posted by user: managn || 5503 views || tracked by 9 users: [display]

SPIoT 2022 : The 11th International Symposium on Security and Privacy on the Internet of Things

FacebookTwitterLinkedInGoogle

Link: http://ubisecurity.org/SPIoT/2022/
 
When Nov 15, 2022 - Nov 18, 2022
Where Zhangjiajie, China
Submission Deadline Jun 15, 2022
Notification Due Aug 15, 2022
Final Version Due Sep 15, 2022
Categories    IOT   security   privacy   internet of things
 

Call For Papers

============================== SPIoT 2022 ==============================

Conferences Pivoting to a Part-Virtual Platform
[SPIoT 2022] - Now Taking Place Part-Virtually
Due to the current COVID-19 situation, the SPIoT 2022 conference will be a combination of online and offline event. For authors who consider to present their papers online, please pay a half of author registration fees for each paper and show this "Half Registration Fees" information in the "Remarks" field in the registration form; For attendees who will join the conference online, please pay a half of attendee registration fees and show this "Half Registration Fees" information in the "Remarks" field in the registration form. For questions, contact [csgjwang AT gzhu.edu.cn].

Call for Papers (CFPs) of The 11th International Symposium on Security and Privacy on the Internet of Things (SPIoT 2022)

In Conjunction with
The Second International Conference on Ubiquitous Security (UbiSec 2022)
http://ubisecurity.org/2022/

Zhangjiajie, China, December 28 - 31, 2022

Organizer: Guangzhou University, China

http://ubisecurity.org/SPIoT/2022/
Easychair submission page: https://easychair.org/conferences/?conf=spiot2022

Proceedings: All accepted papers will be published by Springer CCIS (Communications in Computer and Information Science) conference proceedings (indexed by Ei Compendex).


SUBMISSION and PUBLICATION INFORMATION
All presented papers in the conference will be published in the conference proceedings with Springer Communications in Computer and Information Science (CCIS). Papers must be clearly presented in English, must not exceed 14 pages in Springer CCIS format (or up to 20 pages with the pages over length charge), including tables, figures, references and appendices. Notice that accepted papers less than 12 pages will be tagged as Short Papers. Papers should be submitted through the EasyChair paper submission system at the conference website. Distinguished papers, after further revisions, will be considered for possible publication in SCI & EI indexed special issues of prestigious international journals. By submitting a paper to the conference, authors assure that if the paper is accepted, at least one author will attend the conference and present the paper.


======================================================================
Important dates:
Paper submission deadline: August 15, 2022 (Closed); Second Batch: October 10, 2022 (Extended)
Author notification: First Batch: September 15, 2022; Second Batch: November 15, 2022
Registration: First Batch: September 15, 2022; Second Batch: December 15, 2022
Camera Ready due: First Batch: October 15, 2022; Second Batch: December 15, 2022
Symposium Date: December 28 - 31, 2022

======================================================================

Keynote Speeches Section

You are welcome to attend 5+ Keynote Speeches offerred by world-renowned professors and industry leaders. The detailed information will appear soon.

(1) Keynote 1: Prof. Richard Hill, University of Huddersfield, UK
Title: Next Generation Security for Cyber Physical Systems
https://pure.hud.ac.uk/en/persons/richard-hill

(2) Keynote 2: Prof. Tien N. Nguyen, University of Queensland, Australia
Title: Intelligent Software Vulnerability Detection
https://personal.utdallas.edu/~tien.n.nguyen/

(3) Keynote 3: Prof. Omer Rana, Cardiff University, UK
Title: Security-Aware Task Execution across the Edge-Cloud Continuum
https://www.cardiff.ac.uk/people/view/118157-rana-omer

(4) Keynote 4: Prof. Kouichi SAKURAI, Kyushu University, Japan
Title: State and Issues of Non-Fungible Token from Technical Point of View
https://hyoka.ofc.kyushu-u.ac.jp/search/details/K000220/english.html

(5) Keynote 5: Prof. Deqing Zou, Huazhong University of Science and Technology, China
Title: Achieving Scalability and Interpretability Simultaneously in Detecting Multi-granularity Vulnerabilities
http://faculty.hust.edu.cn/zoudeqing/zh_CN/index.htm

======================================================================

Invited Talks Section

You are welcome to attend 10+ Invited Talks offerred by world-renowned professors and industry leaders. The detailed information will appear soon.


