Please accept our apologies if you receive multiple copies of UbiSec 2024
Preliminary CFPs with Deadline (July 15, 2024).
============================== UbiSec 2024 ==============================
Call for Papers (CFPs) of The 4th International Conference on Ubiquitous
Security (UbiSec 2024)
Changsha, China, December 29 - 31, 2024
Organizer:
Central South University, China
https://eur02.safelinks.protection.outlook.com/?url=http%3A%2F%2Fubisecurity.org%2F2024%2F&data=05%7C02%7C%7Caea85014ec0e4085b61e08dc6ef8a357%7Ccc7df24760ce4a0f9d75704cf60efc64%7C0%7C0%7C638507261676398457%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C40000%7C%7C%7C&sdata=S3hWTUtsJeaKBqnTP1m4q4qKNIplLF9acfTqi24ggeY%3D&reserved=0
======================================================================
Keynote Speeches Section
TBD.
======================================================================
Invited Talks Section
TBD.
======================================================================
Panel Discussions Section
TBD.
======================================================================
Special Issues Section
TBD.
======================================================================
Welcome to participate in UbiSec 2024, Changsha, China, December 29 - 31, 2024!
Changsha is a famous historical and cultural city with a variety of interest.
This city has been an important grain production base in China since ancient
times. The green and verdant Mt. Yuelu stands in the city and Xiangjiang River
is clear as a mirror passing through the city. Orange Isle lies in the heart of
the river. In particular, Changsha is very close to Chairman Mao's former
residence within one-hour driving. Nowadays, being an intellectual center,
Changsha has over 100 research institutions and engineering laboratories.
Hybrid rice breeding and the Tianhe supercomputer are the main scientific
research achievements.
The 4th International Conference on Ubiquitous Security (UbiSec 2024) stems
from three conference/symposium/workshop series:
(1) The well-established SpaCCS conference series with Springer LNCS: UbiSec is
inspired by the SpaCCS style of three tracks (Security, Privacy, and Anonymity,
"Spa" for short), which covers "Big Security" leveraging computation,
communication and storage ("CCS" for short) systems and networks. UbiSec
extends this style with three new tracks: Cyberspace Security, Cyberspace
Privacy, and Cyberspace Anonymity.
(2) The UbiSafe symposium series: UbiSec follows the UbiSafe vision on
"Ubiquitous Safety", also meaning that "YOU (will) BE SAFE" (pronounced
"UbiSafe"). UbiSec extends this vision to "Ubiquitous Security", using "Big
Security" to embrace NOT ONLY security, privacy and anonymity, BUT ALSO safety,
reliability, dependability, trustworthiness and more, also meaning that "YOU
(will) BE SEC(ure)" (pronounced "UbiSec").
(3) The IWCSS workshop series: UbiSec follows the IWCSS theme on "Cyberspace
Security", with "Cyberspace" as the 5th national sovereign space besides the
traditional four domains of land, sea, air, and aerospace. UbiSec extends this
theme to "Ubiquitous Security", meaning that cyberspace will be secure,
physical world will be secure, social networking systems will be secure, and
thus "YOU (will) BE SECure"!
The UbiSec 2024 Conference ("The Conference" for short) is the fourth event in
the series of conferences/symposia/workshops which are devoted to security,
privacy and anonymity in cyberspace, physical world, and social networks. The
Conference covers many dimensions including security algorithms and
architectures, privacy-aware policies, regulations and techniques, anonymous
computation and communication, encompassing fundamental theoretical approaches,
practical experimental projects, and commercial application systems for
cyberspace, physical world, and social networking systems. As applications of
computer and information technology have permeated in every aspect of our daily
life, the issues of security, privacy, and anonymity have become increasingly
critical. The Conference will provide a forum for world-class researchers to
gather and share their research achievements, emerging ideas and trends in the
highly challenging research fields.
