Dear all,
The next talk in the IARCS Verification Seminar Series will be given by Jan
Křetínský, a professor for Formal Methods for Software Reliability at the
Technical University of Munich. The talk is scheduled on Tuesday, October
15, at 1900 hrs IST (add to Google calendar
<https://calendar.google.com/calendar/event?action=TEMPLATE&tmeid=NWN0OWYwcT…>
).
The details of the talk can be found on our webpage (
https://fmindia.cmi.ac.in/vss/), and also appended to the body of this
email.
The Verification Seminar Series, an initiative by the Indian Association
for Research in Computing Science (IARCS), is a monthly, online
talk-series, broadly in the area of Formal Methods and Programming
Languages, with applications in Verification and Synthesis. The aim of this
talk-series is to provide a platform for Formal Methods researchers to
interact regularly. In addition, we hope that it will make it easier for
researchers to explore newer problems/areas and collaborate on them, and
for younger researchers to start working in these areas.
All are welcome to join.
Best regards,
Akash, Deepak, Madhukar, Srivathsan
=============================================================
Title: Learning and Guessing Winning Policies in LTL Synthesis via Semantics
Meeting Link:
https://us02web.zoom.us/j/89164094870?pwd=eUFNRWp0bHYxRVpwVVNoVUdHU0djQT09
(Meeting ID: 891 6409 4870, Passcode: 082194)
Abstract:
We discuss a learning-based framework for guessing a winning strategy in a
parity game originating from a reactive synthesis problem for LTL. Its
applications range from cases where the game's huge size prohibits rigorous
approaches, over increasing scalability of rigorous synthesis, to
explainability of synthesized controllers. We discuss the advantages and
caveats of these new avenues in synthesis. On the technical level, we
describe (i) how to reflect the highly structured logical information in
game's states, the so-called semantic labelling, coming from the recent
LTL-to-automata translations, and (ii) to do so by learning from previously
solved games, bringing the solution process closer to human-like reasoning.
Bio: After PhD from Technical University of Munich in 2013 and from Masaryk
University Brno in 2014, Jan Křetínský was a research fellow at IST Austria
and since 2015 a professor at TU Munich, getting tenure there. While still
affiliated, he has recently moved to MU Brno. His main focus is basic
research in verification, control and explainability of complex systems.
Since 2013 he has been advocating and pioneering the use of AI and ML in
verification.
Dear all,
The next talk in the IARCS Verification Seminar Series will be given by Jan
Křetínský, a professor for Formal Methods for Software Reliability at the
Technical University of Munich. The talk is scheduled on Tuesday, October
15, at 1900 hrs IST (add to Google calendar
<https://calendar.google.com/calendar/event?action=TEMPLATE&tmeid=NWN0OWYwcT…>
).
The details of the talk can be found on our webpage (
https://fmindia.cmi.ac.in/vss/), and also appended to the body of this
email.
The Verification Seminar Series, an initiative by the Indian Association
for Research in Computing Science (IARCS), is a monthly, online
talk-series, broadly in the area of Formal Methods and Programming
Languages, with applications in Verification and Synthesis. The aim of this
talk-series is to provide a platform for Formal Methods researchers to
interact regularly. In addition, we hope that it will make it easier for
researchers to explore newer problems/areas and collaborate on them, and
for younger researchers to start working in these areas.
All are welcome to join.
Best regards,
Akash, Deepak, Madhukar, Srivathsan
=============================================================
Title: Learning and Guessing Winning Policies in LTL Synthesis via Semantics
Meeting Link:
https://us02web.zoom.us/j/89164094870?pwd=eUFNRWp0bHYxRVpwVVNoVUdHU0djQT09
(Meeting ID: 891 6409 4870, Passcode: 082194)
Abstract:
We discuss a learning-based framework for guessing a winning strategy in a
parity game originating from a reactive synthesis problem for LTL. Its
applications range from cases where the game's huge size prohibits rigorous
approaches, over increasing scalability of rigorous synthesis, to
explainability of synthesized controllers. We discuss the advantages and
caveats of these new avenues in synthesis. On the technical level, we
describe (i) how to reflect the highly structured logical information in
game's states, the so-called semantic labelling, coming from the recent
LTL-to-automata translations, and (ii) to do so by learning from previously
solved games, bringing the solution process closer to human-like reasoning.
Bio: After PhD from Technical University of Munich in 2013 and from Masaryk
University Brno in 2014, Jan Křetínský was a research fellow at IST Austria
and since 2015 a professor at TU Munich, getting tenure there. While still
affiliated, he has recently moved to MU Brno. His main focus is basic
research in verification, control and explainability of complex systems.
Since 2013 he has been advocating and pioneering the use of AI and ML in
verification.
Call for Papers: FORMALISE 2025
13th International Conference on Formal Methods in Software Engineering
27 and 28 April, 2025
co-located with ICSE 2025 (April 27-May 3, 2025), Ottawa, Canada
https://conf.researchr.org/home/Formalise-2025
Overview
Historically, formal methods academic research and practical software
development have had limited mutual interactions — except possibly in
specialized domains such as safety-critical software. In recent times,
the outlook has considerably improved: on the one hand, formal methods
research has delivered more flexible techniques and tools that can
support various aspects of the software development process: from user
requirements elicitation, to design, implementation, verification and
validation, as well as the creation of documentation. On the other hand,
software engineering has developed a growing interest in rigorous
techniques applied at scale.
The FormaliSE conference series promotes work at the intersection of the
formal methods and software engineering communities, providing a venue
to exchange ideas, experiences, techniques, and results. We believe more
collaboration between these two communities can be mutually beneficial
by fostering the creation of formal methods that are practically useful
and by helping develop higher-quality software.
Originally a workshop event, since 2018 FormaliSE has been organized as
a conference co-located with ICSE. The 13th edition of FormaliSE will
also take place as a co-located conference of ICSE 2025.
Areas of interest include but are not limited to:
- requirements formalization and formal specification;
- approaches, methods and tools for verification and validation;
- formal approaches to safety and security related issues;
- analysis of performance and other non-functional properties based
on formal approaches;
- scalability of formal method applications
- integration of formal methods within the software development
lifecycle (e.g., change management, continuous integration, regression
testing, and deployment)
- model-based engineering approaches;
- correctness-by-construction approaches for software and systems
engineering;
- application of formal methods to specific domains, e.g.,
autonomous, cyber-physical, intelligent, and IoT systems;
- formal methods for AI-based systems (FM4AI), and AI applied in
formal method approaches (AI4FM);
- formal methods in a certification context
- case studies developed/analyzed with formal approaches
- experience reports on the application of formal methods to
real-world problems;
- guidelines to use formal methods in practice;
- usability of formal methods.
Important dates:
Abstracts due: 11 November 2024
Submissions: 18 November 2024
Notifications: 13 January 2025
Camera ready copies: 5 February 2025
FormaliSE conference: 27-28 April 2025
Paper submission guidelines
We accept papers in three categories:
- Full research papers describing original research work and results.
We encourage authors to include validation of their contributions by
means of a case study or experiments. We also welcome research papers
focusing on tools and tool development.
