| |||||||||||||
IIKI 2019 : 2019 8th INTERNATIONAL CONFERENCE ON IDENTIFICATION, INFORMATION & KNOWLEDGE IN THE INTERNET OF THINGS | |||||||||||||
Link: http://cst.bnu.edu.cn/IIKI2019/ | |||||||||||||
| |||||||||||||
Call For Papers | |||||||||||||
Realizing the full potential of the Internet of Things (IoT) requires solving technical and business challenges including the identification of things, the organization, integration and management of big data, and the effective use of knowledge-based decision systems. These challenges, and more, are the focus for the International Conference on Identification, Information and Knowledge in the Internet of Things (IIKI) international conference series.
IIKI 2019, the eighth conference in the series, provides a dedicated forum for international experts to discuss current trends, challenges, and state-of-the-art solutions in the Internet of Things. Extended versions of invited papers from the conference will be published in major international peer-reviewed journals. IMPORTANT DATES - Paper Submission Deadline: Extended to September 15, 2019 - Paper Acceptance Notification: September 30, 2019 - Camera-ready Paper Submissions: TBD - Conference Date: October 25-27, 2019 HOW TO SUBMIT We encourage submission of full papers and position papers presenting novel ideas that may lead to insightful technical discussions. Papers should contain original contributions that have not been published or submitted elsewhere, and references to related state-of-the-art research. Please submit your papers at https://www.easychair.org/conferences/?conf=iiki2019 Please contact Yunchuan Sun (iiki@bnu.edu.cn) for further inquiries. CONFERENCE TRACKS TRACK 1: KNOWLEDGE ENGINEERING, BIG DATA, AND CLOUD COMPUTING CHAIRS: ANTON KOS ANDREJ.KOS@FE.UNI-LJ.SI The Internet of Things, and of services and people, coupled with social networks means a huge increase in data. Analyzing Big Data will become a key focus of research, competition, and innovation in the IoT. Processing of Big Data will in the cloud, and data mining will use background knowledge of societal, cultural, and personal trends. Knowledge engineering for better data mining, new approaches to cloud computing for big data, and new paradigms for Big Data processing are key topics. The topics in this track include but are not limited to Engineering of Big Data applications for smart cities Parallel and distributed processing approaches in cloud computing New algorithms for Big Data processing, and data mining for Big Data intelligence Security and privacy in cloud computing and big data processing Knowledge engineering for Big Data processing and cloud computing Context awareness for mobile cloud/pervasive cloud, and Big Data processing TRACK 2: WIRELESS AND MOBILE SECURITY CHAIR: ZHIPENG CAI ZCAI@GSU.EDU XIUZHEN CHENG CHENG@GWU.EDU SHENGLING WANG WANGSHENGLING@BNU.EDU.CN In recent years, advances in wireless and mobile technologies have dramatically changed our personal and working lives. Many challenges exist in wireless and mobile applications, particularly, security ensuring and privacy.. The goal of this track is to explore cutting-edge research in this area. Topics include but are not limited to Trust in wireless and mobile networks Intrusion prevention and detection in wireless and mobile networks Security and privacy in wireless communications and mobile computing Security and privacy in emerging applications TRACK 3: FOG COMPUTING AND IOT SERVICES CHAIR: ZHANGBING ZHOU ZHANGBING.ZHOU@GMAIL.COM With the rapid development and wide adoption of the Internet of Things (IoT), traditional device-centric IoT is moving into a new era where ubiquitous IoT resources are encapsulated and represented in terms of smart IoT services. In this setting, IoT resources at a certain network region are dynamically integrated through innovative IoT services for the realization of the value of interconnected IoT resources and the satisfaction of (near) real-time, intelligent and local user demands, and consequently, for the promotion of IoT intelligence at the edge of the network. To address this challenge, this research track calls for submissions on the topics including, but are not limited to, the following: Fog-based IoT and Service Management Fog-based IoT and Business Process Management Fog-based IoT Infrastructure and Framework Fog-based IoT Data Management Fog-based IoT Device and Resource Management IoT-enabled Edge and Fog computing Fog-based IoT Smart Home Fog-cloud Interactions and Protocols Security, Privacy and Trust in Fog Environment Edge Resource Storage Real-time Context -aware Fog Computing Network Function Virtualization for Fog Computing in IoT Load balancing and service selection in Fog Computing for IoT TRACK 4: FRONTIERS IN CYBER-PHYSICAL SYSTEMS CHAIRS: HOUBING SONG H.SONG@IEEE.ORG