| |||||||||||||||
WIFS 2016 : 8th IEEE International Workshop on Information Forensics and Security (WIFS) | |||||||||||||||
Link: http://www.wifs2016.org/ | |||||||||||||||
| |||||||||||||||
Call For Papers | |||||||||||||||
In its 2016 edition, the IEEE International Workshop on Information Forensics and Security will continue to adhere to its earlier established wide scope, covering various aspects of forensics and information security. We invite potential authors to submit articles on the following topics but will not be limited to only these.
Forensics: evidence recovery; evidence validation; media forensics; source attribution; incident response; and counter forensics Information and system security: authentication, vulnerability discovery/assessment; malware analysis; cyber-physical systems; mobile and intelligent devices; and physical layer fingerprinting Biometrics: new biometric modalities; pattern recognition; multimodal decision making; and feature extraction Multimedia content security: cryptography for multimedia; hashing; and data hiding Steganography and covert communications Hardware security: hardware trojans; PUFS; and anti-counterfeiting Network traffic analysis Surveillance: tracking; person (re-)identification; crowd analysis; and anti-surveillance and de-identification Sousvelliance and anti-sousveillance: users collecting data from other users instead of authorities; possibilities and risks.* Privacy in data analytics Privacy in the Internet of everything . Submission of Papers Prospective authors are invited to submit full-length, six-page papers, including figures and references. All submitted papers will go through double-blinded peer review process. The WIFS Technical Program Committee will select papers for the formal proceedings based on technical quality, relevance to the workshop, and ability to inspire new research. Accepted papers will be presented in either lecture tracks or poster sessions. Authors of the accepted papers are required to present their papers at the conference. For questions contact WIFS’16 Technical Program Chairs at tpc@wifs2016.org. Notice The IEEE Signal Processing Society enforces a “no-show” policy. Any accepted paper included in the final program is expected to have at least one author or qualified proxy attend and present the paper at the conference. Authors of the accepted papers included in the final program who do not attend the conference will be subscribed to a “no-show” list, compiled by the Society. The “no-show” papers will not be published by IEEE on IEEEXplore or other public access forums, but these papers will be distributed as part of the on-site electronic proceedings and the copyright of these papers will belong to the IEEE. . Tutorial Proposals Submission Up to four tutorials will be scheduled for the first day of the conference, Sunday December 4, 2016. Prospective tutorial contributors are encouraged to submit a tutorial proposal with the tutorial title, the presenters’ name, affiliation, and brief CV, along with the detailed structure of the tutorial to the Tutorials Chair at tutorials@wifs2016.org. Demo and Ongoing Work Proposals This session will provide both academic researchers and industrial exhibitors to showcase innovative implementations, systems and technologies demonstrating new ideas in the field. We encourage both the submission of early research prototypes and interesting mature systems. Formal proposals must be accompanied by a description of the work or demo to be presented. All material has to be submitted to the Demo Session Chair at demo@wifs2016.org. Submission of SPL and TIFS Papers Authors of IEEE Signal Processing Letters (SPL) and IEEE Transactions on Information Forensics and Security (TIFS) papers will be given the opportunity to present their work at WIFS 2015, subject to space availability and approval by the WIFS Technical Program Chairs. Proposals have to be submitted to the Technical Program Chairs at tpc@wifs2015.org. . . |
|