- Case study papers discussing a significant application that
suggests general lessons learned and motivates further research, or
empirically validates theoretical results (such as a technique's
scalability).
- Research ideas papers describing new ideas in preliminary form, in
a way that can stimulate interesting discussions at the conference, and
suggest future work.
All papers submitted to the FormaliSE 2025 conference must be written in
English, must be unpublished original work, and must not be under review
or submitted elsewhere at the time of submission. Submissions must
comply with the FormaliSE's lightweight double-anonymous review process
(see below).
Full research papers and case study papers can take up to 10 pages
including all text, figures, tables and appendices, but excluding
references. Research ideas papers can take up to 4 pages, plus up to 1
additional page solely for references.
To avoid that authors waste time fitting their papers into the stated
limit at the expense of presentation clarity, paper lengths slightly
exceeding the stated limit will still be considered, provided that the
reviewers find that the presentation is of high quality.
All submissions must be in PDF format and must conform to the IEEE
conference proceedings template, specified in the IEEE Conference
Proceedings Formatting Guidelines (i.e., title in 24pt font and full
text in 10pt type):
https://www.ieee.org/conferences/publishing/templates.html
In LaTeX, use \documentclass[10pt,conference]{IEEEtran} without
including the compsoc or compsocconf options.
To submit a paper to FormaliSE 2025 use thisHotCRP link:
https://formalise25.hotcrp.com/
Lightweight Double-Blind Review Process for Papers
As in recent editions, FormaliSE 2025 will use a lightweight
double-anonymous process. Authors must omit their names and institutions
from the title page, cite their own work in the third person, and omit
acknowledgments that may reveal their identity or affiliation. The
purpose is reducing chances of reviewer bias influenced by the authors’
identities. The double-anonymous process is, however, lightweight, which
means that it should not pose a heavy burden for authors, nor should
make a paper's presentation weaker or more difficult to review. Also,
advertising the paper as part of your usual research activities (for
example, on your personal web-page, in a pre-print archive, by email, in
talks or discussions with colleagues) is permitted without penalties.
Paper selection
Each paper will be reviewed by at least three program committee members
that will judge its overall quality in terms of its soundness,
significance, novelty, verifiability, and presentation clarity.
FormaliSE 2025 will adopt a lightweight response process: if all the
reviewers of a given paper agree that a clarification from the authors
regarding a specific question could move the paper from "borderline" to
"accept", the chairs will relay the reviewers' questions to the authors
by email, and then share their reply with the reviewers in HotCRP. The
goal of lightweight responses is reducing the chance of random
decisions on borderline papers. Hence, they will only be used for a
minority of submissions; most papers will not require such an author
response. Nevertheless, we would ask the corresponding authors of all
submissions to make sure that they are available to answer questions by
email upon request.
Artifact Evaluation
Reproducibility of experimental results is crucial to foster an
atmosphere of trustworthy, open, and reusable research. To improve and
reward reproducibility, FormaliSE 2025 continues its Artifact Evaluation
(AE) procedure. An artifact is any additional material (software, data
sets, machine-checkable proofs, etc.) that substantiates the claims made
in the paper and ideally makes them fully reproducible.
Submission of an artifact is optional but encouraged for all papers
where it can support the results presented in the paper. Artifact review
is single-anonymous (the paper corresponding to an artifact must still
follow the double-anonymous submissions requirements) and will be
conducted concurrently with the paper reviewing process. Artifacts will
be handled by a separate Artifact Evaluation Committee, and the Artifact
Evaluation process will be set up such that the anonymization of the
corresponding papers will not be compromised. Accepted papers with a
successfully evaluated artefact will be awarded the [EAPLS badges
(https://eapls.org/pages/artifact_badges/) that apply (among
"Functional", "Reusable", and "Available"). Awarded badges are to be
added to the camera-ready version of the paper.
Artifacts will be assessed with respect to their consistency with the
results presented in the paper, their completeness, their documentation,
and their ease of use. The Artifact Evaluation will include an initial
check for technical issues; authors of artifacts may be contacted by
email within the first two weeks after artifact submission to help
resolve any technical problems that prevent the evaluation of an
artifact if necessary.
The results of an artifact evaluation will not be available to the
reviewers of the corresponding paper; hence, they will not affect the
paper's acceptance decision. However, reviewers will know whether a
paper has submitted *any* artifacts; this piece of information may be
taken into account to decide whether the paper should be accepted. Thus,
if there are justifiable reasons why a paper's artifacts cannot be
submitted, they should be pointed out in the paper so that the reviewers
can appreciate them and adjust their expectations accordingly.
Detailed guidelines for preparation and submission of artifacts will be
described in a dedicated page inFormaliSE 2025's website.
Publication
All accepted papers are published as part of the ICSE 2025 Proceedings
in the ACM and IEEE Digital Libraries.
At least one author of each accepted paper is required to register for
the conference and present the paper at the conference — physically or,
if the circumstances do not allow so, virtually. Failure to register an
author will result in a paper being removed from the proceedings.
General Chairs
Stefania Gnesi, Istituto di Scienza e Tecnologie dell’Informazione,
Italy
Nico Plat, Thanos, The Netherlands
Program Chairs
Anastasia Mavridou, KBR / NASA Ames Research Center, USA
Gwen Salaün, University Grenoble Alpes, France
Artifact Evaluation Chairs
Ákos Hajdu, Meta, UK
Lina Marsso, University of Toronto, Canada
Social Media Chair
Quentin Nivon, University Grenoble Alpes, France
Program committee
Bernhard Aichernig, TU Graz, Austria
Toshiaki Aoki, Japan Advanced Institute of Science and Technology,
Japan
Kyungmin Bae, Pohang University of Science and Technology, Korea
Domenico Bianculli, University of Luxembourg, Luxembourg
Simon Bliudze, INRIA Lille - Nord Europe, France
Giovanna Broccia, ISTI - CNR, Italy
Radu Calinescu, University of York, UK
Pablo Castro, National University of Rio Cuarto, Argentina
Zhenbang Chen, NUDT, China
Nancy Day, University of Waterloo, Canada
Francisco Durán, University of Málaga, Spain
Marie Farrell, University of Manchester, UK
Carlo A. Furia, USI Lugano, Switzerland
Fatemeh Ghassemi, University of Tehran, Iran
Divya Gopinath, KBR/ NASA Ames Research Center, USA
Yann-Gaël Guéhéneuc, Concordia University, Canada
Paula Herber, University of Münster, Germany
Marieke Huisman, University of Twente, The Netherlands
Fuyuki Ishikawa, National Institute of Informatics, Japan
Xiaoqing Jin, Apple Inc., USA
Violet Ka I Pun, Western Norway University of Applied Sciences,
Norway
Oleksandr Kolchyn, Glushkov Institute of Cybernetics, Ukraine
Antónia Lopes, University of Lisbon, Portugal
Larissa Meinicke, University of Queensland, Australia
Camilo Rocha, Pontificia Universidad Javeriana, Colombia
Cristina Seceleanu, Mälardalen University, Sweden
Arpit Sharma, EECS Department, IISER Bhopal, India
Allison Sullivan, University of Texas, Arlington, USA
Heike Wehrheim, University of Oldenburg, Germany
Start date: November 2024
Salary: INR 37000 + HRA
Location: Tata Institute of Fundamental Research Mumbai
Duration: One year with a possible extension for one more year depending
on performance
Essential educational qualification: At least 4-year degree B. E./ B.
