posted by user: xiangyongliu || 784 views || tracked by 1 users: [display]

IWTC 2022 : The 7th International Workshop on Trusted Computing (IWTC 2022)

FacebookTwitterLinkedInGoogle

Link: http://ubisecurity.org/IWTC/2022/
 
When Nov 15, 2022 - Nov 18, 2022
Where Zhangjiajie, China
Submission Deadline Aug 15, 2022
Notification Due Sep 15, 2022
Final Version Due Oct 15, 2022
 

Call For Papers

Conferences Pivoting to a Part-Virtual Platform
[IWTC 2022] - Now Taking Place Part-Virtually
Due to the current COVID-19 situation, the IWTC 2022 conference will be a combination of online and offline event. For authors who consider to present their papers online, please pay a half of author registration fees for each paper and show this "Half Registration Fees" information in the "Remarks" field in the registration form; For attendees who will join the conference online, please pay a half of attendee registration fees and show this "Half Registration Fees" information in the "Remarks" field in the registration form. For questions, contact [csgjwang AT gzhu.edu.cn].

Call for Papers (CFPs) of The 7th International Workshop on Trusted Computing (IWTC 2022)

In Conjunction with
The Second International Conference on Ubiquitous Security (UbiSec 2022)
http://ubisecurity.org/2022/

Zhangjiajie, China, November 15 - 18, 2022

Organizer: Guangzhou University, China

http://ubisecurity.org/IWTC/2022/

======================================================================

Keynote Speeches Section

You are welcome to attend 5+ Keynote Speeches offerred by world-renowned professors and industry leaders. The detailed information will appear soon.

(1) Keynote 1: Prof. Richard Hill, University of Huddersfield, UK
Title: Next Generation Security for Cyber Physical Systems
https://pure.hud.ac.uk/en/persons/richard-hill

(2) Keynote 2: Prof. Tien N. Nguyen, University of Queensland, Australia
Title: Intelligent Software Vulnerability Detection
https://personal.utdallas.edu/~tien.n.nguyen/

(3) Keynote 3: Prof. Omer Rana, Cardiff University, UK
Title: Security-Aware Task Execution across the Edge-Cloud Continuum
https://www.cardiff.ac.uk/people/view/118157-rana-omer

(4) Keynote 4: Prof. Kouichi SAKURAI, Kyushu University, Japan
Title: State and Issues of Non-Fungible Token from Technical Point of View
https://hyoka.ofc.kyushu-u.ac.jp/search/details/K000220/english.html

(5) Keynote 5: Prof. Deqing Zou, Huazhong University of Science and Technology, China
Title: Achieving Scalability and Interpretability Simultaneously in Detecting Multi-granularity Vulnerabilities
http://faculty.hust.edu.cn/zoudeqing/zh_CN/index.htm

======================================================================

Invited Talks Section

You are welcome to attend 10+ Invited Talks offerred by world-renowned professors and industry leaders. The detailed information will appear soon.

(1) Prof. Arcangelo Castiglione, University of Salerno, Italy
Title: New Insights on Cryptographic Hierarchical Access Control: Models, Schemes, and Analysis
https://docenti.unisa.it/026260/en/home

(2) Prof. Scott Fowler, Linkoping University, Sweden
Title: Optimize Industrial IoT HVAC by using Machine Learning
https://liu.se/en/employee/scofo47, https://sites.google.com/site/scofo47

(3) Prof. Wenjun Jiang, Hunan University, China
Title: Online user analysis and learning optimization
http://csee.hnu.edu.cn/people/jiangwenjun

(4) Prof. Ryan Ko, University of Queensland, Australia
Title: Operational Technology (OT) and Supply Chain Cyber Security: The Storm Approaching Us
https://itee.uq.edu.au/profile/1409/ryan-ko

(5) Prof. Qin Liu, Hunan University, China
Title: Secure Search in Cloud Computing and Emerging Applications
https://qinliu-hnu.github.io/

(6) Prof. Sabu M. Thampi, Kerala University of Digital Sciences, Innovation and Technology (KUDSIT), India
Title: Security and Privacy Issues in the Internet of Drones
http://www.sabumthampi.in

(7) Prof. Tian Wang, Beijing Normal University, China
Title: Distributed Mobile Computation Offloading and Edge Intelligence
https://cist.bnu.edu.cn/xygk/szdw/zgj/104104.html

