posted by user: damlaoqi || 16898 views || tracked by 2 users: [display]

IIKI 2019 : 2019 8th INTERNATIONAL CONFERENCE ON IDENTIFICATION, INFORMATION & KNOWLEDGE IN THE INTERNET OF THINGS

FacebookTwitterLinkedInGoogle

Link: http://cst.bnu.edu.cn/IIKI2019/
 
When Oct 25, 2019 - Oct 27, 2019
Where Jinan, China
Submission Deadline Sep 15, 2019
Notification Due Sep 30, 2019
Categories    computer science   internet of things   network security   information science
 

Call For Papers

Realizing the full potential of the Internet of Things (IoT) requires solving technical and business challenges including the identification of things, the organization, integration and management of big data, and the effective use of knowledge-based decision systems. These challenges, and more, are the focus for the International Conference on Identification, Information and Knowledge in the Internet of Things (IIKI) international conference series.

IIKI 2019, the eighth conference in the series, provides a dedicated forum for international experts to discuss current trends, challenges, and state-of-the-art solutions in the Internet of Things.

Extended versions of invited papers from the conference will be published in major international peer-reviewed journals.

IMPORTANT DATES
- Paper Submission Deadline: Extended to September 15, 2019
- Paper Acceptance Notification: September 30, 2019
- Camera-ready Paper Submissions: TBD
- Conference Date: October 25-27, 2019

HOW TO SUBMIT
We encourage submission of full papers and position papers presenting novel ideas that may lead to insightful technical discussions.

Papers should contain original contributions that have not been published or submitted elsewhere, and references to related state-of-the-art research.

Please submit your papers at

https://www.easychair.org/conferences/?conf=iiki2019

Please contact Yunchuan Sun (iiki@bnu.edu.cn) for further inquiries.


CONFERENCE TRACKS
TRACK 1: KNOWLEDGE ENGINEERING, BIG DATA, AND CLOUD COMPUTING
CHAIRS: ANTON KOS ANDREJ.KOS@FE.UNI-LJ.SI
The Internet of Things, and of services and people, coupled with social networks means a huge increase in data. Analyzing Big Data will become a key focus of research, competition, and innovation in the IoT. Processing of Big Data will in the cloud, and data mining will use background knowledge of societal, cultural, and personal trends. Knowledge engineering for better data mining, new approaches to cloud computing for big data, and new paradigms for Big Data processing are key topics. The topics in this track include but are not limited to

Engineering of Big Data applications for smart cities
Parallel and distributed processing approaches in cloud computing
New algorithms for Big Data processing, and data mining for Big Data intelligence
Security and privacy in cloud computing and big data processing
Knowledge engineering for Big Data processing and cloud computing
Context awareness for mobile cloud/pervasive cloud, and Big Data processing
TRACK 2: WIRELESS AND MOBILE SECURITY
CHAIR: ZHIPENG CAI ZCAI@GSU.EDU XIUZHEN CHENG CHENG@GWU.EDU SHENGLING WANG WANGSHENGLING@BNU.EDU.CN
In recent years, advances in wireless and mobile technologies have dramatically changed our personal and working lives. Many challenges exist in wireless and mobile applications, particularly, security ensuring and privacy.. The goal of this track is to explore cutting-edge research in this area. Topics include but are not limited to

Trust in wireless and mobile networks
Intrusion prevention and detection in wireless and mobile networks
Security and privacy in wireless communications and mobile computing
Security and privacy in emerging applications
TRACK 3: FOG COMPUTING AND IOT SERVICES
CHAIR: ZHANGBING ZHOU ZHANGBING.ZHOU@GMAIL.COM
With the rapid development and wide adoption of the Internet of Things (IoT), traditional device-centric IoT is moving into a new era where ubiquitous IoT resources are encapsulated and represented in terms of smart IoT services. In this setting, IoT resources at a certain network region are dynamically integrated through innovative IoT services for the realization of the value of interconnected IoT resources and the satisfaction of (near) real-time, intelligent and local user demands, and consequently, for the promotion of IoT intelligence at the edge of the network. To address this challenge, this research track calls for submissions on the topics including, but are not limited to, the following:

Fog-based IoT and Service Management
Fog-based IoT and Business Process Management
Fog-based IoT Infrastructure and Framework
Fog-based IoT Data Management
Fog-based IoT Device and Resource Management
IoT-enabled Edge and Fog computing
Fog-based IoT Smart Home
Fog-cloud Interactions and Protocols
Security, Privacy and Trust in Fog Environment
Edge Resource Storage
Real-time Context -aware Fog Computing
Network Function Virtualization for Fog Computing in IoT
Load balancing and service selection in Fog Computing for IoT
TRACK 4: FRONTIERS IN CYBER-PHYSICAL SYSTEMS
CHAIRS: HOUBING SONG H.SONG@IEEE.ORG WENJIA LI WLI20@NYIT.EDU QINGHE DU DUQINGHE@MAIL.XJTU.EDU.CN
Cyber-physical systems (CPS) are engineered systems that are built from, and depend upon, the seamless integration of computational algorithms and physical components. Advances in CPS will enable capability, adaptability, scalability, resiliency, safety, security, and usability that will far exceed the simple embedded systems of today. CPS technology will transform the way people interact with engineered systems — just as the Internet has transformed the way people interact with information. New smart CPS will drive innovation and competition in sectors such as agriculture, energy, transportation, building design and automation, healthcare, and manufacturing. Work focused on theory, algorithms, implementation and field deployments will be of great interest to the track. Areas of interests include (but are not limited to)