Tech/B.S. or equivalent in Computer Science, Mathematics, Physics,
Electronics & Communication, Electrical Engineering with minimum 60%
marks or 6.2 CGPA
Last date of application: October 15, 2024
The successful candidate will be working on the "VeriLearn" project led
by Shibashis Guha and study the use of machine learning techniques in
formal methods as well as on providing provable guarantees for safety
and trustworthiness as studied in formal methods for machine-learned
systems. The project is aimed at investigating theoretical foundations
as well as showing practical usefulness in terms of scalability and
efficiency.
More details on the position, application procedure, and eligibility
criteria can be found at
https://tinyurl.com/VeriLearnJRF
Application materials can be directly sent via email to the email id
mentioned. Shortlisted candidates will be called for an online interview
towards the end of October 2024.
Apologies for multiple emails.
----
Call for Papers
(Please note deadline extension for VMCAI 2025 below).
https://conf.researchr.org/home/VMCAI-2025
VMCAI 2025 is the 26th International Conference on Verification, Model
Checking, and Abstract Interpretation. The conference will be held
during January 20-21, 2025. VMCAI provides a forum for researchers from
the communities of Verification, Model Checking, and Abstract
Interpretation, facilitating interaction, cross-fertilization, and
advancement of hybrid methods that combine these and related areas.
Scope <https://conf.researchr.org/home/VMCAI-2025#scope>
The program will consist of refereed research papers as well as invited
lectures and tutorials. Research contributions can report new results as
well as experimental evaluations and comparisons of existing techniques.
Topics include, but are not limited to:
* Program Verification
* Model Checking
* Abstract Interpretation
* Abstract Domains
* Program Synthesis
* Static Analysis
* Type Systems
* Deductive Methods
* Program Logics
* First-Order Theories
* Decision Procedures
* Interpolation
* Horn Clause Solving
* Program Certification
* Separation Logic
* Probabilistic Programming and Analysis
* Error Diagnosis
* Detection of Bugs and Security Vulnerabilities
* Program Transformations
* Hybrid and Cyber-physical Systems
* Concurrent and distributed Systems
* Analysis of numerical properties
* Analysis of smart contracts
* Analysis of neural networks
* Case Studies on all of the above topics
Submissions can address any programming paradigm, including concurrent,
constraint, functional, imperative, logic, and object-oriented programming.
Important Dates AoE (UTC-12)
<https://conf.researchr.org/home/VMCAI-2025#important-dates-aoe-utc-12>
* *October 1, 2024* AOE : Paper submission deadline (extended).
* November 8, 2024: Notification
* November 22, 2024: Camera-ready version due
Submissions <https://conf.researchr.org/home/VMCAI-2025#submissions>
Submissions are required to follow Springer’s LNCS format. The page
limit depends on the paper’s category (see below). In each category,
additional material beyond the page limit may be placed in a clearly
marked appendix, to be read at the discretion of the reviewers and to be
omitted in the final version. Formatting style files and further
guidelines for formatting can be found at the Springer website
<https://www.springer.com/gp/computer-science/lncs/conference-proceedings-gu…>.
Submission is via Easy Chair
<https://easychair.org/my/conference?conf=vmcai2025>. Note: submissions
will open on August 26th.
All accepted papers will be published in Springer’s Lecture Notes in
Computer Science series. The corresponding author of each paper will
need to complete and sign a License-to-Publish form to be submitted
together with the camera-ready version.
Submissions will undergo a single-blind review process. Submissions
should /not/ be anonymized for the purposes of review. There will be
three categories of papers: regular papers, tool papers and case
studies. Papers in each category have a different page limit and will be
evaluated differently.
*Regular papers* clearly identify and justify an advance to the field of
verification, abstract interpretation, or model checking. Where
applicable, they are supported by experimental validation. Regular
papers are restricted to 20 pages in LNCS format, not counting references.
**
*Tool papers* present a new tool, a new tool component, or novel
extensions to an existing tool. They should provide a short description
of the theoretical foundations with relevant citations, and emphasize
the design and implementation concerns, including software architecture
and core data structures. A regular tool paper should give a clear
account of the tool’s functionality, discuss the tool’s practical
capabilities with reference to the type and size of problems it can
handle, describe experience with realistic case studies, and where
applicable, provide a rigorous experimental evaluation. Papers that
present extensions to existing tools should clearly focus on the
improvements or extensions with respect to previously published versions
of the tool, preferably substantiated by data on enhancements in terms
of resources and capabilities. Authors are strongly encouraged to make
their tools publicly available and submit an artifact. Tool papers are
restricted to 12 pages in LNCS format, not counting references.
**
*Case studies* are expected to describe the use of verification, model
checking, and abstract interpretation techniques in new application
domains or industrial settings. Papers in this category do not
necessarily need to present original research results but are expected
to contain novel applications of formal methods techniques as well as an
evaluation of these techniques in the chosen application domain. Such
papers are encouraged to discuss the unique challenges of transferring
research ideas to a real-world setting and reflect on any lessons
learned from this technology transfer experience. Case study papers are
restricted to 20 pages in LNCS format, not counting references. (Shorter
case study papers are also welcome.)
Please accept our apologies if you receive multiple copies of this Final UbiSec 2024 Second Batch CFPs with Deadline October 10, 2024.
============================= UbiSec 2024 =================================
Final CFPs of The 4th International Conference on Ubiquitous Security (UbiSec 2024)
Changsha, China, December 29 - 31, 2024
Organizers:
Central South University, China
Guangzhou University, China
http://ubisecurity.org/2024/
========================================================================
Keynote Speeches Section
You are welcome to attend 3 Keynote Speeches offerred by world-renowned professors and industry leaders. The detailed information will appear soon.
(1) Keynote 1: Prof. Robert H. Deng, Singapore Management University, Singapore
Title: Privacy Preserving Service Discovery in Wireless Communications
http://www.mysmu.edu/faculty/robertdeng/
(2) Keynote 2: Prof. Zonghua Gu, Ume University, Sweden
Title: Towards Safe, Secure, and Efficient Resource-Constrained Cyber-Physical Systems
https://www.umu.se/en/staff/zonghua-gu/
(3) Keynote 3: Prof. Md Zakirul Alam Bhuiyan, Fordham University, USA
Title: Continuous Whole Area Authentication with WiFi-Enabled IoT Networks
https://dependsys.com/dr-alam/
======================================================================
Invited Talks Section
TBD.
======================================================================
Panel Discussions Section
TBD.
======================================================================
Special Issues Section
Distinguished papers, after further revisions, will be published in 10+ SCI & EI indexed special issues.
Here is the list of Special Issues that we will recommend high-quality papers for possible publication *:
(1) Journal of Systems Architecture (SCI & EI Indexed, Impact Factor: 3.7)
Special Issue on Security and Privacy in AIoT-enabled Smart Society
https://www.sciencedirect.com/journal/journal-of-systems-architecture/about…
Deadline for manuscript submissions: April 1, 2025.
