| |||||||||||||
IWTC 2022 : The 7th International Workshop on Trusted Computing (IWTC 2022) | |||||||||||||
Link: http://ubisecurity.org/IWTC/2022/ | |||||||||||||
| |||||||||||||
Call For Papers | |||||||||||||
Conferences Pivoting to a Part-Virtual Platform
[IWTC 2022] - Now Taking Place Part-Virtually Due to the current COVID-19 situation, the IWTC 2022 conference will be a combination of online and offline event. For authors who consider to present their papers online, please pay a half of author registration fees for each paper and show this "Half Registration Fees" information in the "Remarks" field in the registration form; For attendees who will join the conference online, please pay a half of attendee registration fees and show this "Half Registration Fees" information in the "Remarks" field in the registration form. For questions, contact [csgjwang AT gzhu.edu.cn]. Call for Papers (CFPs) of The 7th International Workshop on Trusted Computing (IWTC 2022) In Conjunction with The Second International Conference on Ubiquitous Security (UbiSec 2022) http://ubisecurity.org/2022/ Zhangjiajie, China, November 15 - 18, 2022 Organizer: Guangzhou University, China http://ubisecurity.org/IWTC/2022/ ====================================================================== Keynote Speeches Section You are welcome to attend 5+ Keynote Speeches offerred by world-renowned professors and industry leaders. The detailed information will appear soon. (1) Keynote 1: Prof. Richard Hill, University of Huddersfield, UK Title: Next Generation Security for Cyber Physical Systems https://pure.hud.ac.uk/en/persons/richard-hill (2) Keynote 2: Prof. Tien N. Nguyen, University of Queensland, Australia Title: Intelligent Software Vulnerability Detection https://personal.utdallas.edu/~tien.n.nguyen/ (3) Keynote 3: Prof. Omer Rana, Cardiff University, UK Title: Security-Aware Task Execution across the Edge-Cloud Continuum https://www.cardiff.ac.uk/people/view/118157-rana-omer (4) Keynote 4: Prof. Kouichi SAKURAI, Kyushu University, Japan Title: State and Issues of Non-Fungible Token from Technical Point of View https://hyoka.ofc.kyushu-u.ac.jp/search/details/K000220/english.html (5) Keynote 5: Prof. Deqing Zou, Huazhong University of Science and Technology, China Title: Achieving Scalability and Interpretability Simultaneously in Detecting Multi-granularity Vulnerabilities http://faculty.hust.edu.cn/zoudeqing/zh_CN/index.htm ====================================================================== Invited Talks Section You are welcome to attend 10+ Invited Talks offerred by world-renowned professors and industry leaders. The detailed information will appear soon. (1) Prof. Arcangelo Castiglione, University of Salerno, Italy Title: New Insights on Cryptographic Hierarchical Access Control: Models, Schemes, and Analysis https://docenti.unisa.it/026260/en/home (2) Prof. Scott Fowler, Linkoping University, Sweden Title: Optimize Industrial IoT HVAC by using Machine Learning https://liu.se/en/employee/scofo47, https://sites.google.com/site/scofo47 (3) Prof. Wenjun Jiang, Hunan University, China Title: Online user analysis and learning optimization http://csee.hnu.edu.cn/people/jiangwenjun (4) Prof. Ryan Ko, University of Queensland, Australia Title: Operational Technology (OT) and Supply Chain Cyber Security: The Storm Approaching Us https://itee.uq.edu.au/profile/1409/ryan-ko (5) Prof. Qin Liu, Hunan University, China Title: Secure Search in Cloud Computing and Emerging Applications https://qinliu-hnu.github.io/ (6) Prof. Sabu M. Thampi, Kerala University of Digital Sciences, Innovation and Technology (KUDSIT), India Title: Security and Privacy Issues in the Internet of Drones http://www.sabumthampi.in (7) Prof. Tian Wang, Beijing Normal University, China Title: Distributed Mobile Computation Offloading and Edge Intelligence https://cist.bnu.edu.cn/xygk/szdw/zgj/104104.html (8) Prof. Carlos Becker Westphall, Federal University of Santa Catarina, Brazil Title: Mutual Authentication with Multi-factor and Hybrid Approach to Intrusion Detection in IoT-Fog-Cloud Environment https://lrg.ufsc.br/westphal/ (9) Prof. Yulei Wu, University of Exeter, UK Title: Trustworthiness of anomaly detection for IIoT http://empslocal.ex.ac.uk/people/staff/yw433/ (10) Prof. Yang Xu, Hunan University, China Title: Blockchain-enabled Cloud Security: Frameworks and Solutions http://csee.hnu.edu.cn/people/xuyang ====================================================================== Panel Discussions Section You are welcome to attend 2+ Panel Discussions offerred by world-renowned professors and industry leaders. The detailed information will appear soon. ====================================================================== Special Issues Section Distinguished papers, after further revisions, will be published in 15+ SCI & EI indexed special issues. Here is the list of Special Issues that we will recommend high-quality papers for possible publication*: (1) IEICE Transactions on Information and Systems (SCI & EI Indexed, Impact Factor: 0.559) Special Section on Blockchain and Security (Pending). (2) Information Sciences (SCI & EI Indexed, Impact Factor: 6.795) Special Issue on Decentralized Trust Management with Intelligence (Pending). (3) Sensors (SCI & EI Indexed, Impact Factor: 3.576) Special Issue on Fog/Edge Computing based Smart Sensing System http://www.mdpi.com/journal/sensors/special_issues/FCSCS Deadline for manuscript submissions: 31 March 2023. (4) Sensors (SCI & EI Indexed, Impact Factor: 3.576) Special Issue on Cyber Situational Awareness in Computer Networks https://www.mdpi.com/journal/sensors/topical_collections/Cyber_Situational_Awareness Deadline for manuscript submissions: 31 March 2023. (5) Sensors (SCI & EI Indexed, Impact Factor: 3.576) Special Issue on Security, Trust and Privacy in New Computing Environments https://www.mdpi.com/journal/sensors/topical_collections/STPNCE Deadline for manuscript submissions: 31 March 2023. (6) Connection Science (SCI & EI Indexed, Impact Factor: 1.972) https://www.tandfonline.com/ccos20 Some selected conference papers will be recommended for possible publication in regular issues of this journal, with a sufficient amount of new materials added into the journal version. Deadline for manuscript submissions: 31 March 2023. (7) Sensors (SCI & EI Indexed, Impact Factor: 3.576) Special Issue on Cryptography and Security Protocol in Internet of Things https://www.mdpi.com/journal/sensors/special_issues/CSPIOT Deadline for manuscript submissions: 31 December 2022. (8) Applied Sciences (SCI & EI Indexed, Impact Factor: 2.679) Special Issue on Computational Methods for Next Generation Wireless and IoT Applications https://www.mdpi.com/journal/applsci/special_issues/Generation_Wireless_IoT Deadline for manuscript submissions: 31 December 2022. (9) Sensors (SCI & EI Indexed, Impact Factor: 3.576) Special Issue on Advanced Signal Processing and Human-Machine Interface for Healthcare Diagnostics and Bioengineering Applications https://www.mdpi.com/journal/sensors/special_issues/advanced_signal_processing_HMI_healthcare_bioengineering Deadline for manuscript submissions: 20 December 2022. (10) Electronics (SCI & EI Indexed, Impact Factor: 2.397) Special Issue on Cybersecurity and Privacy Issues in Cyber-Physical Systems and Industrial Control Systems https://www.mdpi.com/journal/electronics/special_issues/cyber_industrial_control Deadline for manuscript submissions: 25 November 2022. (11) Sensors (SCI & EI Indexed, Impact Factor: 3.576) Special Issue on Security and Privacy for Edge, Fog, and Cloud Computing; the Internet of Things and Mobile Crowdsensing https://www.mdpi.com/journal/sensors/special_issues/SP_EFC Deadline for manuscript submissions: 10 October 2022 (with possible extension later). (12) International Journal of Computational Science and Engineering (IJCSE) (EI Indexed) http://www.inderscience.com/browse/index.php?journalCODE=ijcse Some selected conference papers will be recommended for possible publication in regular issues of this journal, with a sufficient amount of new materials added into the journal version. Deadline for manuscript submissions: 31 March 2023. (13) Distributed Ledger Technologies: Research