Control, optimization, signal processing, information theory
Machine learning, verification, data mining,
Sensor networks, embedded systems, human in the loop systems, social networks,
Mobile computing, participatory sensing, crowd-sourcing, cloud computing
TRACK 5. BLOCKCHAIN, INTELLECTUAL PROPERTY, AND THE INTERNET OF THINGS
CHAIRS: YUAN GAO YUANGAO08@TSINGHUA.EDU.CN YUNCHUAN SUN YUNCH@BNU.EDU.CN RUIDONG ZHANG ZHANGR@UWEC.EDU
Blockchain, a form of Distributed Ledger Technology, has been gaining enormous attention in areas beyond its cryptocurrency roots since more or less 2014: blockchain and IoT (the Internet of Things), Blockchain And Intellectual Property, blockchain and security, blockchain and finance, blockchain and logistics. In this track, we are looking forward novel researches in blockchain and its related work in IoT. Some possible topics are listed below and not limited to the following items:

Knowledge Blockchain: conception and applications
Blockchain network structure in iot
Blockchain storage technology
Distributed sensing technology
Blockchain software architecture
Blockchain security and privacy
Blockchain resource allocation
Blockchain cross layer design
Blockchain applications in Intellectual Property
Case studies
TRACK 6: EHEALTH, MOBILE HEALTH, WELLBEING AND SPORT
CHAIRS: ANTON UMEK ANTON.UMEK@FE.UNI-LJ.SI JUNQI GUO GUOJUNQI@BNU.EDU.CN
“Big data” is endowing the traditional healthcare with mobility, intelligence and convenience, which has given birth to “E-Health & Mobile Health”. In such a mobile health environment, tasks like health monitoring of patients, information exchange between doctors and patients, intelligent diagnosis and information push, etc., can be automatically and rapidly accomplished by analyzing a large number of data collected from various mobile devices. However, such mobile applications face numerous challenges due to the voluminous data and complex procedures. Topics in this track include but are not limited to:

Advanced data mining technologies for E-Health & Mobile Health
Machine learning/Deep learning applications in E-Health & Mobile Health
Smart phone/wearable device based human motion recognition
Ubiquitous computing in personal health monitoring/architectural structure health monitoring
Emerging wireless/mobile applications in E-Health & Mobile Health
Advanced wireless telemedicine and e-health services
TRACK 7: ARTIFICIAL INTELLIGENCE AND INTERNET OF THINGS
CHAIRS: YU BAI YBAI@FULLERTON.EDU
TRACK PROGRAM COMMITTEE:
Dr. Yinjie Huang, Twitter, USA
Dr. Yu Bi, AMD, USA
Dr. Yanhui Guo, Shandong Woman University, China
Dr. Mohammed Alawad, Oak Ridge National Lab, USA
Dr. Xiaolong Guo, Kansas State University, USA
As The Internet of Things (IoT) continues to be envisioned as the most popular technology, the research of IoT has turned to how to drive value from IoT. While people have enjoyed a treasure trove of big data from IoT, the sheer volume of data being created by the IoT creates a big problem to analyze the deluge of data and information. Recently, the rapid development of artificial intelligence technology encounters great challenges as well as opportunities for IoT.
The proposed track provides the ground for emerging research ideas on how Artificial Intelligence (AI) can make a valuable contribution to solving problems that the Internet of Things. Contributions may come from diverse fields, including artificial intelligence; dependable computing; the Internet of Things; cyber-physical systems; mobile, wearable, and ubiquitous computing; ambient intelligence; architecture.
Original technical submissions on, but not limited to, the following topics are invited:

Artificial Intelligence and Machine Learning
Cloud computation for Internet-of-Things (IoT) devices
Systems for neural computing (including deep neural networks)
Secure IoT data transfer and storage
Security, Trust, Privacy and Identity in the IoT
Bio-inspired IoT and Big Data solutions, including the handling and analysis of data streams
Interactions between augmented humans and the pervasive computing environment, including intelligent assistants and the IoT (for example, smart cities, homes, and cars)
TRACK 8: WIRELESS DISTRIBUTED COMPUTING
CHAIRS: JIGUO YU JIGUOYU@SINA.COM DONGXIAO YU DXYU@HUST.EDU.CN DEYING LI DEYINGLI@RUC.EDU.CN
With the development of wireless communications and networking, various communication models, interference models and channel models appeared, which lead to the effect that algorithmic design becomes more and more important and challenging. On the other hand, for the well-known reasons, centralized algorithms may not be the best choice to implement in large-scale wireless and heterogeneous networks, especially for the IoT, and distributed solutions are more desirable and appealing. Therefore, it is necessary to pay more efforts on designing distributed algorithms and protocols for solving problems from all layers of wireless networks. Areas of interest in this track include all the following aspects in wireless networks (but are not limited to)