(8) Prof. Carlos Becker Westphall, Federal University of Santa Catarina, Brazil
Title: Mutual Authentication with Multi-factor and Hybrid Approach to Intrusion Detection in IoT-Fog-Cloud Environment
https://lrg.ufsc.br/westphal/

(9) Prof. Yulei Wu, University of Exeter, UK
Title: Trustworthiness of anomaly detection for IIoT
http://empslocal.ex.ac.uk/people/staff/yw433/

(10) Prof. Yang Xu, Hunan University, China
Title: Blockchain-enabled Cloud Security: Frameworks and Solutions
http://csee.hnu.edu.cn/people/xuyang
======================================================================

Panel Discussions Section

You are welcome to attend 2+ Panel Discussions offerred by world-renowned professors and industry leaders. The detailed information will appear soon.

======================================================================

Special Issues Section

Distinguished papers, after further revisions, will be published in 15+ SCI & EI indexed special issues.

Here is the list of Special Issues that we will recommend high-quality papers for possible publication*:

(1) IEICE Transactions on Information and Systems (SCI & EI Indexed, Impact Factor: 0.559)
Special Section on Blockchain and Security (Pending).

(2) Information Sciences (SCI & EI Indexed, Impact Factor: 6.795)
Special Issue on Decentralized Trust Management with Intelligence (Pending).

(3) Sensors (SCI & EI Indexed, Impact Factor: 3.576)
Special Issue on Fog/Edge Computing based Smart Sensing System
http://www.mdpi.com/journal/sensors/special_issues/FCSCS
Deadline for manuscript submissions: 31 March 2023.

(4) Sensors (SCI & EI Indexed, Impact Factor: 3.576)
Special Issue on Cyber Situational Awareness in Computer Networks
https://www.mdpi.com/journal/sensors/topical_collections/Cyber_Situational_Awareness
Deadline for manuscript submissions: 31 March 2023.

(5) Sensors (SCI & EI Indexed, Impact Factor: 3.576)
Special Issue on Security, Trust and Privacy in New Computing Environments
https://www.mdpi.com/journal/sensors/topical_collections/STPNCE
Deadline for manuscript submissions: 31 March 2023.

(6) Connection Science (SCI & EI Indexed, Impact Factor: 1.972)
https://www.tandfonline.com/ccos20
Some selected conference papers will be recommended for possible publication in regular issues of this journal, with a sufficient amount of new materials added into the journal version.
Deadline for manuscript submissions: 31 March 2023.

(7) Sensors (SCI & EI Indexed, Impact Factor: 3.576)
Special Issue on Cryptography and Security Protocol in Internet of Things
https://www.mdpi.com/journal/sensors/special_issues/CSPIOT
Deadline for manuscript submissions: 31 December 2022.

(8) Applied Sciences (SCI & EI Indexed, Impact Factor: 2.679)
Special Issue on Computational Methods for Next Generation Wireless and IoT Applications
https://www.mdpi.com/journal/applsci/special_issues/Generation_Wireless_IoT
Deadline for manuscript submissions: 31 December 2022.

(9) Sensors (SCI & EI Indexed, Impact Factor: 3.576)
Special Issue on Advanced Signal Processing and Human-Machine Interface for Healthcare Diagnostics and Bioengineering Applications
https://www.mdpi.com/journal/sensors/special_issues/advanced_signal_processing_HMI_healthcare_bioengineering
Deadline for manuscript submissions: 20 December 2022.

(10) Electronics (SCI & EI Indexed, Impact Factor: 2.397)
Special Issue on Cybersecurity and Privacy Issues in Cyber-Physical Systems and Industrial Control Systems
https://www.mdpi.com/journal/electronics/special_issues/cyber_industrial_control
Deadline for manuscript submissions: 25 November 2022.

(11) Sensors (SCI & EI Indexed, Impact Factor: 3.576)
Special Issue on Security and Privacy for Edge, Fog, and Cloud Computing; the Internet of Things and Mobile Crowdsensing
https://www.mdpi.com/journal/sensors/special_issues/SP_EFC
Deadline for manuscript submissions: 10 October 2022 (with possible extension later).

(12) International Journal of Computational Science and Engineering (IJCSE) (EI Indexed)
http://www.inderscience.com/browse/index.php?journalCODE=ijcse
Some selected conference papers will be recommended for possible publication in regular issues of this journal, with a sufficient amount of new materials added into the journal version.
Deadline for manuscript submissions: 31 March 2023.