(2) Applied Sciences (SCI & EI Indexed, Impact Factor: 2.5)
Special Issue on Artificial Intelligence and Cybersecurity: Challenges and Opportunities
https://mdpi.com/si/214727
Deadline for manuscript submissions: August 1, 2025.
(3) Discover Computing (SCI & EI Indexed, Impact Factor: 1.7)
Special Issue on Advanced Pattern Recognition with AI
https://link.springer.com/collections/diahciabdj
Deadline for manuscript submissions: April 30, 2025.
* More special issues will be available soon.
======================================================================
Welcome to participate in UbiSec 2024, Changsha, China, December 29 - 31, 2024! Changsha is a famous historical and cultural city with a variety of interest. This city has been an important grain production base in China since ancient times. The green and verdant Mt. Yuelu stands in the city and Xiangjiang River is clear as a mirror passing through the city. Orange Isle lies in the heart of the river. In particular, Changsha is very close to Chairman Mao's former residence within one-hour driving. Nowadays, being an intellectual center, Changsha has over 100 research institutions and engineering laboratories. Hybrid rice breeding and the Tianhe supercomputer are the main scientific research achievements.
The 4th International Conference on Ubiquitous Security (UbiSec 2024) stems from three conference/symposium/workshop series:
(1) The well-established SpaCCS conference series with Springer LNCS: UbiSec is inspired by the SpaCCS style of three tracks (Security, Privacy, and Anonymity, "Spa" for short), which covers "Big Security" leveraging computation, communication and storage ("CCS" for short) systems and networks. UbiSec extends this style with three new tracks: Cyberspace Security, Cyberspace Privacy, and Cyberspace Anonymity.
(2) The UbiSafe symposium series: UbiSec follows the UbiSafe vision on "Ubiquitous Safety", also meaning that "YOU (will) BE SAFE" (pronounced "UbiSafe"). UbiSec extends this vision to "Ubiquitous Security", using "Big Security" to embrace NOT ONLY security, privacy and anonymity, BUT ALSO safety, reliability, dependability, trustworthiness and more, also meaning that "YOU (will) BE SEC(ure)" (pronounced "UbiSec").
(3) The IWCSS workshop series: UbiSec follows the IWCSS theme on "Cyberspace Security", with "Cyberspace" as the 5th national sovereign space besides the traditional four domains of land, sea, air, and aerospace. UbiSec extends this theme to "Ubiquitous Security", meaning that cyberspace will be secure, physical world will be secure, social networking systems will be secure, and thus "YOU (will) BE SECure"!
The UbiSec 2024 Conference ("The Conference" for short) is the fourth event in the series of conferences/symposia/workshops which are devoted to security, privacy and anonymity in cyberspace, physical world, and social networks. The Conference covers many dimensions including security algorithms and architectures, privacy-aware policies, regulations and techniques, anonymous computation and communication, encompassing fundamental theoretical approaches, practical experimental projects, and commercial application systems for cyberspace, physical world, and social networking systems. As applications of computer and information technology have permeated in every aspect of our daily life, the issues of security, privacy, and anonymity have become increasingly critical. The Conference will provide a forum for world-class researchers to gather and share their research achievements, emerging ideas and trends in the highly challenging research fields.
UbiSec 2024 follows the UbiSec 2023 conference in Exeter, UbiSec 2022 conference in Zhangjiajie and the UbiSec 2021 in Guangzhou, and also the traditions of previous successful SpaCCS/UbiSafe/IWCSS conference/symposium/workshop series, held in Nanjing, China (SpaCCS 2020/UbiSafe 2020), Guangzhou,China (IWCSS 2020); Altanta, USA (SpaCCS 2019/UbiSafe 2019), Guangzhou, China (IWCSS 2019); Melbourne, Australia (SpaCCS 2018/UbiSafe 2018), Guangzhou China (IWCSS 2018); Guangzhou, China (SpaCCS 2017/UbiSafe 2017/IWCSS 2017); Zhangjiajie, China (SpaCCS 2016/UbiSafe 2016); Helsinki, Finland (UbiSafe 2015); Beijing, China (UbiSafe 2014); Melbourne, Australia (UbiSafe 2013); Liverpool, UK (UbiSafe 2012); Changsha, China (UbiSafe 2011); Chengdu China (UbiSafe 2009); and Niagara Falls, Canada (UbiSafe 2007). The conference aims at bringing together researchers and practitioners in the world working in the research fields of security, privacy, and anonymity aspects of computer systems and networks. The conference will focus on broad areas of architectures, algorithms, techniques, and applications for cyberspace security, cyberspace privacy, and cyberspace anonymity.
UbiSec 2024 topics include, but are not limited to the following:
Track 1: Cyberspace Security
--Security Model and Architecture
--Software and System Security
--Trustworthy Computing
--Security in Cloud/Fog/Edge Computing and Pervasive/Ubiquitous Computing
--Machine Learning and AI Security
--Network Security
--Attacks and Defenses
--Intrusion Detection and Prevention
--Security in Web Services
--Security in Mobile Social Networks
--Security in Internet of Things
--Fraud and Cyber Crime
--Accounting and Auditing
--Applied Cryptography
--Database Security
--Authentication
--Forensics and Diagnostics for Security
--Information Hiding
--Security in Big Data and its Applications
--Blockchain and Distributed System Security
--Security in Hardware, Side Channels, and CyberPhysical Systems
--Security in Formal Methods and Programming Languages
Track 2: Cyberspace Privacy
--Economics, Policies, Metrics, and Mechanisms of Privacy
--Privacy Modeling and Analysis
--Privacy-Preserving Computing
--Privacy-Preserving Data Mining
--Privacy-enhancing Technologies and Anonymity
--Privacy for the Internet of Things
--Privacy in Big Data and its Applications
--Privacy-Preserving in Blockchain
--Privacy-Preserving in Mobile Social Networks
--Privacy-Preserving Crowdsensing
--Privacy-Preserving Deep Learning
Track 3: Cyberspace Anonymity
--Anonymous Data Mining and Data Sharing
--Anonymous Management in Trust Relationships
--Anonymous Video Analytics Technology
--Anonymity Metrics, Measures and Evaluations
--Anonymity Models, Hardware/Device of Anonymity
--Anonymity in Wireless Communication Systems
--Anonymous Communication Protocols
--Anonymity in Mobile, Ad Hoc, and Wireless Sensor Networks
--Anonymous Communication and Internet
--Anonymous Social Networks, Structural k-Anonymity in Social Networks
--Authentication Protocol Providing User Anonymity
--Anonymous Information Storage and Management
--Private and Anonymous Data Storage
--Anonymity, Pseudonymity & Identity Management
--Anonymity in Big Data and Cloud Scenarios
--Anonymity in Health and Medical Databases
--Anonymity in Sensor-Cloud Systems
--Anonymity in Edge Computing
IMPORTANT DATES
Paper Submission Deadline: October 10, 2024 (Second Batch)
Author Notification: November 14, 2024 (Second Batch)
Author Registration Due: December 15, 2024 (Second Batch)
Camera-Ready Paper Due: December 15, 2024 (Second Batch)
Conference Dates: December 29 - 31, 2024
SUBMISSION and PUBLICATION INFORMATION
All presented papers in the conference will be published in the conference proceedings with Springer Communications in Computer and Information Science (CCIS). Papers must be clearly presented in English, must not exceed 14 pages in Springer CCIS format (or up to 20 pages with the pages over length charge), including tables, figures, references and appendices. Notice that accepted papers less than 12 pages will be tagged as Short Papers. Papers should be submitted through the EasyChair paper submission system at the conference website. Distinguished papers, after further revisions, will be considered for possible publication in SCI & EI indexed special issues of prestigious international journals. The program committee will select and give two or three "Best Paper Awards" for the conference. By submitting a paper to the conference, authors assure that if the paper is accepted, at least one author will attend the conference and present the paper.