Topology control
Scheduling and capacity
Information dissemination and aggregation
Media access control
Communication reliability and security
Interference and signal fading models
TRACK 9. ELECTROMAGNETIC AND OPTICAL SENSING
CHAIRS: JIE GAO 11694820@QQ.COM
As the wide application of information technology in the military and civil fields, information superiority has become the key factor to determine the outcome of all kinds of competition. Electromagnetic and optical sensing of target and environment, and the corresponding processing and analysis techniques are playing an increasingly important role. Therefore, the data acquisition of electromagnetic and optical characteristics, data analysis and database construction will become the key topics. The topics in this track includes but not limited to:

Electromagnetic and optical characteristics measuring
Electromagnetic and optical characteristics modeling
Calibration technique
Target recognition technique
Data processing technique
Database constructions
TRACK 10: UBIQUITOUS SENSING AND INTELLIGENT MEDIA
CHAIRS: JUNYU DONG DONGJUNYU@OUC.EDU.CN XIANGWEI ZHENG SDNUZXW@126.COM DA YUAN YDCCEC@126.COM
Ubiquitous Sensing and Intelligent Media, including environment sensing, Internet of Things (IoT), data or multimedia acquisition, intelligent media processing, harmonious human-computer interaction and pervasive computing have attracted huge interests from researchers. Accordingly, there are a variety of potential application in Ubiquitous Sensing and Intelligent Media. The aim of this track is to survey a state of art of methodologies, algorithms and systems in advanced research into Ubiquitous Sensing and Intelligent Media, which may involve any types of media data such as visual (including 2D, 3D and RGB data), audial, Electroencephalography (EEG)/MRI/CT and touch sensory data etc.

Methods for intelligent information processing/computing: computer vision, graphics, visualization, visual analysis, multimedia storage &editing, multimedia coding and retrieval, object recognition and synthesis of audio and audio, multimedia universal access, etc.
Methods for harmonious human-computer interaction: intelligent sensing, emotional computing, voice interaction, large-scale surface interaction, brain-computer interface, wear interaction, interaction efficiency and optimization, social network, etc.
Methods for pervasive computing environment: Internet of Things, pervasive computing mode, active services, embedded systems, situational awareness, smart space, home gateway, etc.
Systems/applications meeting various practical needs with novel technologies in machine perception and intelligent media.
TRACK 11: DATA STORAGE SECURITY IN CLOUD COMPUTING
CHAIRS: JIAN SHEN S_SHENJIAN@126.COM
The security issues have become a huge impediment to the development of cloud computing. Due to the specific characteristics such as virtualization, multi-tenant and cross domain sharing of the data and services, the cloud environment faces more complicated threats compared to traditional information environment. All walks of life are facing the risk of information leakage, which means data security is suffering great challenges, and the security of the data storage in cloud computing needs to be ensured. Therefore, it is crucial to study on the data storage security in cloud computing. The topics in this track includes but not limited to:

Identity authentication of data users in cloud
Data access control in cloud environment
Encrypted search of the cloud data
Efficient data auditing in cloud computing
Secure data sharing in cloud environment
Key agreement and key management in cloud data sharing
Secure multiparty computation in cloud computing

Related Resources

IEEE-Ei/Scopus-CNIOT 2025   2025 IEEE 6th International Conference on Computing, Networks and Internet of Things (CNIOT 2025) -EI Compendex
IEEE-Ei/Scopus-ITCC 2025   2025 5th International Conference on Information Technology and Cloud Computing (ITCC 2025)-EI Compendex
IEEE BDAI 2025   IEEE--2025 the 8th International Conference on Big Data and Artificial Intelligence (BDAI 2025)
SPIE-Ei/Scopus-DMNLP 2025   2025 2nd International Conference on Data Mining and Natural Language Processing (DMNLP 2025)-EI Compendex&Scopus
ICIME--EI 2025   2025 13th International Conference on Information Management and Engineering (ICIME 2025)
BDE--EI 2025   2025 7th International Conference on Big Data Engineering (BDE 2025)
SPIE-Ei/Scopus-CMLDS 2025   2025 2nd International Conference on Computing, Machine Learning and Data Science (CMLDS 2025) -EI Compendex & Scopus
Ei/Scopus-ACAI 2024   2024 7th International Conference on Algorithms, Computing and Artificial Intelligence(ACAI 2024)
KES 2025   29th International Conference on Knowledge-Based and Intelligent Information & Engineering Systems
NMCO 2025   11th International Conference on Networks, Mobile Communication