UbiSec 2024 follows the UbiSec 2023 conference in Exeter, UbiSec 2022
conference in Zhangjiajie and the UbiSec 2021 in Guangzhou, and also the
traditions of previous successful SpaCCS/UbiSafe/IWCSS
conference/symposium/workshop series, held in Nanjing, China (SpaCCS
2020/UbiSafe 2020), Guangzhou,China (IWCSS 2020); Altanta, USA (SpaCCS
2019/UbiSafe 2019), Guangzhou, China (IWCSS 2019); Melbourne, Australia (SpaCCS
2018/UbiSafe 2018), Guangzhou China (IWCSS 2018); Guangzhou, China (SpaCCS
2017/UbiSafe 2017/IWCSS 2017); Zhangjiajie, China (SpaCCS 2016/UbiSafe 2016);
Helsinki, Finland (UbiSafe 2015); Beijing, China (UbiSafe 2014); Melbourne,
Australia (UbiSafe 2013); Liverpool, UK (UbiSafe 2012); Changsha, China
(UbiSafe 2011); Chengdu China (UbiSafe 2009); and Niagara Falls, Canada
(UbiSafe 2007). The conference aims at bringing together researchers and
practitioners in the world working in the research fields of security, privacy,
and anonymity aspects of computer systems and networks. The conference will
focus on broad areas of architectures, algorithms, techniques, and applications
for cyberspace security, cyberspace privacy, and cyberspace anonymity.
UbiSec 2024 topics include, but are not limited to the following:
Track 1: Cyberspace Security
--Security Model and Architecture
--Software and System Security
--Trustworthy Computing
--Security in Cloud/Fog/Edge Computing and Pervasive/Ubiquitous Computing
--Machine Learning and AI Security
--Network Security
--Attacks and Defenses
--Intrusion Detection and Prevention
--Security in Web Services
--Security in Mobile Social Networks
--Security in Internet of Things
--Fraud and Cyber Crime
--Accounting and Auditing
--Applied Cryptography
--Database Security
--Authentication
--Forensics and Diagnostics for Security
--Information Hiding
--Security in Big Data and its Applications
--Blockchain and Distributed System Security
--Security in Hardware, Side Channels, and CyberPhysical Systems
--Security in Formal Methods and Programming Languages
Track 2: Cyberspace Privacy
--Economics, Policies, Metrics, and Mechanisms of Privacy
--Privacy Modeling and Analysis
--Privacy-Preserving Computing
--Privacy-Preserving Data Mining
--Privacy-enhancing Technologies and Anonymity
--Privacy for the Internet of Things
--Privacy in Big Data and its Applications
--Privacy-Preserving in Blockchain
--Privacy-Preserving in Mobile Social Networks
--Privacy-Preserving Crowdsensing
--Privacy-Preserving Deep Learning
Track 3: Cyberspace Anonymity
--Anonymous Data Mining and Data Sharing
--Anonymous Management in Trust Relationships
--Anonymous Video Analytics Technology
--Anonymity Metrics, Measures and Evaluations
--Anonymity Models, Hardware/Device of Anonymity
--Anonymity in Wireless Communication Systems
--Anonymous Communication Protocols
--Anonymity in Mobile, Ad Hoc, and Wireless Sensor Networks
--Anonymous Communication and Internet
--Anonymous Social Networks, Structural k-Anonymity in Social Networks
--Authentication Protocol Providing User Anonymity
--Anonymous Information Storage and Management
--Private and Anonymous Data Storage
--Anonymity, Pseudonymity & Identity Management
--Anonymity in Big Data and Cloud Scenarios
--Anonymity in Health and Medical Databases
--Anonymity in Sensor-Cloud Systems
--Anonymity in Edge Computing
IMPORTANT DATES
Paper Submission Deadline: July 15, 2024
Author Notification: August 15, 2024
Author Registration Due: September 15, 2024
Camera-Ready Paper Due: September 15, 2024
Conference Dates: December 29 - 31, 2024
SUBMISSION and PUBLICATION INFORMATION
All presented papers in the conference will be published in the conference
proceedings with Springer Communications in Computer and Information Science
(CCIS). Papers must be clearly presented in English, must not exceed 14 pages
in Springer CCIS format (or up to 20 pages with the pages over length charge),
including tables, figures, references and appendices. Notice that accepted
papers less than 12 pages will be tagged as Short Papers. Papers should be
submitted through the EasyChair paper submission system at the conference
website. Distinguished papers, after further revisions, will be considered for
possible publication in SCI & EI indexed special issues of prestigious
international journals. The program committee will select and give two or three
"Best Paper Awards" for the conference. By submitting a paper to the
conference, authors assure that if the paper is accepted, at least one author
will attend the conference and present the paper.