(1) Prof. Arcangelo Castiglione, University of Salerno, Italy
Title: New Insights on Cryptographic Hierarchical Access Control: Models, Schemes, and Analysis
https://docenti.unisa.it/026260/en/home

(2) Prof. Scott Fowler, Linkoping University, Sweden
Title: Optimize Industrial IoT HVAC by using Machine Learning
https://liu.se/en/employee/scofo47, https://sites.google.com/site/scofo47

(3) Prof. Wenjun Jiang, Hunan University, China
Title: Online user analysis and learning optimization
http://csee.hnu.edu.cn/people/jiangwenjun

(4) Prof. Ryan Ko, University of Queensland, Australia
Title: Operational Technology (OT) and Supply Chain Cyber Security: The Storm Approaching Us
https://itee.uq.edu.au/profile/1409/ryan-ko

(5) Prof. Qin Liu, Hunan University, China
Title: Secure Search in Cloud Computing and Emerging Applications
https://qinliu-hnu.github.io/

(6) Prof. Sabu M. Thampi, Kerala University of Digital Sciences, Innovation and Technology (KUDSIT), India
Title: Security and Privacy Issues in the Internet of Drones
http://www.sabumthampi.in

(7) Prof. Tian Wang, Beijing Normal University, China
Title: Distributed Mobile Computation Offloading and Edge Intelligence
https://cist.bnu.edu.cn/xygk/szdw/zgj/104104.html

(8) Prof. Carlos Becker Westphall, Federal University of Santa Catarina, Brazil
Title: Mutual Authentication with Multi-factor and Hybrid Approach to Intrusion Detection in IoT-Fog-Cloud Environment
https://lrg.ufsc.br/westphal/

(9) Prof. Yulei Wu, University of Exeter, UK
Title: Trustworthiness of anomaly detection for IIoT
http://empslocal.ex.ac.uk/people/staff/yw433/

(10) Prof. Yang Xu, Hunan University, China
Title: Blockchain-enabled Cloud Security: Frameworks and Solutions
http://csee.hnu.edu.cn/people/xuyang
======================================================================

Panel Discussions Section

You are welcome to attend 2+ Panel Discussions offerred by world-renowned professors and industry leaders. The detailed information will appear soon.

======================================================================

Special Issues Section

Distinguished papers, after further revisions, will be published in 10+ SCI & EI indexed special issues.

Here is the list of Special Issues that we will recommend high-quality papers for possible publication *:

(1) IEICE Transactions on Information and Systems (SCI & EI Indexed, Impact Factor: 0.559)
Special Section on Blockchain and Security (Pending).

(2) Information Sciences (SCI & EI Indexed, Impact Factor: 6.795)
Special Issue on Decentralized Trust Management with Intelligence (Pending).

(3) Sensors (SCI & EI Indexed, Impact Factor: 3.576)
Special Issue on Fog/Edge Computing based Smart Sensing System
http://www.mdpi.com/journal/sensors/special_issues/FCSCS
Deadline for manuscript submissions: 31 March 2023.

(4) Sensors (SCI & EI Indexed, Impact Factor: 3.576)
Special Issue on Cyber Situational Awareness in Computer Networks
https://www.mdpi.com/journal/sensors/topical_collections/Cyber_Situational_Awareness
Deadline for manuscript submissions: 31 March 2023.

(5) Sensors (SCI & EI Indexed, Impact Factor: 3.576)
Special Issue on Security, Trust and Privacy in New Computing Environments
https://www.mdpi.com/journal/sensors/topical_collections/STPNCE
Deadline for manuscript submissions: 31 March 2023.