Excecutive General Chair
Guojun Wang, Guangzhou University, China
General Chairs
Richard Hill, University of Huddersfield, United Kingdom
Tian Wang, Beijing Normal University, China
Guihua Duan, Central South University, China
Program Chairs
Guojun Wang, Guangzhou University, China
Zheng Yan, Xidian University, China
Kuan-Ching Li, Providence University, Taiwan
Yulei Wu, University of Bristol, United Kingdom
Program Vice Chairs
Track 1: Cyberspace Security
Tariq Alsboui, University of Huddersfield, United Kingdom
Muhammad Arif, Superior University Lahore, Pakistan
Zhitao Guan, North China Electric Power University, China
Qin Liu, Hunan University, China
Yuxiang Ma, Henan University, China
Junwei Zhou, Wuhan University of Technology, China
Track 2: Cyberspace Privacy
Saqib Ali, University of Agriculture Faisalabad, Pakistan
Bin Cao, Hebei University of Technology, China
Songwen Pei, University of Shanghai for Science and Technology, China
Asis Kumar Tripathy, VIT University, India
Zehua Wang, The University of British Columbia, Canada
Shigeng Zhang, Central South University, China
Track 3: Cyberspace Anonymity
Wenxiu Ding, Xidian University, China
Antonio Esposito, Università degli Studi della Campania Luigi Vanvitelli, Italy
Jiajia Jiao, Shanghai Maritime University, China
Florin Pop, Polytechnic University of Bucharest (UPB), Romania
Zhe Qu, Central South University, China
Guohua Tian, Xidian University, China
Publicity Chairs
Carlos Becker Westphall, Federal University of Santa Catarina, Brazil
Peter Mueller, University of Basel, Switzerland
Scott Fowler, Linkoping University, Sweden
Xiangyong Liu, Guangzhou University, China
Wenjia Li, New York Institute of Technology, USA
Guanghui Feng, Guangzhou University, China
Registration Chair
Pin Liu, Central South University, China
Conference Secretariat
Wenyin Yang, Foshan University, China
Web Chairs
Yonglin Liu, Foshan University, China
Zhuoran Feng, Foshan University, China
Steering Committee
Guojun Wang, Guangzhou University, China (Chair)
Kim-Kwang Raymond Choo, University of Texas at San Antonio, USA (Chair)
Saqib Ali, University of Agriculture Faisalabad, Pakistan
Valentina E. Balas, Aurel Vlaicu University of Arad, Romania
Md Zakirul Alam Bhuiyan, Fordham University, USA
Jiannong Cao, The Hong Kong Polytechnic University, Hong Kong
Aniello Castiglione, University of Naples Parthenope, Italy
Scott Fowler, Linkoping University, Sweden
Oana Geman, University of Suceava, Romania
Richard Hill, University of Huddersfield, United Kingdom
Ryan Ko, University of Queensland, Australia
Kuan-Ching Li, Providence University, Taiwan
Jianhua Ma, Hosei University, Japan
Gregorio Martinez, University of Murcia, Spain
Geyong Min, University of Exeter, UK
Peter Mueller, University of Basel, Switzerland
Kouichi Sakurai, Kyushu University, Japan
Sabu M. Thampi, Indian Institute of Information Technology and Management - KeralaKerala University of Digital Sciences, Innovation and Technology (KUDSIT), India
Carlos Becker Westphall, Federal University of Santa Catarina, Brazil
Jie Wu, Temple University, USA
Yang Xu, Hunan University, China
Zheng Yan, Xidian University, China
Wenyin Yang, Foshan University, China
Haojin Zhu, Shanghai Jiao Tong University, China
Program Committee
Please check the "Program Committee" web page at the conference website for detail:
http://ubisecurity.org/2024/
Previous Proceedings
UbiSec 2023: https://link.springer.com/book/10.1007/978-981-97-1274-8
UbiSec 2022: https://link.springer.com/book/10.1007/978-981-99-0272-9
UbiSec 2021: https://link.springer.com/book/10.1007/978-981-19-0468-4
Contact
Please email inquiries concerning UbiSec 2024 to Prof. Guojun Wang: csgjwang AT gmail DOT com and Conference Organizers: UbiSec2024 AT googlegroups.com.
Prof. Guojun Wang, Executive General Chair of UbiSec 2024
http://trust.gzhu.edu.cn/faculty/~csgjwang/
***********************************************************************
Dr. Guojun Wang, Pearl River Scholarship Distinguished Professor
Director of Institute of Computer Networks,
School of Computer Science and Cyber Engineering,
Guangzhou University, Guangzhou, Guangdong Province,
P. R. China, 510006
Mobile: +86-13360581866
Email: csgjwang AT gzhu.edu.cn
http://trust.gzhu.edu.cn/faculty/~csgjwang/
***********************************************************************
--
Dr. Qin Liu
College of Computer Science and Electronic Engineering
Hunan University
Changsha, Hunan Province,P.R. China, 410082
Mobile: +86-13548577157
Email: gracelq628(a)hnu.edu.cn; gracelq628(a)126.com
Homepage: https://qinliu-hnu.github.io/
Dear colleague,
As you may know, FSTTCS 2024 (https://www.fsttcs.org.in/2024/) is going to
be held in IIT Gandhinagar during 16-18 December. It is organised by IARCS,
the Indian Association for Research in Computing Science, in association
with ACM India. It is a very visible forum for presenting original results
in foundational aspects of Computer Science and Software Technology.
In continuation from last year, this year too co-located with the main
FSTTCS conference, IARCS is organizing a Workshop on Research Highlights in
Programming Languages (RHPL@FSTTCS). The focus of the workshop will be on
all areas of Programming Languages, including but not limited to, Program
Analysis and Verification, Applied Formal Methods, and Compilers.
The objective of RHPL is to foster interactions between the attendees of
the workshop, and more broadly between researchers working on Programming
Languages and the traditional FSTTCS community of researchers working on
Theoretical Computer Science and Formal Methods. Please visit the webpage
for more details: https://fmindia.cmi.ac.in/rhpl2024/
We solicit
(1) Talk proposals: On recent work that has been published in good venues,
or is mature in terms of approach and evaluation.
(2) Poster proposals: On early ideas that are promising but have not been
developed fully. Selections of these proposals will be made based on the
promise of research possibilities and their novelty.