Excecutive General Chair
Guojun Wang, Guangzhou University, China
General Chairs
Richard Hill, University of Huddersfield, United Kingdom
Tian Wang, Beijing Normal University, China
Guihua Duan, Central South University, China
Program Chairs
Guojun Wang, Guangzhou University, China
Zheng Yan, Xidian University, China
Kuan-Ching Li, Providence University, Taiwan
Yulei Wu, University of Bristol, United Kingdom
Program Vice Chairs
Track 1: Cyberspace Security
Tariq Alsboui, University of Huddersfield United, Kingdom
Muhammad Arif, Superior University Lahore, Pakistan
Zhitao Guan, North China Electric Power University, China
Qin Liu, Hunan University, China
Yuxiang Ma, Henan University, China
Junwei Zhou, Wuhan University of Technology, China
Track 2: Cyberspace Privacy
Saqib Ali, University of Agriculture Faisalabad, Pakistan
Bin Cao, Hebei University of Technology, China
Songwen Pei, University of Shanghai for Science and Technology, China
Asis Kumar Tripathy, VIT University, India
Zehua Wang, The University of British Columbia, Canada
Shigeng Zhang, Central South University, China
Track 3: Cyberspace Anonymity
Wenxiu Ding, Xidian University, China
Antonio Esposito, Università degli Studi della Campania Luigi Vanvitelli, Italy
Jiajia Jiao, Shanghai Maritime University, China
Florin Pop, Polytechnic University of Bucharest (UPB), Romania
Zhe Qu, Central South University, China
Guohua Tian, Xidian University, China
Publicity Chairs
Carlos Becker Westphall, Federal University of Santa Catarina, Brazil
Peter Mueller, IBM Zurich Research Laboratory, Switzerland
Scott Fowler, Linkoping University, Sweden
Xiangyong Liu, Guangzhou University, China
Wenjia Li, New York Institute of Technology, USA
Guanghui Feng, Guangzhou University, China
Registration Chair
Pin Liu, Central South University, China
Conference Secretariat
Wenyin Yang, Foshan University, China
Web Chairs
Yonglin Liu, Foshan University, China
Zhuoran Feng, Foshan University, China
Steering Committee
Guojun Wang, Guangzhou University, China (Chair)
Kim-Kwang Raymond Choo, University of Texas at San Antonio, USA (Chair)
Saqib Ali, University of Agriculture Faisalabad, Pakistan
Valentina E. Balas, Aurel Vlaicu University of Arad, Romania
Md Zakirul Alam Bhuiyan, Fordham University, USA
Jiannong Cao, The Hong Kong Polytechnic University, Hong Kong
Aniello Castiglione, University of Naples Parthenope, Italy
Scott Fowler, Linkoping University, Sweden
Oana Geman, University of Suceava, Romania
Richard Hill, University of Huddersfield, United Kingdom
Ryan Ko, University of Queensland, Australia
Kuan-Ching Li, Providence University, Taiwan
Jianhua Ma, Hosei University, Japan
Gregorio Martinez, University of Murcia, Spain
Geyong Min, University of Exeter, UK
Peter Mueller, IBM Zurich Research Laboratory, Switzerland
Kouichi Sakurai, Kyushu University, Japan
Sabu M. Thampi, Indian Institute of Information Technology and Management -
KeralaKerala University of Digital Sciences, Innovation and Technology
(KUDSIT), India
Carlos Becker Westphall, Federal University of Santa Catarina, Brazil
Jie Wu, Temple University, USA
Yang Xu, Hunan University, China
Zheng Yan, Xidian University, China/Aalto University, Finland
Wenyin Yang, Foshan University, China
Haojin Zhu, Shanghai Jiao Tong University, China
Program Committee
Please check the "Program Committee" web page at the conference website for
detail:
