posted by user: weichdtu || 5483 views || tracked by 16 users: [display]

CCS 2023 : 30th ACM Conference on Computer and Communications Security

FacebookTwitterLinkedInGoogle


Conference Series : Computer and Communications Security
 
Link: https://www.sigsac.org/ccs/CCS2023/call-for-paper.html
 
When Nov 26, 2023 - Nov 30, 2023
Where Copenhagen, Denmark
Submission Deadline May 4, 2023
Notification Due Jun 20, 2023
Categories    security
 

Call For Papers

-----------------------------------------------------------------------
Call for Papers - ACM CCS 2023
The 30th ACM Conference on
Computer and Communications Security
(ACM CCS 2023)
https://www.sigsac.org/ccs/CCS2023/
26-30 November 2023, Copenhagen, Denmark
-----------------------------------------------------------------------
Submission Deadline: 4 May 2023 (AoE)
-----------------------------------------------------------------------

The 30th ACM Conference on Computer and Communications Security (CCS)
seeks submissions presenting novel contributions related to all
real-world aspects of computer security and privacy. Theoretical papers
must make a convincing case for the relevance of their results to
practice. Authors are encouraged to write the abstract and introduction
of their paper in a way that makes the results accessible and
compelling to a general computer-security researcher. In particular,
authors should bear in mind that anyone on the program committee may
be asked to review any paper.


# CCS has two review cycles in 2023 #

For each submission, one of the following decisions will be made:

## Accept ##
Papers in this category will be accepted for publication in the
proceedings and presentation at the conference, possibly after making
minor changes with the oversight of a shepherd.

## Minor Revision ##
Papers in this category are considered to be promising but need some
minor additional work (e.g., minor experiments, proofs to minor lemmas).
Authors will be given the opportunity to resubmit such papers, with
appropriate revisions, in which case they should clearly explain in a
well-marked appendix how the revisions address the comments of the
reviewers. The revised paper will then be re-evaluated, and either
accepted or rejected.

## Reject ##
Papers in this category are declined for inclusion in the conference.
Papers rejected from the first review cycle may not be submitted again
(even in revised form) to the second review cycle.

Authors of each accepted paper must ensure that at least one author
registers for the conference, and that their paper is presented
in-person at the conference if at all possible.


# Important Dates #

- First Review Cycle:
- * 19 January, 2023 : Paper Submission Deadline
Submit at: https://ccs2023a.hotcrp.com
- * 17 March, 2023 : Author Notification
- Second Review Cycle:
- * 4 May, 2023 : Paper Submission Deadline
Submit at: https://ccs2023b.hotcrp.com
- * 3 June, 2023 : Early Reject Notification
- * 23 - 27 June, 2023 : Author Rebuttal
- * 28 June - 7 July, 2023 : Optional Reviewer-Author Interaction
- * 20 July, 2023 : Author Notification

Please Note: The official publication date is the date the proceedings
are made available in the ACM Digital Library. This date may be up to
two weeks prior to the first day of the conference. The official
publication date affects the deadline for any patent filings related to
published work.


# Paper Submission Information #

All submissions must be received by 11:59 PM AoE (UTC-12) on the day of
the corresponding deadline. Submitted papers must not substantially
overlap with papers that have been published or accepted for publication,
or that are simultaneously in submission to a journal, conference, or
workshop with published proceedings. All submissions should be properly
anonymized; papers not properly anonymized may be rejected without review.

All submitted papers will be evaluated based on their merits,
particularly their importance to practical aspects of computer and
communications security and privacy, novelty, quality of execution,
and presentation. For papers that might raise ethical concerns, authors
are expected to convince reviewers that proper procedures (such as IRB
approval or responsible disclosure) have been followed, and due diligence
has been made to minimize potential harm.

Submitted papers may be rejected for being out of scope, at the
discretion of the PC chairs. Authors who have questions about whether
their paper is in scope are encouraged to ask the PC chairs in advance.


# Paper Format #

Submissions must be a PDF file in double-column ACM format (see ACM
Proceedings Template[https://www.acm.org/publications/proceedings-template],
using the sigconf style), no more than 12 pages long, excluding the
bibliography, well-marked appendices, and supplementary material. Note
that reviewers are not required to read the appendices or any supplementary
material. Authors should not change the font or the margins of the
ACM format. Submissions not following the required format may be rejected
without review.


# Providing Artifacts at Submission Time #

Submissions whose claimed contributions rely on artifacts (e.g., code,
models, data sets) are expected to make these accessible to the reviewers,
unless there are good reasons not to, in which case these reasons must
be mentioned in the submission.

Submissions whose claimed contributions do not rely on artifacts do not
need to submit artifacts.


# (New !) Optional Artifact Evaluation #
A published scientific paper consists of a constellation of artifacts
that extend beyond the document itself: software, hardware, evaluation
data and documentation, raw survey results, mechanized proofs, models,
test suites, benchmarks, and so on. To emphasize the importance of such
artifacts, the benefits to the authors and the community as a whole,
and promote the reproducibility of experimental results, ACM CCS will,
for the first time, introduce an optional artifact evaluation (AE)
process, inspired by similar efforts at several other conferences.
All authors of accepted papers (including shepherd approved and minor
revisions) are encouraged to submit artifacts for AE.

Each artifact submitted will be reviewed by the Artifact Evaluation
Committee (AEC); a special call for artifacts will follow in early
January.


# Organisation #

General Chairs

- Weizhi Meng, Technical University of Denmark, DK
- Christian D. Jensen, Technical University of Denmark, DK

Program Chairs

- Cas Cremers, CISPA Helmholtz Center for Information Security, DE
- Engin Kirda, Khoury College of Computer Sciences, US

Program Committee
https://www.sigsac.org/ccs/CCS2023/orgs-program.html

Related Resources

IEEE-Ei/Scopus-ITCC 2025   2025 5th International Conference on Information Technology and Cloud Computing (ITCC 2025)-EI Compendex
SPIE-Ei/Scopus-DMNLP 2025   2025 2nd International Conference on Data Mining and Natural Language Processing (DMNLP 2025)-EI Compendex&Scopus
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
IEEE-Ei/Scopus-CWCBD 2025   2025 6th International Conference on Wireless Communications and Big Data (CWCBD 2025) -EI Compendex
MSEJ 2024   Advances in Materials Science and Engineering: An International Journal
MobiCASE 2025   16th EAI International Conference on Mobile Computing, Applications and Services
ACNS 2025   23rd International Conference on Applied Cryptography and Network Security - deadline 2
ICICSP 2025   2025 8th International Conference on Information Communication and Signal Processing (ICICSP 2025)
ICTC 2025   2025 6th Information Communication Technologies Conference (ICTC 2025)--SCI