(6) Connection Science (SCI & EI Indexed, Impact Factor: 1.972)
https://www.tandfonline.com/ccos20
Some selected conference papers will be recommended for possible publication in regular issues of this journal, with a sufficient amount of new materials added into the journal version.
Deadline for manuscript submissions: 31 March 2023.

(7) Sensors (SCI & EI Indexed, Impact Factor: 3.576)
Special Issue on Cryptography and Security Protocol in Internet of Things
https://www.mdpi.com/journal/sensors/special_issues/CSPIOT
Deadline for manuscript submissions: 31 December 2022.

(8) Applied Sciences (SCI & EI Indexed, Impact Factor: 2.679)
Special Issue on Computational Methods for Next Generation Wireless and IoT Applications
https://www.mdpi.com/journal/applsci/special_issues/Generation_Wireless_IoT
Deadline for manuscript submissions: 31 December 2022.

(9) Sensors (SCI & EI Indexed, Impact Factor: 3.576)
Special Issue on Advanced Signal Processing and Human-Machine Interface for Healthcare Diagnostics and Bioengineering Applications
https://www.mdpi.com/journal/sensors/special_issues/advanced_signal_processing_HMI_healthcare_bioengineering
Deadline for manuscript submissions: 20 December 2022.

(10) Electronics (SCI & EI Indexed, Impact Factor: 2.397)
Special Issue on Cybersecurity and Privacy Issues in Cyber-Physical Systems and Industrial Control Systems
https://www.mdpi.com/journal/electronics/special_issues/cyber_industrial_control
Deadline for manuscript submissions: 25 November 2022.

(11) Sensors (SCI & EI Indexed, Impact Factor: 3.576)
Special Issue on Security and Privacy for Edge, Fog, and Cloud Computing; the Internet of Things and Mobile Crowdsensing
https://www.mdpi.com/journal/sensors/special_issues/SP_EFC
Deadline for manuscript submissions: 10 October 2022 (with possible extension later).

(12) International Journal of Computational Science and Engineering (IJCSE) (EI Indexed)
http://www.inderscience.com/browse/index.php?journalCODE=ijcse
Some selected conference papers will be recommended for possible publication in regular issues of this journal, with a sufficient amount of new materials added into the journal version.
Deadline for manuscript submissions: 31 March 2023.

(13) Distributed Ledger Technologies: Research and Practice (DLT) (EI Indexed)
Special Issue on Recent Advances of Blockchain Evolution: Architecture and Performance
https://dl.acm.org/pb-assets/static_journal_pages/dlt/pdf/DLT-SI-Recent-Advances-Blockchain-Evolution-1651176743000.pdf
Deadline for manuscript submissions: 15 December 2022.

(14) Acta Informatica Pragensia
Special Issue on Deep Learning Blockchain-enabled Technology for Improved Healthcare Industrial Systems
https://aip.vse.cz/corproof.php?tartkey=aip-000000-0305&fbclid=IwAR1veJzaaej8gw4TbdWNMYeUHacMjArQ4dJBa_GmxJDWcr1LUGI-ajR1apE
Deadline for manuscript submissions: 20 December 2022.

* More special issues will be available soon.

======================================================================

Welcome to participate in SPIoT 2022, Zhangjiajie, China, December 28 - 31, 2022! Zhangjiajie is an emerging tourist destination famous for its unique natural scenery and abundant tourism resources. It is located in the northwest of Hunan province, about 400 kilometers away from Changsha, the capital of Hunan province, covering a total area of 9,516 square kilometers, of which 76% are mountainous area. Out of its total population of 1.52 million, almost 77% belong to ethnic minority groups, including Tujia, Bai and Miao nationalities. Zhangjiajie National Forest Park was established by the State Council in 1982 as the first National Forest Park of China. Wulingyuan in Zhangjiajie was listed into the World Natural Heritage Catalogue by the UNESCO in 1992 and appraised as a national scenic area. Zhangjiajie was awarded the title of "World Geological Park" in 2004. The amazing landscape here had been a source of creation of the CGI artist in the Avatar movie, and since the movie was released and achieved a great success, many tourists keeping coming to Zhangjiajie admiring this natural beauty.

