liu: gracelq AT 126 DOT com
Prof. Qin Liu's Homepage: https://qinliu-hnu.github.io/
======================================================================
Keynote Speeches Section
You are welcome to attend 5+ Keynote Speeches offerred by world-renowned professors and industry leaders. The detailed information
will appear soon.
(1) Keynote 1: Prof. Richard Hill, University of Huddersfield, UK
Title: Next Generation Security for Cyber Physical Systems
https://pure.hud.ac.uk/en/persons/richard-hill
(2) Keynote 2: Prof. Tien N. Nguyen, University of Queensland, Australia
Title: Intelligent Software Vulnerability Detection
https://personal.utdallas.edu/~tien.n.nguyen/
(3) Keynote 3: Prof. Omer Rana, Cardiff University, UK
Title: Security-Aware Task Execution across the Edge-Cloud Continuum
https://www.cardiff.ac.uk/people/view/118157-rana-omer
(4) Keynote 4: Prof. Kouichi SAKURAI, Kyushu University, Japan
Title: State and Issues of Non-Fungible Token from Technical Point of View
https://hyoka.ofc.kyushu-u.ac.jp/search/details/K000220/english.html
(5) Keynote 5: Prof. Deqing Zou, Huazhong University of Science and Technology, China
Title: Achieving Scalability and Interpretability Simultaneously in Detecting Multi-granularity Vulnerabilities
http://faculty.hust.edu.cn/zoudeqing/zh_CN/index.htm
======================================================================
Invited Talks Section
You are welcome to attend 10+ Invited Talks offerred by world-renowned professors and industry leaders. The detailed information
will appear soon.
(1) Prof. Arcangelo Castiglione, University of Salerno, Italy
Title: New Insights on Cryptographic Hierarchical Access Control: Models, Schemes, and Analysis
https://docenti.unisa.it/026260/en/home
(2) Prof. Scott Fowler, Linkoping University, Sweden
Title: Optimize Industrial IoT HVAC by using Machine Learning
https://liu.se/en/employee/scofo47, https://sites.google.com/site/scofo47
(3) Prof. Wenjun Jiang, Hunan University, China
Title: Online user analysis and learning optimization
http://csee.hnu.edu.cn/people/jiangwenjun
(4) Prof. Ryan Ko, University of Queensland, Australia
Title: Operational Technology (OT) and Supply Chain Cyber Security: The Storm Approaching Us
https://itee.uq.edu.au/profile/1409/ryan-ko
(5) Prof. Qin Liu, Hunan University, China
Title: Secure Search in Cloud Computing and Emerging Applications
https://qinliu-hnu.github.io/
(6) Prof. Sabu M. Thampi, Kerala University of Digital Sciences, Innovation and Technology (KUDSIT), India
Title: Security and Privacy Issues in the Internet of Drones
http://www.sabumthampi.in
(7) Prof. Tian Wang, Beijing Normal University, China
Title: Distributed Mobile Computation Offloading and Edge Intelligence
https://cist.bnu.edu.cn/xygk/szdw/zgj/104104.html
(8) Prof. Carlos Becker Westphall, Federal University of Santa Catarina, Brazil
Title: Mutual Authentication with Multi-factor and Hybrid Approach to Intrusion Detection in IoT-Fog-Cloud Environment
https://lrg.ufsc.br/westphal/
(9) Prof. Yulei Wu, University of Exeter, UK
Title: Trustworthiness of anomaly detection for IIoT
http://empslocal.ex.ac.uk/people/staff/yw433/
(10) Prof. Yang Xu, Hunan University, China
Title: Blockchain-enabled Cloud Security: Frameworks and Solutions
http://csee.hnu.edu.cn/people/xuyang
======================================================================
Panel Discussions Section
You are welcome to attend 2+ Panel Discussions offerred by world-renowned professors and industry leaders. The detailed information
will appear soon.
======================================================================
Special Issues Section
Distinguished papers, after further revisions, will be published in 15+ SCI & EI indexed special issues.
Here is the list of Special Issues that we will recommend high-quality papers for possible publication*:
(1) IEICE Transactions on Information and Systems (SCI & EI Indexed, Impact Factor: 0.559)
Special Section on Blockchain and Security (Pending).
(2) Information Sciences (SCI & EI Indexed, Impact Factor: 6.795)
Special Issue on Decentralized Trust Management with Intelligence (Pending).
(3) Sensors (SCI & EI Indexed, Impact Factor: 3.576)
Special Issue on Fog/Edge Computing based Smart Sensing System
http://www.mdpi.com/journal/sensors/special_issues/FCSCS
Deadline for manuscript submissions: 31 March 2023.
(4) Sensors (SCI & EI Indexed, Impact Factor: 3.576)
Special Issue on Cyber Situational Awareness in Computer Networks
https://www.mdpi.com/journal/sensors/topical_collections/Cyber_Situational_…
Deadline for manuscript submissions: 31 March 2023.
(5) Sensors (SCI & EI Indexed, Impact Factor: 3.576)
Special Issue on Security, Trust and Privacy in New Computing Environments
https://www.mdpi.com/journal/sensors/topical_collections/STPNCE
Deadline for manuscript submissions: 31 March 2023.
(6) Connection Science (SCI & EI Indexed, Impact Factor: 1.972)
https://www.tandfonline.com/ccos20
Some selected conference papers will be recommended for possible publication in regular issues of this journal, with a sufficient
amount of new materials added into the journal version.
Deadline for manuscript submissions: 31 March 2023.
