posted by organizer: zzm7000 || 2726 views || tracked by 5 users: [display]

WiSec 2022 : 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks

FacebookTwitterLinkedInGoogle


Conference Series : Wireless Network Security
 
Link: https://wisec2022.cs.utsa.edu/
 
When May 16, 2022 - May 19, 2022
Where San Antonio, Texas, USA
Submission Deadline Feb 12, 2022
Notification Due Mar 17, 2022
 

Call For Papers

=============================================================================================================
Call for Papers: 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks (ACM WiSec 2022)
=============================================================================================================

The 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks (ACM WiSec 2022, https://wisec2022.cs.utsa.edu/)
will be held physically from May 16 to 19, 2022 in San-Antonio, Texas, USA. It is planned to be a fully in-person event if the
COVID-19 pandemic situation allows this. Otherwise, the conference will be moved to the virtual space.

ACM WiSec is the leading ACM and SIGSAC conference dedicated to all aspects of security and privacy in wireless and mobile networks
and their applications. In addition to the traditional ACM WiSec topics of physical, link, and network layer security, we welcome
papers focusing on the increasingly diverse range of mobile or wireless applications such as Internet of Things, Cyber-Physical
Systems, as well as the security and privacy of mobile software platforms, usable security and privacy, biometrics, and cryptography.

The conference welcomes contributions that have a clear relevance to systems and applications. Topics of interest include but are
not limited to

- Cryptographic primitives for wireless and mobile security
- Data-driven security attacks and countermeasures
- Economics of mobile security and privacy
- Jamming attacks and defenses
- Key management (agreement or distribution) for wireless or mobile systems
- Mobile malware and platform security
- NFC and smart payment applications
- Next generation cellular network fraud and security
- Physical tracking security and privacy
- Resilience and dependability for mobile and wireless networks
- Reverse engineering of and tampering with mobile applications
- Security and privacy for cognitive radio and dynamic spectrum access systems
- Security and privacy for mobile applications (e.g., mobile sensing systems)
- Security and privacy for smart devices (e.g., smartphones)
- Secure localization and location privacy
- Security protocols for wireless networking
- Side-channel and fault attacks on smart devices
- Side-channel attacks on mobile and wearable systems
- Theoretical and formal approaches for wireless and mobile security
- Usable mobile security and privacy
- Vehicular networks security (e.g., drones, automotive, avionics, autonomous driving)
- Wireless network security in satellite systems
- Wireless and mobile privacy and anonymization techniques
- Wireless or mobile security for cyber-physical systems (e.g, healthcare, smart grid) and IoT systems
- Wireless network security for critical infrastructures
- Applications of Machine Learning methods for Wireless and Mobile Security


The proceedings of ACM WiSec, sponsored by SIGSAC, will be published by the ACM.


Important dates
===============

- Paper submission deadline (extended): February 12th, 2022 (23:59 AoE)
- Author notification: March 17, 2022
- Camera-ready deadline: TBD
- WiSec conference: May 16 to 19, 2022


Full and short papers
=====================

Full paper submissions to ACM WiSec 2022 can be up to 10 pages in the ACM conference style excluding the bibliography and well-marked
appendices, and up to 12 pages in total. ACM WiSec also encourages the submission of short papers with a length of up to 6 pages
(including bibliography and appendices), which describe mature work of a more succinct nature. All papers must be thoroughly anonymized
for double-blind reviewing. Detailed submission instructions will be made available on the WiSec 2022 website.

In addition to regular papers that present novel contributions in the field, we solicit Systematization of Knowledge (SoK) papers that
evaluate, systematize, and contextualize existing knowledge on any of the above topics. Suitable papers provide an important new
viewpoint on an established research area, support or challenge long-held beliefs with compelling evidence, present a convincing new
taxonomy of such an area, and/or identify research gaps with evidence and a structured approach. Survey papers without such contributions
are not suitable. SoK submissions will be distinguished by the prefix "SoK:" in the title and a checkbox on the submission form. They will
be reviewed by the program committee and held to the same standards as regular research papers, except instead of emphasizing novel
research contributions the emphasis will be on value to the community. Accepted papers will be presented at the symposium and included in
the proceedings.


Posters and demos
=================

WiSec will solicit submission of posters and demos. The instructions to submit posters/demos will be made available on the WiSec 2022 website.


Replicability label
===================
In the spirit of open science, WiSec encourages authors of accepted papers to make software and data artifacts publicly available to the community.
Such artifacts will be evaluated by the reproducibility chairs and corresponding papers will be granted a replicability label. While artifacts are
optional, their availability will be positively considered during paper evaluation. Should the authors choose to submit their artifacts for
evaluation, they should indicate their decision upon paper submission and follow the artifact submission guidelines in order to submit them upon
paper acceptance. The detailed guidelines will be made available on the WiSec 2022 website.


Double submissions
==================

It is a policy of the ACM to disallow double/simultaneous submissions, where the same (or substantially similar) paper is concurrently submitted
to multiple conferences/journals. Any double submissions detected will be immediately rejected from all conferences/journals involved. Technical
reports and pre-prints published online are allowed.


Workshops and Tutorial
==================
ACM WiSec will host workshops/tutorials co-organized with the main conference. Details will be made available on the website.

Related Resources

FL-AsiaCCS 2025   International Workshop on Secure and Efficient Federated Learning In Conjunction with ACM AsiaCCS 2025
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
IEEE-Ei/Scopus-ITCC 2025   2025 5th International Conference on Information Technology and Cloud Computing (ITCC 2025)-EI Compendex
IEEE-Ei/Scopus-CNIOT 2025   2025 IEEE 6th International Conference on Computing, Networks and Internet of Things (CNIOT 2025) -EI Compendex
IEEE ICC'25 NextG-WiSec 2025   The 11th IEEE Workshop on NextG (6G and beyond) Wireless Security in conjunction with IEEE ICC 2025
IEEE-Ei/Scopus-CWCBD 2025   2025 6th International Conference on Wireless Communications and Big Data (CWCBD 2025) -EI Compendex
ICSNC 2025   The Twentieth International Conference on Systems and Networks Communications
ASIACCS 2025   The 20th ACM ASIA Conference on Computer and Communications Security - deadline 2
EMERGING 2025   The Seventeenth International Conference on Emerging Networks and Systems Intelligence
SIGCOMM 2025   ACM Special Interest Group on Data Communication