posted by user: takujiromaru || 3558 views || tracked by 23 users: [display]

ASIACCS 2022 : ACM Symposium on Information, Computer and Communications Security

FacebookTwitterLinkedInGoogle


Conference Series : ACM Symposium on Information, Computer and Communications Security
 
Link: https://asiaccs2022.conferenceservice.jp/
 
When May 30, 2022 - Jun 3, 2022
Where Nagasaki, JAPAN
Submission Deadline TBD
 

Call For Papers

The 17th ACM ASIA Conference on Computer and Communications Security (ACM ASIACCS 2022) will be held in Nagasaki, Japan from May 30th to June 3rd, 2022. We solicit paper submissions on all technical aspects of information security and privacy, including systemization of knowledge (SoK) papers. Areas of interest include, but are not limited to:
- Access control
- Accounting and audit
- Applied cryptography
- Authentication
- Automotive security
- Big data security and privacy
- Biometrics
- Blockchain and alternatives
- Cloud computing security
- Computer forensics
- Cyber-physical system security
- Data and application security
- Edge computing security
- Embedded systems security
- Formal methods for security
- Hardware-based security and applications
- IoT security and privacy
- Key management
- Malware and botnets
- Mobile computing security
- Network security
- Operating system security
- Practical post-quantum security
- Privacy-enhancing technology
- Runtime attacks and defenses
- Secure computation
- Security architectures
- Security of critical infrastructures
- Security metrics
- Software security
- Threat modeling
- Trusted computing
- Usable security and privacy
- Web security

Technical papers submitted for ASIACCS are to be written in English. Papers must be in PDF format and at most 12 pages including bibliography with up to 3 additional pages for well-marked appendices. Note that appendices cannot exceed 3 pages even if the main text is less than 12 pages. Authors should prepare the submissions using the latest ACM Sigconf style conference template only (available at here). All fonts, images, tables and figures are required to comply with common standards and do not generate problems for reviewers. Titles of SoK papers must begin with “SoK:”. Submissions not meeting the formatting requirements risk rejection without consideration of their merits.

Authors when submitting the paper are required to declare the conflict of interest (COI) with the Program Committee members including the chairs. Those who are considered COI include (1) anyone who shares an institutional affiliation with an author of the paper at the time of submission, (2) anyone who was the advisor or advisee of an author at any time in the past, or (3) anyone the author has collaborated or published within the prior two years. PC members, including chairs that have a conflict of interest with a paper, will be entirely excluded from the evaluation of that paper. Failure of declaring COI, or declaring fake COI can lead to the paper being rejected. If a paper is reviewed by a PC member with COI, it will be rejected.

ASIACCS is employing a double-blind reviewing process.

All submissions should be appropriately anonymized. Author names and affiliations should not appear in the paper. The authors should avoid obvious self-references and should appropriately blind them if used. The list of authors cannot be changed after the acceptance decision is made unless approved by the Program Chairs.

Submissions to ASIACCS 2022 must not substantially overlap with papers that are published or simultaneously submitted to other venues (including journals or conferences/workshops). Double-submission will result in immediate rejection.

Detected violations may be reported to other conference chairs and journal editors.

The authors should take care of clarifying any potential ethical and legal concerns to their results, highly critical vulnerabilities or exploits, etc. The authors should provide evidence that they have thoroughly considered such issues.

The Program Committee reserves the right to reject a submission if insufficient evidence was presented that ethical or relevant legal concerns were appropriately addressed.

There will be no conventional rebuttal process. Papers that receive substantially negative initial reviews will be rejected early. The authors of early-rejected papers, and only such papers, will receive a copy of their initial reviews. Authors who substantively disagree with the reviews can appeal to the PC chairs within 72 hours upon receipt of the notification mail. Authors’ appeals must clearly and explicitly identify concrete disagreements with factual statements in the initial reviews that should be adjudicated by a special arbitration reviewer who may be recruited by the PC chairs. Appealing a submission that was rejected early will keep it under consideration, and it cannot be withdrawn or resubmitted elsewhere until the final notification of acceptance or rejection.

Rejected papers in the 1st round cannot be resubmitted in the 2nd round. A small number of the 1st round submissions may receive a Revise decision, rather than Accept or Reject, and may be revised and resubmitted to the November round together with the response to reviewers’ comments. The revision may include running additional experiments, improving the paper’s presentation, or other such improvements. Papers meeting the expectations will typically be accepted. Additional revisions will be requested only in exceptional circumstances.

If a paper is accepted, the author list in submission cannot be changed when preparing the camera-ready version. Authors of accepted papers must also guarantee that their papers will be presented at the conference. At least one author of the paper must be registered at the appropriate full conference rate.

General Chairs
Yuji Suga (IIJ, Japan)
Koichi Sakurai (Kyushu University, Japan)

Program Chairs
Xuhua Ding (Singapore Management University, Singapore)
Kazue Sako (Waseda University, Japan)

Related Resources

Federated Learning in IOT Cybersecurity 2021   PeerJ Computer Science - Federated Learning for Cybersecurity in Internet of Things
SECRYPT 2022   19th International Conference on Security and Cryptography
ICCCM--Ei and Scopus 2022   2022 The 10th International Conference on Computer and Communications Management (ICCCM 2022)--Scopus, Ei Compendex
IEEE--CCET--EI, Scopus 2022   IEEE--2022 5th International Conference on Computer and Communication Engineering Technology (CCET 2022)--Scopus, Ei Compendex
ICCCM--Ei Compendex and Scopus 2022   2022 The 10th International Conference on Computer and Communications Management (ICCCM 2022)--Scopus, Ei Compendex
NISecurity 2022   2022 International Conference on Network and Information Security (NISecurity 2022)
JMC 2022   JOURNAL OF MATHEMATICAL CRYPTOLOGY
IEEE COINS 2022   IEEE COINS 2022: Hybrid (3 days on-site | 2 days virtual)
ACM--ICDLT--Ei, Scopus 2022   ACM--2022 6th International Conference on Deep Learning Technologies (ICDLT 2022)--Ei Compendex, Scopus
GoodIT 2022   ACM International Conference on Information Technology for Social Good