| |||||||||||||||
SPIoT 2022 : The 11th International Symposium on Security and Privacy on the Internet of Things | |||||||||||||||
Link: http://ubisecurity.org/SPIoT/2022/ | |||||||||||||||
| |||||||||||||||
Call For Papers | |||||||||||||||
============================== SPIoT 2022 ==============================
Conferences Pivoting to a Part-Virtual Platform [SPIoT 2022] - Now Taking Place Part-Virtually Due to the current COVID-19 situation, the SPIoT 2022 conference will be a combination of online and offline event. For authors who consider to present their papers online, please pay a half of author registration fees for each paper and show this "Half Registration Fees" information in the "Remarks" field in the registration form; For attendees who will join the conference online, please pay a half of attendee registration fees and show this "Half Registration Fees" information in the "Remarks" field in the registration form. For questions, contact [csgjwang AT gzhu.edu.cn]. Call for Papers (CFPs) of The 11th International Symposium on Security and Privacy on the Internet of Things (SPIoT 2022) In Conjunction with The Second International Conference on Ubiquitous Security (UbiSec 2022) http://ubisecurity.org/2022/ Zhangjiajie, China, December 28 - 31, 2022 Organizer: Guangzhou University, China http://ubisecurity.org/SPIoT/2022/ Easychair submission page: https://easychair.org/conferences/?conf=spiot2022 Proceedings: All accepted papers will be published by Springer CCIS (Communications in Computer and Information Science) conference proceedings (indexed by Ei Compendex). SUBMISSION and PUBLICATION INFORMATION All presented papers in the conference will be published in the conference proceedings with Springer Communications in Computer and Information Science (CCIS). Papers must be clearly presented in English, must not exceed 14 pages in Springer CCIS format (or up to 20 pages with the pages over length charge), including tables, figures, references and appendices. Notice that accepted papers less than 12 pages will be tagged as Short Papers. Papers should be submitted through the EasyChair paper submission system at the conference website. Distinguished papers, after further revisions, will be considered for possible publication in SCI & EI indexed special issues of prestigious international journals. By submitting a paper to the conference, authors assure that if the paper is accepted, at least one author will attend the conference and present the paper. ====================================================================== Important dates: Paper submission deadline: August 15, 2022 (Closed); Second Batch: October 10, 2022 (Extended) Author notification: First Batch: September 15, 2022; Second Batch: November 15, 2022 Registration: First Batch: September 15, 2022; Second Batch: December 15, 2022 Camera Ready due: First Batch: October 15, 2022; Second Batch: December 15, 2022 Symposium Date: December 28 - 31, 2022 ====================================================================== Keynote Speeches Section You are welcome to attend 5+ Keynote Speeches offerred by world-renowned professors and industry leaders. The detailed information will appear soon. (1) Keynote 1: Prof. Richard Hill, University of Huddersfield, UK Title: Next Generation Security for Cyber Physical Systems https://pure.hud.ac.uk/en/persons/richard-hill (2) Keynote 2: Prof. Tien N. Nguyen, University of Queensland, Australia Title: Intelligent Software Vulnerability Detection https://personal.utdallas.edu/~tien.n.nguyen/ (3) Keynote 3: Prof. Omer Rana, Cardiff University, UK Title: Security-Aware Task Execution across the Edge-Cloud Continuum https://www.cardiff.ac.uk/people/view/118157-rana-omer (4) Keynote 4: Prof. Kouichi SAKURAI, Kyushu University, Japan Title: State and Issues of Non-Fungible Token from Technical Point of View https://hyoka.ofc.kyushu-u.ac.jp/search/details/K000220/english.html (5) Keynote 5: Prof. Deqing Zou, Huazhong University of Science and Technology, China Title: Achieving Scalability and Interpretability Simultaneously in Detecting Multi-granularity Vulnerabilities http://faculty.hust.edu.cn/zoudeqing/zh_CN/index.htm ====================================================================== Invited Talks Section You are welcome to attend 10+ Invited Talks offerred by world-renowned professors and industry leaders. The detailed information will appear soon. (1) Prof. Arcangelo Castiglione, University of Salerno, Italy Title: New Insights on Cryptographic Hierarchical Access Control: Models, Schemes, and Analysis https://docenti.unisa.it/026260/en/home (2) Prof. Scott Fowler, Linkoping University, Sweden Title: Optimize Industrial IoT HVAC by using Machine Learning https://liu.se/en/employee/scofo47, https://sites.google.com/site/scofo47 (3) Prof. Wenjun Jiang, Hunan University, China Title: Online user analysis and learning optimization http://csee.hnu.edu.cn/people/jiangwenjun (4) Prof. Ryan Ko, University of Queensland, Australia Title: Operational Technology (OT) and Supply Chain Cyber Security: The Storm Approaching Us https://itee.uq.edu.au/profile/1409/ryan-ko (5) Prof. Qin