(13) Distributed Ledger Technologies: Research and Practice (DLT) (EI Indexed)
Special Issue on Recent Advances of Blockchain Evolution: Architecture and Performance
https://dl.acm.org/pb-assets/static_journal_pages/dlt/pdf/DLT-SI-Recent-Advances-Blockchain-Evolution-1651176743000.pdf
Deadline for manuscript submissions: 15 December 2022.

(14) Acta Informatica Pragensia
Special Issue on Deep Learning Blockchain-enabled Technology for Improved Healthcare Industrial Systems
https://aip.vse.cz/corproof.php?tartkey=aip-000000-0305&fbclid=IwAR1veJzaaej8gw4TbdWNMYeUHacMjArQ4dJBa_GmxJDWcr1LUGI-ajR1apE
Deadline for manuscript submissions: 20 December 2022.

* More special issues will be available soon.

======================================================================

Welcome to participate in IWTC 2022, Zhangjiajie, China, November 15 - 18, 2022! Zhangjiajie is an emerging tourist destination famous for its unique natural scenery and abundant tourism resources. It is located in the northwest of Hunan province, about 400 kilometers away from Changsha, the capital of Hunan province, covering a total area of 9,516 square kilometers, of which 76% are mountainous area. Out of its total population of 1.52 million, almost 77% belong to ethnic minority groups, including Tujia, Bai and Miao nationalities. Zhangjiajie National Forest Park was established by the State Council in 1982 as the first National Forest Park of China. Wulingyuan in Zhangjiajie was listed into the World Natural Heritage Catalogue by the UNESCO in 1992 and appraised as a national AAAAA scenic area. Zhangjiajie was awarded the title of "World Geological Park" in 2004. The amazing landscape here had been a source of creation of the CGI artist in the Avatar movie, and since the movie was released and achieved a great success, many tourists keeping coming to Zhangjiajie admiring this natural beauty.

With the rapid development of information technology, a large amount of data in various industries and fields is increasing explosively. Massive data has brought severe challenges to Cyberspace Security. Network security and informatization are major strategic issues related to national security, national development, and work and life of broad masses of all the people. In the network computing mode, if a cloud server is damaged, it will affect user services on a large scale. Malicious attacks and monitoring activities from the cloud server itself will also cause security and privacy risks in the processes of user services. In addition, lacking the capability of controlling over the computing environment directly will make it difficult for users to trust the services provided in the network computing environment. At present, trusted computing technology can ensure the security and credibility of computing resources at startup to a certain extent, but the security of network computing environment at runtime is difficult to be guaranteed. Therefore, in order to improve the performance of network computing and effectively reduce the security risk of the system, it is necessary to study new network computing models and key security technologies. The 7th International Workshop on Trusted Computing (IWTC 2022), in Conjunction with UbiSec 2022 will be held at Zhangjiajie International Hotel during November 15-18, 2022, by the Institute of Trusted Computing, Guangzhou University, China (http://trust. gzhu.edu.cn) . Experts, scholars and students related to trusted computing from educational and scientific research institutions at home and abroad are welcome to attend the workshop. The workshop will provide a platform for experts and scholars from educational and scientific research institutions to exchange ideas and results, so as to deeply explore future technological innovations.

IWTC 2022 topics include, but are not limited to the following:

- Trustworthy data collection based on edge computing
- Trustworthy computing based on distributed intelligence
- Trustworthy computing software and hardware to secure networks and systems
- Trust issues in recommender systems
- Trust and privacy in social networking
- Trust and privacy in edge computing
- Trust and privacy in new network computing
- Trust evaluation mechanism
- Trust model training based on edge computing
- Secure and privacy computing based distributed learning
- Analysis of network and security protocols
- Intrusion and anomaly detection and prevention
- Automated security analysis of source code and binaries
- Automated security analysis of hardware designs and implementation
- New cryptographic protocols with real-world applications
- Anti-malware techniques: detection, analysis, and prevention
- Intrusion detection based on distributed learning
- Privacy and anonymity in networks and distributed systems
- Privacy preserving in recommender systems
- Privacy computing in a distributed environments
- Special problems and case studies (e.g., tradeoffs between security and efficiency, usability, cost, and ethics)
- Blockchain-based federated learning architecture
- Chain of trust building process
- Robust federated learning

IMPORTANT DATES
Paper Submission Deadline: August 15, 2022 (Extended)
Author Notification: September 15, 2022
Author Registration Due: October 15, 2022
Camera-Ready Paper Due: October 15, 2022
Conference Dates: November 15 - 18, 2022

SUBMISSION and PUBLICATION INFORMATION
All presented papers in the conference will be published in the conference proceedings with Springer Communications in Computer and Information Science (CCIS). Papers must be clearly presented in English, must not exceed 14 pages in Springer CCIS format (or up to 20 pages with the pages over length charge), including tables, figures, references and appendices. Notice that accepted papers less than 12 pages will be tagged as Short Papers. Papers should be submitted through the EasyChair paper submission system at the conference website. Distinguished papers, after further revisions, will be considered for possible publication in SCI & EI indexed special issues of prestigious international journals. The program committee will select and give two or three "Best Paper Awards" for the conference. By submitting a paper to the conference, authors assure that if the paper is accepted, at least one author will attend the conference and present the paper.