You may submit a proposal using this Google form:
https://forms.gle/B3sj8xu4hrCKar2M9
The important dates are as below.
Submission deadline: October 15, 2024 (AoE)
Notification: October 25, 2024
RHPL@FSTTCS: December 16-18, 2024
We look forward to receiving your talk/poster proposals to the workshop.
On Behalf of the RHPL@FSTTCS workshop organizing committee:
Deepak D'Souza (IISc Bangalore)
Uday Khedker (IIT Bombay)
Kumar Madhukar (IIT Delhi) (Co-Chair)
Kartik Nagar (IIT Madras)
Ganesan Ramalingam (Microsoft)
Aseem Rastogi (Microsoft Research)
Abhik Roychoudhury (National University of Singapore)
Abhisekh Sankaran (Tata Consultancy Services Research)
Divyesh Unadkat (Synopsys) (Co-Chair)
We have an exciting (and diverse) collection of invited and contributed talks related to compilers: https://compilertech.org/schedule.
The last date of registration is 15 Sept 2024.
We look forward to seeing you in the workshop.
--
signature.html
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Dr. Uday Khedker, Professor
Department of Computer Science & Engg.
IIT Bombay, Powai, Mumbai 400 076, India.
Email : uday(a)cse.iitb.ac.in
Homepage: http://www.cse.iitb.ac.in/~uday
Phone : 91 (22) 2572 2545 x 7717, 91 (22) 2576 7717 (Direct)
Please accept our apologies if you receive multiple copies of this Final UbiSec 2024 Second Batch CFPs with Deadline October 10, 2024.
============================= UbiSec 2024 =================================
Final CFPs of The 4th International Conference on Ubiquitous Security (UbiSec 2024)
Changsha, China, December 29 - 31, 2024
Organizers:
Central South University, China
Guangzhou University, China
http://ubisecurity.org/2024/
========================================================================
Keynote Speeches Section
You are welcome to attend 3 Keynote Speeches offerred by world-renowned professors and industry leaders. The detailed information will appear soon.
(1) Keynote 1: Prof. Robert H. Deng, Singapore Management University, Singapore
Title: Privacy Preserving Service Discovery in Wireless Communications
http://www.mysmu.edu/faculty/robertdeng/
(2) Keynote 2: Prof. Zonghua Gu, Ume University, Sweden
Title: Towards Safe, Secure, and Efficient Resource-Constrained Cyber-Physical Systems
https://www.umu.se/en/staff/zonghua-gu/
(3) Keynote 3: Prof. Md Zakirul Alam Bhuiyan, Fordham University, USA
Title: Continuous Whole Area Authentication with WiFi-Enabled IoT Networks
https://dependsys.com/dr-alam/
======================================================================
Invited Talks Section
TBD.
======================================================================
Panel Discussions Section
TBD.
======================================================================
Special Issues Section
Distinguished papers, after further revisions, will be published in 10+ SCI & EI indexed special issues.
Here is the list of Special Issues that we will recommend high-quality papers for possible publication *:
(1) Journal of Systems Architecture (SCI & EI Indexed, Impact Factor: 3.7)
Special Issue on Security and Privacy in AIoT-enabled Smart Society
https://www.sciencedirect.com/journal/journal-of-systems-architecture/about…
Deadline for manuscript submissions: April 1, 2025.
(2) Applied Sciences (SCI & EI Indexed, Impact Factor: 2.5)
Special Issue on Artificial Intelligence and Cybersecurity: Challenges and Opportunities
https://mdpi.com/si/214727
Deadline for manuscript submissions: August 1, 2025.
(3) Discover Computing (SCI & EI Indexed, Impact Factor: 1.7)
Special Issue on Advanced Pattern Recognition with AI
https://link.springer.com/collections/diahciabdj
Deadline for manuscript submissions: April 30, 2025.
* More special issues will be available soon.
======================================================================
Welcome to participate in UbiSec 2024, Changsha, China, December 29 - 31, 2024! Changsha is a famous historical and cultural city with a variety of interest. This city has been an important grain production base in China since ancient times. The green and verdant Mt. Yuelu stands in the city and Xiangjiang River is clear as a mirror passing through the city. Orange Isle lies in the heart of the river. In particular, Changsha is very close to Chairman Mao's former residence within one-hour driving. Nowadays, being an intellectual center, Changsha has over 100 research institutions and engineering laboratories. Hybrid rice breeding and the Tianhe supercomputer are the main scientific research achievements.
The 4th International Conference on Ubiquitous Security (UbiSec 2024) stems from three conference/symposium/workshop series:
(1) The well-established SpaCCS conference series with Springer LNCS: UbiSec is inspired by the SpaCCS style of three tracks (Security, Privacy, and Anonymity, "Spa" for short), which covers "Big Security" leveraging computation, communication and storage ("CCS" for short) systems and networks. UbiSec extends this style with three new tracks: Cyberspace Security, Cyberspace Privacy, and Cyberspace Anonymity.
(2) The UbiSafe symposium series: UbiSec follows the UbiSafe vision on "Ubiquitous Safety", also meaning that "YOU (will) BE SAFE" (pronounced "UbiSafe"). UbiSec extends this vision to "Ubiquitous Security", using "Big Security" to embrace NOT ONLY security, privacy and anonymity, BUT ALSO safety, reliability, dependability, trustworthiness and more, also meaning that "YOU (will) BE SEC(ure)" (pronounced "UbiSec").
(3) The IWCSS workshop series: UbiSec follows the IWCSS theme on "Cyberspace Security", with "Cyberspace" as the 5th national sovereign space besides the traditional four domains of land, sea, air, and aerospace. UbiSec extends this theme to "Ubiquitous Security", meaning that cyberspace will be secure, physical world will be secure, social networking systems will be secure, and thus "YOU (will) BE SECure"!
The UbiSec 2024 Conference ("The Conference" for short) is the fourth event in the series of conferences/symposia/workshops which are devoted to security, privacy and anonymity in cyberspace, physical world, and social networks. The Conference covers many dimensions including security algorithms and architectures, privacy-aware policies, regulations and techniques, anonymous computation and communication, encompassing fundamental theoretical approaches, practical experimental projects, and commercial application systems for cyberspace, physical world, and social networking systems. As applications of computer and information technology have permeated in every aspect of our daily life, the issues of security, privacy, and anonymity have become increasingly critical. The Conference will provide a forum for world-class researchers to gather and share their research achievements, emerging ideas and trends in the highly challenging research fields.
UbiSec 2024 follows the UbiSec 2023 conference in Exeter, UbiSec 2022 conference in Zhangjiajie and the UbiSec 2021 in Guangzhou, and also the traditions of previous successful SpaCCS/UbiSafe/IWCSS conference/symposium/workshop series, held in Nanjing, China (SpaCCS 2020/UbiSafe 2020), Guangzhou,China (IWCSS 2020); Altanta, USA (SpaCCS 2019/UbiSafe 2019), Guangzhou, China (IWCSS 2019); Melbourne, Australia (SpaCCS 2018/UbiSafe 2018), Guangzhou China (IWCSS 2018); Guangzhou, China (SpaCCS 2017/UbiSafe 2017/IWCSS 2017); Zhangjiajie, China (SpaCCS 2016/UbiSafe 2016); Helsinki, Finland (UbiSafe 2015); Beijing, China (UbiSafe 2014); Melbourne, Australia (UbiSafe 2013); Liverpool, UK (UbiSafe 2012); Changsha, China (UbiSafe 2011); Chengdu China (UbiSafe 2009); and Niagara Falls, Canada (UbiSafe 2007). The conference aims at bringing together researchers and practitioners in the world working in the research fields of security, privacy, and anonymity aspects of computer systems and networks. The conference will focus on broad areas of architectures, algorithms, techniques, and applications for cyberspace security, cyberspace privacy, and cyberspace anonymity.