WENJIA LI WLI20@NYIT.EDU QINGHE DU DUQINGHE@MAIL.XJTU.EDU.CN Cyber-physical systems (CPS) are engineered systems that are built from, and depend upon, the seamless integration of computational algorithms and physical components. Advances in CPS will enable capability, adaptability, scalability, resiliency, safety, security, and usability that will far exceed the simple embedded systems of today. CPS technology will transform the way people interact with engineered systems — just as the Internet has transformed the way people interact with information. New smart CPS will drive innovation and competition in sectors such as agriculture, energy, transportation, building design and automation, healthcare, and manufacturing. Work focused on theory, algorithms, implementation and field deployments will be of great interest to the track. Areas of interests include (but are not limited to) Control, optimization, signal processing, information theory Machine learning, verification, data mining, Sensor networks, embedded systems, human in the loop systems, social networks, Mobile computing, participatory sensing, crowd-sourcing, cloud computing TRACK 5. BLOCKCHAIN, INTELLECTUAL PROPERTY, AND THE INTERNET OF THINGS CHAIRS: YUAN GAO YUANGAO08@TSINGHUA.EDU.CN YUNCHUAN SUN YUNCH@BNU.EDU.CN RUIDONG ZHANG ZHANGR@UWEC.EDU Blockchain, a form of Distributed Ledger Technology, has been gaining enormous attention in areas beyond its cryptocurrency roots since more or less 2014: blockchain and IoT (the Internet of Things), Blockchain And Intellectual Property, blockchain and security, blockchain and finance, blockchain and logistics. In this track, we are looking forward novel researches in blockchain and its related work in IoT. Some possible topics are listed below and not limited to the following items: Knowledge Blockchain: conception and applications Blockchain network structure in iot Blockchain storage technology Distributed sensing technology Blockchain software architecture Blockchain security and privacy Blockchain resource allocation Blockchain cross layer design Blockchain applications in Intellectual Property Case studies TRACK 6: EHEALTH, MOBILE HEALTH, WELLBEING AND SPORT CHAIRS: ANTON UMEK ANTON.UMEK@FE.UNI-LJ.SI JUNQI GUO GUOJUNQI@BNU.EDU.CN “Big data” is endowing the traditional healthcare with mobility, intelligence and convenience, which has given birth to “E-Health & Mobile Health”. In such a mobile health environment, tasks like health monitoring of patients, information exchange between doctors and patients, intelligent diagnosis and information push, etc., can be automatically and rapidly accomplished by analyzing a large number of data collected from various mobile devices. However, such mobile applications face numerous challenges due to the voluminous data and complex procedures. Topics in this track include but are not limited to: Advanced data mining technologies for E-Health & Mobile Health Machine learning/Deep learning applications in E-Health & Mobile Health Smart phone/wearable device based human motion recognition Ubiquitous computing in personal health monitoring/architectural structure health monitoring Emerging wireless/mobile applications in E-Health & Mobile Health Advanced wireless telemedicine and e-health services TRACK 7: ARTIFICIAL INTELLIGENCE AND INTERNET OF THINGS CHAIRS: YU BAI YBAI@FULLERTON.EDU TRACK PROGRAM COMMITTEE: Dr. Yinjie Huang, Twitter, USA Dr. Yu Bi, AMD, USA Dr. Yanhui Guo, Shandong Woman University, China Dr. Mohammed Alawad, Oak Ridge National Lab, USA Dr. Xiaolong Guo, Kansas State University, USA As The Internet of Things (IoT) continues to be envisioned as the most popular technology, the research of IoT has turned to how to drive value from IoT. While people have enjoyed a treasure trove of big data from IoT, the sheer volume of data being created by the IoT creates a big problem to analyze the deluge of data and information. Recently, the rapid development of artificial intelligence technology encounters great challenges as well as opportunities for IoT. The proposed track provides the ground for emerging research ideas on how Artificial Intelligence (AI) can make a valuable contribution to solving problems that the Internet of Things. Contributions may come from diverse fields, including artificial intelligence; dependable computing; the Internet of Things; cyber-physical systems; mobile, wearable, and ubiquitous computing; ambient intelligence; architecture. Original technical submissions on, but not limited to, the following topics are invited: Artificial Intelligence and Machine Learning Cloud computation for Internet-of-Things (IoT) devices Systems for neural computing (including deep neural networks) Secure IoT data transfer and storage Security, Trust, Privacy and Identity in the IoT Bio-inspired IoT and Big