https://eur02.safelinks.protection.outlook.com/?url=http%3A%2F%2Fubisecurity.org%2F2024%2F&data=05%7C02%7C%7Caea85014ec0e4085b61e08dc6ef8a357%7Ccc7df24760ce4a0f9d75704cf60efc64%7C0%7C0%7C638507261676398457%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C40000%7C%7C%7C&sdata=S3hWTUtsJeaKBqnTP1m4q4qKNIplLF9acfTqi24ggeY%3D&reserved=0
Previous Proceedings
UbiSec 2023:
https://eur02.safelinks.protection.outlook.com/?url=https%3A%2F%2Flink.springer.com%2Fbook%2F10.1007%2F978-981-97-1274-8&data=05%7C02%7C%7Caea85014ec0e4085b61e08dc6ef8a357%7Ccc7df24760ce4a0f9d75704cf60efc64%7C0%7C0%7C638507261676554721%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C40000%7C%7C%7C&sdata=trPkRBdZniQAhUIa7XJpOT76zL2bRqwgu5g7CE6qmCY%3D&reserved=0
UbiSec 2022:
https://eur02.safelinks.protection.outlook.com/?url=https%3A%2F%2Flink.springer.com%2Fbook%2F10.1007%2F978-981-99-0272-9&data=05%7C02%7C%7Caea85014ec0e4085b61e08dc6ef8a357%7Ccc7df24760ce4a0f9d75704cf60efc64%7C0%7C0%7C638507261676554721%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C40000%7C%7C%7C&sdata=AO%2FUNDq1SilYeDbBFk%2BsyGNbPedQD4mENxTR8hGsmWY%3D&reserved=0
UbiSec 2021:
https://eur02.safelinks.protection.outlook.com/?url=https%3A%2F%2Flink.springer.com%2Fbook%2F10.1007%2F978-981-19-0468-4&data=05%7C02%7C%7Caea85014ec0e4085b61e08dc6ef8a357%7Ccc7df24760ce4a0f9d75704cf60efc64%7C0%7C0%7C638507261676554721%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C40000%7C%7C%7C&sdata=uQadvplahbzsZ0RInVgfUWGS%2BA6SAmqnoA9ybgZMkJI%3D&reserved=0
Contact
Please email inquiries concerning UbiSec 2024 to Prof. Guojun Wang: csgjwang
AT gmail DOT com and Conference Organizers: UbiSec2024 AT googlegroups.com.
Prof. Guojun Wang, Executive General Chair of UbiSec 2024
https://eur02.safelinks.protection.outlook.com/?url=http%3A%2F%2Ftrust.gzhu.edu.cn%2Ffaculty%2F~csgjwang%2F&data=05%7C02%7C%7Caea85014ec0e4085b61e08dc6ef8a357%7Ccc7df24760ce4a0f9d75704cf60efc64%7C0%7C0%7C638507261676554721%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C40000%7C%7C%7C&sdata=HKpWQVOj%2FXRxH3dmDlGp%2BaFqMs0zuUVlfCAuOmEGnyA%3D&reserved=0
***********************************************************************
Dr. Guojun Wang, Pearl River Scholarship Distinguished Professor
Director of Institute of Computer Networks,
School of Computer Science and Cyber Engineering,
Guangzhou University, Guangzhou, Guangdong Province,
P. R. China, 510006
Mobile: +86-13360581866
Email: csgjwang AT gzhu.edu.cn
https://eur02.safelinks.protection.outlook.com/?url=http%3A%2F%2Ftrust.gzhu.edu.cn%2Ffaculty%2F~csgjwang%2F&data=05%7C02%7C%7Caea85014ec0e4085b61e08dc6ef8a357%7Ccc7df24760ce4a0f9d75704cf60efc64%7C0%7C0%7C638507261676554721%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C40000%7C%7C%7C&sdata=HKpWQVOj%2FXRxH3dmDlGp%2BaFqMs0zuUVlfCAuOmEGnyA%3D&reserved=0
***********************************************************************
--
Dr. Qin Liu
College of Computer Science and Electronic Engineering
Hunan University
Changsha, Hunan Province,P.R. China, 410082
Mobile: +86-13548577157
Email: gracelq...@hnu.edu.cn; gracelq...@126.com
Homepage:
https://eur02.safelinks.protection.outlook.com/?url=https%3A%2F%2Fqinliu-hnu.github.io%2F&data=05%7C02%7C%7Caea85014ec0e4085b61e08dc6ef8a357%7Ccc7df24760ce4a0f9d75704cf60efc64%7C0%7C0%7C638507261676554721%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C40000%7C%7C%7C&sdata=N4rnR3wVQyWnX0YIyFWXzreDpjxzaTnO2Iw%2FwWaIPlo%3D&reserved=0
_______________________________________________
Om-announce mailing list
Om-announce@openmath.org
https://mailman.openmath.org/cgi-bin/mailman/listinfo/om-announce