| |||||||||||||||
WIFS 2017 : IEEE International Workshop on Information Forensics and Security | |||||||||||||||
Link: http://wifs2017.org | |||||||||||||||
| |||||||||||||||
Call For Papers | |||||||||||||||
The IEEE international Workshop on Information Forensics and Security (WIFS) is the primary annual event organized by the IEEE Information Forensics and Security (IFS) Technical Committee with the technical sponsorship of the IEEE Biometrics Council. Its major objective is to bring together researchers from relevant disciplines to exchange new ideas and the latest results and to discuss emerging challenges in different areas of information security. The 9th edition of WIFS will be held in Rennes, France, from December 4 to December 7, 2017. WIFS 2017 will feature keynote lectures, tutorials, technical & special sessions, and also demo and ongoing work sessions.
*** Topics of interest include, but are not limited to: Forensics: Multimedia forensics | Counter Forensics | Acquisition Device Identification| Evidence Validation | Benchmarking Biometrics: Single or Multi-Modalities Systems | Security and Privacy | Spoofing | Performance Evaluation Security and Communication: Covert Channels | Physical Layer Security | Steganography | Secret Key Extraction | Digital Watermarking Multimedia Security: Broadcast encryption | Near duplicate detection | Data Hiding | Authentication | Forensics Information theoretic security: Differential Privacy | Adversarial Machine Learning | Game theory | Communication with Side Information Cybersecurity: Model and validation | Cloud Computing | Distributed Systems with Byzantines |Social Networks | Rumors and Alternative Facts Hardware security: New primitives |Phyisical Unclonable Functions | Anti-Counterfeiting | Side Channels Attacks | Forensics Surveillance: Tracking | Object / Person Detection | Behavior Analysis| Anti-Surveillance and De-identification | Privacy Network Security: Intrusion Detection | Protocols | Traffic Analysis | Anonymity | Mobile Ad-hoc Networks | Internet of Things Applied cryptography: Processing in the encrypted domain | Multiparty computation | traitor tracing | property preserving encryption *** Special Sessions - Physical Object Identification and Authentication, chaired by Slava Voloshynovskiy (University of Geneva, Switzerland) and Boris Škoric (Univ. of Technology Eindhoven, The Netherlands) - Social networks and user-generated content verification, chaired by Ewa Kijak (University of Rennes, France) and Vincent Claveau (CNRS / IRISA, France) Prospective authors are invited to submit full-length, six-page papers, including figures and references. All submitted papers will go through double-blinded peer review process. The WIFS Technical Program Committee will select papers for the formal proceedings based on technical quality, relevance to the workshop, and ability to inspire new research. Accepted papers will be presented in either lecture tracks or poster sessions. Authors of the accepted papers are required to present their papers at the conference. For all questions contact WIFS’17 Technical Program Chairs at tpc@wifs2017.org. Important! The IEEE Signal Processing Society enforces a “no-show” policy. Any accepted paper included in the final program is expected to have at least one author or qualified proxy attend and present the paper at the conference. Authors of the accepted papers included in the final program who do not attend the conference will be subscribed to a “no-show” list, compiled by the Society. The “no-show” papers will not be published by IEEE on IEEEXplore or other public access forums, but these papers will be distributed as part of the on-site electronic proceedings and the copyright of these papers will belong to the IEEE. |
|