Data solutions, including the handling and analysis of data streams Interactions between augmented humans and the pervasive computing environment, including intelligent assistants and the IoT (for example, smart cities, homes, and cars) TRACK 8: WIRELESS DISTRIBUTED COMPUTING CHAIRS: JIGUO YU JIGUOYU@SINA.COM DONGXIAO YU DXYU@HUST.EDU.CN DEYING LI DEYINGLI@RUC.EDU.CN With the development of wireless communications and networking, various communication models, interference models and channel models appeared, which lead to the effect that algorithmic design becomes more and more important and challenging. On the other hand, for the well-known reasons, centralized algorithms may not be the best choice to implement in large-scale wireless and heterogeneous networks, especially for the IoT, and distributed solutions are more desirable and appealing. Therefore, it is necessary to pay more efforts on designing distributed algorithms and protocols for solving problems from all layers of wireless networks. Areas of interest in this track include all the following aspects in wireless networks (but are not limited to) Topology control Scheduling and capacity Information dissemination and aggregation Media access control Communication reliability and security Interference and signal fading models TRACK 9. ELECTROMAGNETIC AND OPTICAL SENSING CHAIRS: JIE GAO 11694820@QQ.COM As the wide application of information technology in the military and civil fields, information superiority has become the key factor to determine the outcome of all kinds of competition. Electromagnetic and optical sensing of target and environment, and the corresponding processing and analysis techniques are playing an increasingly important role. Therefore, the data acquisition of electromagnetic and optical characteristics, data analysis and database construction will become the key topics. The topics in this track includes but not limited to: Electromagnetic and optical characteristics measuring Electromagnetic and optical characteristics modeling Calibration technique Target recognition technique Data processing technique Database constructions TRACK 10: UBIQUITOUS SENSING AND INTELLIGENT MEDIA CHAIRS: JUNYU DONG DONGJUNYU@OUC.EDU.CN XIANGWEI ZHENG SDNUZXW@126.COM DA YUAN YDCCEC@126.COM Ubiquitous Sensing and Intelligent Media, including environment sensing, Internet of Things (IoT), data or multimedia acquisition, intelligent media processing, harmonious human-computer interaction and pervasive computing have attracted huge interests from researchers. Accordingly, there are a variety of potential application in Ubiquitous Sensing and Intelligent Media. The aim of this track is to survey a state of art of methodologies, algorithms and systems in advanced research into Ubiquitous Sensing and Intelligent Media, which may involve any types of media data such as visual (including 2D, 3D and RGB data), audial, Electroencephalography (EEG)/MRI/CT and touch sensory data etc. Methods for intelligent information processing/computing: computer vision, graphics, visualization, visual analysis, multimedia storage &editing, multimedia coding and retrieval, object recognition and synthesis of audio and audio, multimedia universal access, etc. Methods for harmonious human-computer interaction: intelligent sensing, emotional computing, voice interaction, large-scale surface interaction, brain-computer interface, wear interaction, interaction efficiency and optimization, social network, etc. Methods for pervasive computing environment: Internet of Things, pervasive computing mode, active services, embedded systems, situational awareness, smart space, home gateway, etc. Systems/applications meeting various practical needs with novel technologies in machine perception and intelligent media. TRACK 11: DATA STORAGE SECURITY IN CLOUD COMPUTING CHAIRS: JIAN SHEN S_SHENJIAN@126.COM The security issues have become a huge impediment to the development of cloud computing. Due to the specific characteristics such as virtualization, multi-tenant and cross domain sharing of the data and services, the cloud environment faces more complicated threats compared to traditional information environment. All walks of life are facing the risk of information leakage, which means data security is suffering great challenges, and the security of the data storage in cloud computing needs to be ensured. Therefore, it is crucial to study on the data storage security in cloud computing. The topics in this track includes but not limited to: Identity authentication of data users in cloud Data access control in cloud environment Encrypted search of the cloud data Efficient data auditing in cloud computing Secure data sharing in cloud environment Key agreement and key management in cloud data sharing Secure multiparty computation in cloud computing |
|