With the rapid development of information technology, a large amount of data in various industries and fields is increasing explosively. Massive data has brought severe challenges to Cyberspace Security. Network security and informatization are major strategic issues related to national security, national development, and work and life of broad masses of all the people. In the network computing mode, if a cloud server is damaged, it will affect user services on a large scale. Malicious attacks and monitoring activities from the cloud server itself will also cause security and privacy risks in the processes of user services. In addition, lacking the capability of controlling over the computing environment directly will make it difficult for users to trust the services provided in the network computing environment. At present, trusted computing technology can ensure the security and credibility of computing resources at startup to a certain extent, but the security of network computing environment at runtime is difficult to be guaranteed. Therefore, in order to improve the performance of network computing and effectively reduce the security risk of the system, it is necessary to study new network computing models and key security technologies. The 11th International Symposium on Security and Privacy on the Internet of Things (SPIoT 2022), in Conjunction with UbiSec 2022 will be held at Zhangjiajie International Hotel during December 28 - 31, 2022, by the Institute of Trusted Computing, Guangzhou University, China ( http://trust. gzhu.edu.cn) . Experts, scholars and students related to trusted computing from educational and scientific research institutions at home and abroad are welcome to attend the workshop. The workshop will provide a platform for experts and scholars from educational and scientific research institutions to exchange ideas and results, so as to deeply explore future technological innovations.

The focus of SPIoT is on high-quality research papers about the state of the art in a wide range of IoT-related technologies:

- Security and privacy in heterogeneous IoT.
- Secure and Privacy Preserving Data Mining and Aggregation in IoT applications.
- Cross-domain trust management in smart networks.
- Secure authentication of IoT devices.
- MAC layer security protocols for the IoT applications.
- IoT security mechanisms targeting application layer protocols.
- Resource-savvy Intrusion Detection for Networks of Things.
- IoT-based malware mitigation.

Proceedings: All accepted papers will be published by Springer CCIS (Communications in Computer and Information Science) conference proceedings (indexed by Ei Compendex).


SUBMISSION and PUBLICATION INFORMATION
All presented papers in the conference will be published in the conference proceedings with Springer Communications in Computer and Information Science (CCIS). Papers must be clearly presented in English, must not exceed 14 pages in Springer CCIS format (or up to 20 pages with the pages over length charge), including tables, figures, references and appendices. Notice that accepted papers less than 12 pages will be tagged as Short Papers. Papers should be submitted through the EasyChair paper submission system at the conference website. Distinguished papers, after further revisions, will be considered for possible publication in SCI & EI indexed special issues of prestigious international journals. The program committee will select and give two or three "Best Paper Awards" for the conference. By submitting a paper to the conference, authors assure that if the paper is accepted, at least one author will attend the conference and present the paper.

Related Resources

ICISPP--Ei 2025   2025 6th International Conference on Information Security and Privacy Protection (ICISPP 2025)
IEEE BDAI 2025   IEEE--2025 the 8th International Conference on Big Data and Artificial Intelligence (BDAI 2025)
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
BIBC 2024   5th International Conference on Big Data, IOT and Blockchain
IEEE CSR 2025   2025 IEEE International Conference on Cyber Security and Resilience
ICIME--EI 2025   2025 13th International Conference on Information Management and Engineering (ICIME 2025)
ASIACCS 2025   The 20th ACM ASIA Conference on Computer and Communications Security - deadline 2
EEI 2024   10th International Conference on Emerging Trends in Electrical, Electronics & Instrumentation Engineering
ICISPP 2025   2025 6th International Conference on Information Security and Privacy Protection (ICISPP 2025)