UbiSec 2024 topics include, but are not limited to the following:
Track 1: Cyberspace Security
--Security Model and Architecture
--Software and System Security
--Trustworthy Computing
--Security in Cloud/Fog/Edge Computing and Pervasive/Ubiquitous Computing
--Machine Learning and AI Security
--Network Security
--Attacks and Defenses
--Intrusion Detection and Prevention
--Security in Web Services
--Security in Mobile Social Networks
--Security in Internet of Things
--Fraud and Cyber Crime
--Accounting and Auditing
--Applied Cryptography
--Database Security
--Authentication
--Forensics and Diagnostics for Security
--Information Hiding
--Security in Big Data and its Applications
--Blockchain and Distributed System Security
--Security in Hardware, Side Channels, and CyberPhysical Systems
--Security in Formal Methods and Programming Languages
Track 2: Cyberspace Privacy
--Economics, Policies, Metrics, and Mechanisms of Privacy
--Privacy Modeling and Analysis
--Privacy-Preserving Computing
--Privacy-Preserving Data Mining
--Privacy-enhancing Technologies and Anonymity
--Privacy for the Internet of Things
--Privacy in Big Data and its Applications
--Privacy-Preserving in Blockchain
--Privacy-Preserving in Mobile Social Networks
--Privacy-Preserving Crowdsensing
--Privacy-Preserving Deep Learning
Track 3: Cyberspace Anonymity
--Anonymous Data Mining and Data Sharing
--Anonymous Management in Trust Relationships
--Anonymous Video Analytics Technology
--Anonymity Metrics, Measures and Evaluations
--Anonymity Models, Hardware/Device of Anonymity
--Anonymity in Wireless Communication Systems
--Anonymous Communication Protocols
--Anonymity in Mobile, Ad Hoc, and Wireless Sensor Networks
--Anonymous Communication and Internet
--Anonymous Social Networks, Structural k-Anonymity in Social Networks
--Authentication Protocol Providing User Anonymity
--Anonymous Information Storage and Management
--Private and Anonymous Data Storage
--Anonymity, Pseudonymity & Identity Management
--Anonymity in Big Data and Cloud Scenarios
--Anonymity in Health and Medical Databases
--Anonymity in Sensor-Cloud Systems
--Anonymity in Edge Computing
IMPORTANT DATES
Paper Submission Deadline: October 10, 2024 (Second Batch)
Author Notification: November 14, 2024 (Second Batch)
Author Registration Due: December 15, 2024 (Second Batch)
Camera-Ready Paper Due: December 15, 2024 (Second Batch)
Conference Dates: December 29 - 31, 2024
SUBMISSION and PUBLICATION INFORMATION
All presented papers in the conference will be published in the conference proceedings with Springer Communications in Computer and Information Science (CCIS). Papers must be clearly presented in English, must not exceed 14 pages in Springer CCIS format (or up to 20 pages with the pages over length charge), including tables, figures, references and appendices. Notice that accepted papers less than 12 pages will be tagged as Short Papers. Papers should be submitted through the EasyChair paper submission system at the conference website. Distinguished papers, after further revisions, will be considered for possible publication in SCI & EI indexed special issues of prestigious international journals. The program committee will select and give two or three "Best Paper Awards" for the conference. By submitting a paper to the conference, authors assure that if the paper is accepted, at least one author will attend the conference and present the paper.
Excecutive General Chair
Guojun Wang, Guangzhou University, China
General Chairs
Richard Hill, University of Huddersfield, United Kingdom
Tian Wang, Beijing Normal University, China
Guihua Duan, Central South University, China
Program Chairs
Guojun Wang, Guangzhou University, China
Zheng Yan, Xidian University, China
Kuan-Ching Li, Providence University, Taiwan
Yulei Wu, University of Bristol, United Kingdom
Program Vice Chairs
Track 1: Cyberspace Security
Tariq Alsboui, University of Huddersfield, United Kingdom
Muhammad Arif, Superior University Lahore, Pakistan
Zhitao Guan, North China Electric Power University, China
Qin Liu, Hunan University, China
Yuxiang Ma, Henan University, China
Junwei Zhou, Wuhan University of Technology, China
Track 2: Cyberspace Privacy
Saqib Ali, University of Agriculture Faisalabad, Pakistan
Bin Cao, Hebei University of Technology, China
Songwen Pei, University of Shanghai for Science and Technology, China
Asis Kumar Tripathy, VIT University, India
Zehua Wang, The University of British Columbia, Canada
Shigeng Zhang, Central South University, China
Track 3: Cyberspace Anonymity
Wenxiu Ding, Xidian University, China
Antonio Esposito, Università degli Studi della Campania Luigi Vanvitelli, Italy
Jiajia Jiao, Shanghai Maritime University, China
Florin Pop, Polytechnic University of Bucharest (UPB), Romania
Zhe Qu, Central South University, China
Guohua Tian, Xidian University, China
Publicity Chairs
Carlos Becker Westphall, Federal University of Santa Catarina, Brazil
Peter Mueller, University of Basel, Switzerland
Scott Fowler, Linkoping University, Sweden
Xiangyong Liu, Guangzhou University, China
Wenjia Li, New York Institute of Technology, USA
Guanghui Feng, Guangzhou University, China
Registration Chair
Pin Liu, Central South University, China
Conference Secretariat
Wenyin Yang, Foshan University, China
Web Chairs
Yonglin Liu, Foshan University, China
Zhuoran Feng, Foshan University, China
Steering Committee
Guojun Wang, Guangzhou University, China (Chair)
Kim-Kwang Raymond Choo, University of Texas at San Antonio, USA (Chair)
Saqib Ali, University of Agriculture Faisalabad, Pakistan
Valentina E. Balas, Aurel Vlaicu University of Arad, Romania
Md Zakirul Alam Bhuiyan, Fordham University, USA
Jiannong Cao, The Hong Kong Polytechnic University, Hong Kong
Aniello Castiglione, University of Naples Parthenope, Italy
Scott Fowler, Linkoping University, Sweden
Oana Geman, University of Suceava, Romania
Richard Hill, University of Huddersfield, United Kingdom
Ryan Ko, University of Queensland, Australia
Kuan-Ching Li, Providence University, Taiwan
Jianhua Ma, Hosei University, Japan
Gregorio Martinez, University of Murcia, Spain
Geyong Min, University of Exeter, UK
Peter Mueller, University of Basel, Switzerland
Kouichi Sakurai, Kyushu University, Japan
Sabu M. Thampi, Indian Institute of Information Technology and Management - KeralaKerala University of Digital Sciences, Innovation and Technology (KUDSIT), India
Carlos Becker Westphall, Federal University of Santa Catarina, Brazil
Jie Wu, Temple University, USA
Yang Xu, Hunan University, China
Zheng Yan, Xidian University, China
Wenyin Yang, Foshan University, China
Haojin Zhu, Shanghai Jiao Tong University, China
Program Committee
Please check the "Program Committee" web page at the conference website for detail:
http://ubisecurity.org/2024/
Previous Proceedings
UbiSec 2023: https://link.springer.com/book/10.1007/978-981-97-1274-8
UbiSec 2022: https://link.springer.com/book/10.1007/978-981-99-0272-9
UbiSec 2021: https://link.springer.com/book/10.1007/978-981-19-0468-4
Contact
Please email inquiries concerning UbiSec 2024 to Prof. Guojun Wang: csgjwang AT gmail DOT com and Conference Organizers: UbiSec2024 AT googlegroups.com.