Liu, Hunan University, China Title: Secure Search in Cloud Computing and Emerging Applications https://qinliu-hnu.github.io/ (6) Prof. Sabu M. Thampi, Kerala University of Digital Sciences, Innovation and Technology (KUDSIT), India Title: Security and Privacy Issues in the Internet of Drones http://www.sabumthampi.in (7) Prof. Tian Wang, Beijing Normal University, China Title: Distributed Mobile Computation Offloading and Edge Intelligence https://cist.bnu.edu.cn/xygk/szdw/zgj/104104.html (8) Prof. Carlos Becker Westphall, Federal University of Santa Catarina, Brazil Title: Mutual Authentication with Multi-factor and Hybrid Approach to Intrusion Detection in IoT-Fog-Cloud Environment https://lrg.ufsc.br/westphal/ (9) Prof. Yulei Wu, University of Exeter, UK Title: Trustworthiness of anomaly detection for IIoT http://empslocal.ex.ac.uk/people/staff/yw433/ (10) Prof. Yang Xu, Hunan University, China Title: Blockchain-enabled Cloud Security: Frameworks and Solutions http://csee.hnu.edu.cn/people/xuyang ====================================================================== Panel Discussions Section You are welcome to attend 2+ Panel Discussions offerred by world-renowned professors and industry leaders. The detailed information will appear soon. ====================================================================== Special Issues Section Distinguished papers, after further revisions, will be published in 10+ SCI & EI indexed special issues. Here is the list of Special Issues that we will recommend high-quality papers for possible publication *: (1) IEICE Transactions on Information and Systems (SCI & EI Indexed, Impact Factor: 0.559) Special Section on Blockchain and Security (Pending). (2) Information Sciences (SCI & EI Indexed, Impact Factor: 6.795) Special Issue on Decentralized Trust Management with Intelligence (Pending). (3) Sensors (SCI & EI Indexed, Impact Factor: 3.576) Special Issue on Fog/Edge Computing based Smart Sensing System http://www.mdpi.com/journal/sensors/special_issues/FCSCS Deadline for manuscript submissions: 31 March 2023. (4) Sensors (SCI & EI Indexed, Impact Factor: 3.576) Special Issue on Cyber Situational Awareness in Computer Networks https://www.mdpi.com/journal/sensors/topical_collections/Cyber_Situational_Awareness Deadline for manuscript submissions: 31 March 2023. (5) Sensors (SCI & EI Indexed, Impact Factor: 3.576) Special Issue on Security, Trust and Privacy in New Computing Environments https://www.mdpi.com/journal/sensors/topical_collections/STPNCE Deadline for manuscript submissions: 31 March 2023. (6) Connection Science (SCI & EI Indexed, Impact Factor: 1.972) https://www.tandfonline.com/ccos20 Some selected conference papers will be recommended for possible publication in regular issues of this journal, with a sufficient amount of new materials added into the journal version. Deadline for manuscript submissions: 31 March 2023. (7) Sensors (SCI & EI Indexed, Impact Factor: 3.576) Special Issue on Cryptography and Security Protocol in Internet of Things https://www.mdpi.com/journal/sensors/special_issues/CSPIOT Deadline for manuscript submissions: 31 December 2022. (8) Applied Sciences (SCI & EI Indexed, Impact Factor: 2.679) Special Issue on Computational Methods for Next Generation Wireless and IoT Applications https://www.mdpi.com/journal/applsci/special_issues/Generation_Wireless_IoT Deadline for manuscript submissions: 31 December 2022. (9) Sensors (SCI & EI Indexed, Impact Factor: 3.576) Special Issue on Advanced Signal Processing and Human-Machine Interface for Healthcare Diagnostics and Bioengineering Applications https://www.mdpi.com/journal/sensors/special_issues/advanced_signal_processing_HMI_healthcare_bioengineering Deadline for manuscript submissions: 20 December 2022. (10) Electronics (SCI & EI Indexed, Impact Factor: 2.397) Special Issue on Cybersecurity and Privacy Issues in Cyber-Physical Systems and Industrial Control Systems https://www.mdpi.com/journal/electronics/special_issues/cyber_industrial_control Deadline for manuscript submissions: 25 November 2022. (11) Sensors (SCI & EI Indexed, Impact Factor: 3.576) Special Issue on Security and Privacy for Edge, Fog, and Cloud Computing; the Internet of Things and Mobile Crowdsensing https://www.mdpi.com/journal/sensors/special_issues/SP_EFC Deadline for manuscript submissions: 10 October 2022 (with possible extension later). (12) International Journal of Computational Science and Engineering (IJCSE) (EI Indexed) http://www.inderscience.com/browse/index.php?journalCODE=ijcse Some selected conference papers will be recommended for possible publication in regular issues of this journal, with a sufficient amount of new materials added into the journal version. Deadline for manuscript submissions: 31 March 2023. (13) Distributed Ledger Technologies: Research and Practice (DLT) (EI Indexed) Special Issue on Recent Advances of Blockchain Evolution: Architecture and Performance https://dl.acm.org/pb-assets/static_journal_pages/dlt/pdf/DLT-SI-Recent-Advances-Blockchain-Evolution-1651176743000.pdf Deadline for manuscript submissions: 15 December 2022. (14) Acta Informatica Pragensia Special