(7) Sensors (SCI & EI Indexed, Impact Factor: 3.576)
Special Issue on Cryptography and Security Protocol in Internet of Things
https://www.mdpi.com/journal/sensors/special_issues/CSPIOT
Deadline for manuscript submissions: 31 December 2022.
(8) Applied Sciences (SCI & EI Indexed, Impact Factor: 2.679)
Special Issue on Computational Methods for Next Generation Wireless and IoT Applications
https://www.mdpi.com/journal/applsci/special_issues/Generation_Wireless_IoT
Deadline for manuscript submissions: 31 December 2022.
(9) Sensors (SCI & EI Indexed, Impact Factor: 3.576)
Special Issue on Advanced Signal Processing and Human-Machine Interface for Healthcare Diagnostics and Bioengineering Applications
https://www.mdpi.com/journal/sensors/special_issues/advanced_signal_process…
Deadline for manuscript submissions: 20 December 2022.
(10) Electronics (SCI & EI Indexed, Impact Factor: 2.397)
Special Issue on Cybersecurity and Privacy Issues in Cyber-Physical Systems and Industrial Control Systems
https://www.mdpi.com/journal/electronics/special_issues/cyber_industrial_co…
Deadline for manuscript submissions: 25 November 2022.
(11) Sensors (SCI & EI Indexed, Impact Factor: 3.576)
Special Issue on Security and Privacy for Edge, Fog, and Cloud Computing; the Internet of Things and Mobile Crowdsensing
https://www.mdpi.com/journal/sensors/special_issues/SP_EFC
Deadline for manuscript submissions: 10 October 2022 (with possible extension later).
(12) International Journal of Computational Science and Engineering (IJCSE) (EI Indexed)
http://www.inderscience.com/browse/index.php?journalCODE=ijcse
Some selected conference papers will be recommended for possible publication in regular issues of this journal, with a sufficient
amount of new materials added into the journal version.
Deadline for manuscript submissions: 31 March 2023.
(13) Distributed Ledger Technologies: Research and Practice (DLT) (EI Indexed)
Special Issue on Recent Advances of Blockchain Evolution: Architecture and Performance
https://dl.acm.org/pb-assets/static_journal_pages/dlt/pdf/DLT-SI-Recent-Adv…
Deadline for manuscript submissions: 15 December 2022.
(14) Acta Informatica Pragensia
Special Issue on Deep Learning Blockchain-enabled Technology for Improved Healthcare Industrial Systems
https://aip.vse.cz/corproof.php?tartkey=aip-000000-0305&fbclid=IwAR1veJzaae…
Deadline for manuscript submissions: 20 December 2022.
* More special issues will be available soon.
======================================================================
--
Dr. Qin Liu
College of Computer Science and Electronic Engineering
Hunan University
Changsha, Hunan Province,P.R. China, 410082
Mobile: +86-13548577157
Email: gracelq628(a)hnu.edu.cn; gracelq628(a)126.com
Homepage: https://qinliu-hnu.github.io/
Dear all,
The next talk in the IARCS Verification Seminar Series will be given by
Mahesh Viswanathan, a faculty member at the University of Illinois at
Urbana-Champaign. The talk is scheduled on Tuesday, October 4, at 1900 hrs
IST (add to Google calendar
<https://calendar.google.com/event?action=TEMPLATE&tmeid=NmI5c2FkdXNhMGs0YnM…>
).
The details of the talk can be found on the webpage (
https://fmindia.cmi.ac.in/vss/), and also appended to the body of this
email.
The Verification Seminar Series, an initiative by the Indian Association
for Research in Computing Science (IARCS), is a monthly, online
talk-series, broadly in the area of Formal Methods and Programming
Languages, with applications in Verification and Synthesis. The aim of this
talk-series is to provide a platform for Formal Methods researchers to
interact regularly. In addition, we hope that it will make it easier for
researchers to explore newer problems/areas and collaborate on them, and
for younger researchers to start working in these areas.
All are welcome to join.
Best regards,
Deepak, Madhukar, Rahul, Srivathsan
=============================================================
Title: On Linear Time Decidability of Differential Privacy for Programs
with Unbounded Inputs
Meeting Link:
https://us02web.zoom.us/j/89164094870?pwd=eUFNRWp0bHYxRVpwVVNoVUdHU0djQT09
(Meeting ID: 891 6409 4870, Passcode: 082194)
Abstract: We introduce an automata model for describing interesting
classes of differential privacy mechanisms/algorithms that include known
mechanisms from the literature. These automata can model algorithms whose
inputs can be an unbounded sequence of real-valued query answers. We
consider the problem of checking whether there exists a constant $d$ such
that the algorithm described by these automata are
$d\epsilon$-differentially private for all positive values of the privacy
budget parameter $\epsilon$. We show that this problem can be decided in
time linear in the automaton's size by identifying a necessary and
sufficient condition on the underlying graph of the automaton. This paper's
results are the first decidability results known for algorithms with an
unbounded number of query answers taking values from the set of reals.
This is joint work with Rohit Chadha and Prasad Sistla.
Bio: Mahesh Viswanathan is a faculty member at the University of Illinois
at Urbana-Champaign. His research interests are in the core areas of logic,
automata theory, and algorithm design, with applications to the algorithmic
verification of systems. Most recently, his research has been focussed on
the dynamic analysis of multi-threaded programs, model checking of
cyberphysical systems and stochastic systems, and formal analysis of
stochastic security protocols and differential privacy.