Prof. Guojun Wang, Executive General Chair of UbiSec 2024
http://trust.gzhu.edu.cn/faculty/~csgjwang/
***********************************************************************
Dr. Guojun Wang, Pearl River Scholarship Distinguished Professor
Director of Institute of Computer Networks,
School of Computer Science and Cyber Engineering,
Guangzhou University, Guangzhou, Guangdong Province,
P. R. China, 510006
Mobile: +86-13360581866
Email: csgjwang AT gzhu.edu.cn
http://trust.gzhu.edu.cn/faculty/~csgjwang/
***********************************************************************
--
Dr. Qin Liu
College of Computer Science and Electronic Engineering
Hunan University
Changsha, Hunan Province,P.R. China, 410082
Mobile: +86-13548577157
Email: gracelq628(a)hnu.edu.cn; gracelq628(a)126.com
Homepage: https://qinliu-hnu.github.io/
=====================================================
7th Asian Workshop on Philosophical Logic
6-8 February, 2025
Department of Philosophy, Jadavpur University, Kolkata, India
https://sites.google.com/view/awpl2025/
=====================================================
[CALL FOR PAPERS: A GENTLE REMINDER (10 days till deadline)]
The 7th Asian Workshop on Philosophical Logic will be held on 6-8 February 2025 at the Department of Philosophy, Jadavpur University, Kolkata, India. Association for Logic in India (ALI [1]) will be a co-organizer for this workshop.
The Asian Workshop on Philosophical Logic (AWPL [2]) is a series of events initiated by a group of Asian logicians. Its first instalment took place at JAIST in Japan in 2012. The workshop's primary goal is to promote awareness, understanding, and collaboration among researchers in philosophical logic and related fields. It emphasises the interaction between philosophical ideas and formal theories. AWPL 2025 will happen just after ICLA 2025 [3], which would be held at Indian Statistical Institute, Kolkata, India, during February 3-5, 2025.
*Topics of interest include* (but are not restricted to):
Algebraic logic; Chinese logic; Constructive logic; Decision Theory; Formal epistemology; Game Theory; Greek logic; Indian logic; Inductive logic; Logics of belief change; Logics of conditionals; Modal, temporal, epistemic and deontic logics; Nonmonotonic logics; Relevance and other non-classical logics; Philosophy of language; Philosophy of mathematics; Philosophy of Science; Proof Systems, Quantum logic; Vagueness;
*as well as their applications in:*
Artificial Intelligence, Cognitive Science; Computer Science; Law; Linguistics; Mathematics; Social Sciences.
[1] https://logicindia.org/
[2] http://awpl.org/Workshops.html
[3] https://logicindia.org/icla/icla2025
[IMPORTANT DATES]
Submission deadline: 15 September, 2024 AoE
Notification of acceptance: 20 October, 2024 AoE
Workshop dates: 6-8 February, 2025
[SUBMISSION]
All submissions should present original works that have not been previously published. Submissions should be written in English and follow the LNCS template [4]. Please prepare your submission as a PDF file with a maximum of 12 pages, including the reference list, appendixes, acknowledgements, etc. Submissions should be sent electronically via EasyChair [5] by the corresponding author within the specified deadline. It is expected that at least one of the authors will attend the workshop and present the accepted work. After the workshop, selected submissions will be invited to revise and resubmit for the post-conference proceedings, which will be published in the "Logic in Asia" [6] series.
[4] https://www.springer.com/gp/computer-science/lncs/conference-proceedings-gu…
[5] https://easychair.org/conferences/?conf=awpl2025
[6] http://www.springer.com/series/13080?detailsPage=titles
[INVITED SPEAKERS]
Bahareh Afshari (University of Gothenburg)
Andreas Herzig (IRIT Toulouse)
Fenrong Liu (Tsinghua University)
Katsuhiko Sano (Hokkaido University)
We will also have a distinguished lecture by:
Johan van Benthem (Amsterdam, Stanford and Tsinghua)
[STEERING COMMITTEE]
Phan Minh Dung (Asian Institute of Technology, Bangkok)
Hu Liu (Sun Yat-sen University, Guangzhou)
Beishui Liao (Zhejiang University, Hangzhou)
Fenrong Liu (Tsinghua University, Beijing)
Hiroakira Ono (Japan Advanced Institute of Science and Technology, Ishikawa)
R. Ramanujam (Azim Premji University, Bengaluru)
Hsing-chien Tsai (National Chung Cheng University, Chiayi)
[PROGRAM COMMITTEE]
Rupa Bandyopadhyay (Jadavpur University)
Mihir Chakraborty (Jadavpur University)
Amita Chatterjee (Jadavpur University)
Madhumita Chattopadhyay (Jadavpur University)
Sujata Ghosh (Indian Statistical Institute) (Co-Chair)
Purbita Jana (Madras School of Economics)
Kohei Kishida (University of Illinois, Urbana-Champaign)
Serafina Lapenta (University of Salerno)
Dazhu Li (University of Chinese Academy of Sciences)
Yanjun Li (Nankai University)
Fei Liang (Shandong University)
Abhishek Anant Nowbagh (Jadavpur University) (Co-Chair)
Hitoshi Omori (Tohoku University)
R.Ramanujam (Azim Premji University)
Abhisekh Sankaran (Tata Consultancy Services Research)
Manidipa Sanyal (University of Calcutta)
Chenwei Shi (Tsinghua University)
Sonja Smets (University of Amsterdam)
Shawn Standefer (National Taiwan University)
Sourav Tarafder (St. Xavier's College)
Yanjing Wang (Peking University)
Yì Nicholas Wáng (Sun Yat-sen University)
Tomoyuki Yamada (Hokkaido University)
Fan Yang (Utrecht University)
[LOCAL ORGANIZING COMMITTEE]
Gopinath Mondal (Jadavpur University, Kolkata)
Samar Kumar Mondal (Jadavpur University, Kolkata)
Tamoghna Sarkar (Jadavpur University, Kolkata)
Mainak Pal (Jadavpur University, Kolkata)
Sunirmal Das (Jadavpur University, Kolkata)
[CONTACT]
awpl2025ju(a)gmail.com