Issue on Deep Learning Blockchain-enabled Technology for Improved Healthcare Industrial Systems https://aip.vse.cz/corproof.php?tartkey=aip-000000-0305&fbclid=IwAR1veJzaaej8gw4TbdWNMYeUHacMjArQ4dJBa_GmxJDWcr1LUGI-ajR1apE Deadline for manuscript submissions: 20 December 2022. * More special issues will be available soon. ====================================================================== Welcome to participate in SPIoT 2022, Zhangjiajie, China, December 28 - 31, 2022! Zhangjiajie is an emerging tourist destination famous for its unique natural scenery and abundant tourism resources. It is located in the northwest of Hunan province, about 400 kilometers away from Changsha, the capital of Hunan province, covering a total area of 9,516 square kilometers, of which 76% are mountainous area. Out of its total population of 1.52 million, almost 77% belong to ethnic minority groups, including Tujia, Bai and Miao nationalities. Zhangjiajie National Forest Park was established by the State Council in 1982 as the first National Forest Park of China. Wulingyuan in Zhangjiajie was listed into the World Natural Heritage Catalogue by the UNESCO in 1992 and appraised as a national scenic area. Zhangjiajie was awarded the title of "World Geological Park" in 2004. The amazing landscape here had been a source of creation of the CGI artist in the Avatar movie, and since the movie was released and achieved a great success, many tourists keeping coming to Zhangjiajie admiring this natural beauty. With the rapid development of information technology, a large amount of data in various industries and fields is increasing explosively. Massive data has brought severe challenges to Cyberspace Security. Network security and informatization are major strategic issues related to national security, national development, and work and life of broad masses of all the people. In the network computing mode, if a cloud server is damaged, it will affect user services on a large scale. Malicious attacks and monitoring activities from the cloud server itself will also cause security and privacy risks in the processes of user services. In addition, lacking the capability of controlling over the computing environment directly will make it difficult for users to trust the services provided in the network computing environment. At present, trusted computing technology can ensure the security and credibility of computing resources at startup to a certain extent, but the security of network computing environment at runtime is difficult to be guaranteed. Therefore, in order to improve the performance of network computing and effectively reduce the security risk of the system, it is necessary to study new network computing models and key security technologies. The 11th International Symposium on Security and Privacy on the Internet of Things (SPIoT 2022), in Conjunction with UbiSec 2022 will be held at Zhangjiajie International Hotel during December 28 - 31, 2022, by the Institute of Trusted Computing, Guangzhou University, China ( http://trust. gzhu.edu.cn) . Experts, scholars and students related to trusted computing from educational and scientific research institutions at home and abroad are welcome to attend the workshop. The workshop will provide a platform for experts and scholars from educational and scientific research institutions to exchange ideas and results, so as to deeply explore future technological innovations. The focus of SPIoT is on high-quality research papers about the state of the art in a wide range of IoT-related technologies: - Security and privacy in heterogeneous IoT. - Secure and Privacy Preserving Data Mining and Aggregation in IoT applications. - Cross-domain trust management in smart networks. - Secure authentication of IoT devices. - MAC layer security protocols for the IoT applications. - IoT security mechanisms targeting application layer protocols. - Resource-savvy Intrusion Detection for Networks of Things. - IoT-based malware mitigation. Proceedings: All accepted papers will be published by Springer CCIS (Communications in Computer and Information Science) conference proceedings (indexed by Ei Compendex). SUBMISSION and PUBLICATION INFORMATION All presented papers in the conference will be published in the conference proceedings with Springer Communications in Computer and Information Science (CCIS). Papers must be clearly presented in English, must not exceed 14 pages in Springer CCIS format (or up to 20 pages with the pages over length charge), including tables, figures, references and appendices. Notice that accepted papers less than 12 pages will be tagged as Short Papers. Papers should be submitted through the EasyChair paper submission system at the conference website. Distinguished papers, after further revisions, will be considered for possible publication in SCI & EI indexed special issues of prestigious international journals. The program committee will select and give two or three "Best Paper Awards" for the conference. By submitting a paper to the conference, authors assure that if the paper is accepted, at least one author will attend the conference and present the paper. |
|