General Chairs
Tian Wang, Beijing Normal University, China
Shuhong Chen, Guangzhou University, China

Program Chairs
Qin Liu, Hunan University, China
Xiaofei Xing, Guangzhou University, China
Chalee Vorakulpipat, NECTEC, Thailand

Publicity Chairs
Tao Peng, Guangzhou University, China
Yannan Li, University of Wollongong, Australia
Xiangyong Liu, Guangzhou University, China
Md Redowan Mahmud, Curtin University, Australia

Publication Chairs
Tao Peng, Guangzhou University, China
Fang Qi, Central South University, China

Registration Chairs
Xiaofei Xing, Guangzhou University, China
Pin Liu, Central South University, China

Conference Secretariat
Wenyin Yang, Foshan University, China

Web Chairs
Ziwei Xiao, Foshan University, China
Jianguo Jiang, Foshan University, China

Steering Committee
Guojun Wang, Guangzhou University, China (Chair)
Ryan Ko, University of Queensland, Australia (Chair)
Richard Hill, University of Huddersfield, United Kingdom
Vimal Kumar, University of Waikato, New Zealand
Xuejia Lai, Shanghai Jiao Tong University, China
Kuan-Ching Li, Providence University, Taiwan
Zhoujun Li, Beihang University, China
Qin Liu, Hunan University, China
Tian Wang, Beijing Normal University, China
Miao Xie, AARNET, Australia
Zheng Yan, Xidian University, China/Aalto University, Finland
Yong Yu, Xi'an University of Posts & Telecommunications, China
Fengwei Zhang, Southern University of Science and Technology, China
Deqing Zou, Huazhong University of Science and Technology, China


Program Committee
Please check the "Program Committee" web page at the conference website for detail:
http://ubisecurity.org/IWTC/2022/


Contact

Please email inquiries concerning IWTC 2022 to Prof. Guojun Wang: csgjwang AT gmail DOT com and Conference Organizers: UbiSec2022 AT googlegroups.com.

Prof. Guojun Wang, Steering Committee Chair of IWTC 2022
http://trust.gzhu.edu.cn/faculty/~csgjwang/

--
***********************************************************************
Dr. Guojun Wang, Pearl River Scholarship Distinguished Professor
Director of Institute of Computer Networks,
School of Computer Science and Cyber Engineering,
Guangzhou University, Guangzhou, Guangdong Province,
P. R. China, 510006
Tel/Fax: +86-20-39366920, Mobile: +86-13360581866
Email: csgjwang AT gzhu.edu.cn
http://trust.gzhu.edu.cn/faculty/~csgjwang/
***********************************************************************

Related Resources

SPIE-Ei/Scopus-DMNLP 2025   2025 2nd International Conference on Data Mining and Natural Language Processing (DMNLP 2025)-EI Compendex&Scopus
ACM SAC 2025   40th ACM/SIGAPP Symposium On Applied Computing
ccpi 2025   16th International Workshop on Cloud-Edge Continuum Projects and Initiatives (CCPI)
CompAuto--EI 2025   2025 4th International Conference on Computers and Automation (CompAuto 2025)
WCSE--EI 2025   2025 The 15th International Workshop on Computer Science and Engineering (WCSE 2025)
MobiCASE 2025   16th EAI International Conference on Mobile Computing, Applications and Services
HPCCT 2025   2025 the 9th High Performance Computing and Cluster Technologies Conference (HPCCT 2025)--ESCI
SPIE-Ei/Scopus-CMLDS 2025   2025 2nd International Conference on Computing, Machine Learning and Data Science (CMLDS 2025) -EI Compendex & Scopus
IEEE CACML 2025   2025 4th Asia Conference on Algorithms, Computing and Machine Learning (CACML 2025)
ICFCC--EI 2025   2025 The 17th International Conference on Future Computer and Communication (ICFCC 2025)