and Practice (DLT) (EI Indexed) Special Issue on Recent Advances of Blockchain Evolution: Architecture and Performance https://dl.acm.org/pb-assets/static_journal_pages/dlt/pdf/DLT-SI-Recent-Advances-Blockchain-Evolution-1651176743000.pdf Deadline for manuscript submissions: 15 December 2022. (14) Acta Informatica Pragensia Special Issue on Deep Learning Blockchain-enabled Technology for Improved Healthcare Industrial Systems https://aip.vse.cz/corproof.php?tartkey=aip-000000-0305&fbclid=IwAR1veJzaaej8gw4TbdWNMYeUHacMjArQ4dJBa_GmxJDWcr1LUGI-ajR1apE Deadline for manuscript submissions: 20 December 2022. * More special issues will be available soon. ====================================================================== Welcome to participate in IWTC 2022, Zhangjiajie, China, November 15 - 18, 2022! Zhangjiajie is an emerging tourist destination famous for its unique natural scenery and abundant tourism resources. It is located in the northwest of Hunan province, about 400 kilometers away from Changsha, the capital of Hunan province, covering a total area of 9,516 square kilometers, of which 76% are mountainous area. Out of its total population of 1.52 million, almost 77% belong to ethnic minority groups, including Tujia, Bai and Miao nationalities. Zhangjiajie National Forest Park was established by the State Council in 1982 as the first National Forest Park of China. Wulingyuan in Zhangjiajie was listed into the World Natural Heritage Catalogue by the UNESCO in 1992 and appraised as a national AAAAA scenic area. Zhangjiajie was awarded the title of "World Geological Park" in 2004. The amazing landscape here had been a source of creation of the CGI artist in the Avatar movie, and since the movie was released and achieved a great success, many tourists keeping coming to Zhangjiajie admiring this natural beauty. With the rapid development of information technology, a large amount of data in various industries and fields is increasing explosively. Massive data has brought severe challenges to Cyberspace Security. Network security and informatization are major strategic issues related to national security, national development, and work and life of broad masses of all the people. In the network computing mode, if a cloud server is damaged, it will affect user services on a large scale. Malicious attacks and monitoring activities from the cloud server itself will also cause security and privacy risks in the processes of user services. In addition, lacking the capability of controlling over the computing environment directly will make it difficult for users to trust the services provided in the network computing environment. At present, trusted computing technology can ensure the security and credibility of computing resources at startup to a certain extent, but the security of network computing environment at runtime is difficult to be guaranteed. Therefore, in order to improve the performance of network computing and effectively reduce the security risk of the system, it is necessary to study new network computing models and key security technologies. The 7th International Workshop on Trusted Computing (IWTC 2022), in Conjunction with UbiSec 2022 will be held at Zhangjiajie International Hotel during November 15-18, 2022, by the Institute of Trusted Computing, Guangzhou University, China (http://trust. gzhu.edu.cn) . Experts, scholars and students related to trusted computing from educational and scientific research institutions at home and abroad are welcome to attend the workshop. The workshop will provide a platform for experts and scholars from educational and scientific research institutions to exchange ideas and results, so as to deeply explore future technological innovations. IWTC 2022 topics include, but are not limited to the following: - Trustworthy data collection based on edge computing - Trustworthy computing based on distributed intelligence - Trustworthy computing software and hardware to secure networks and systems - Trust issues in recommender systems - Trust and privacy in social networking - Trust and privacy in edge computing - Trust and privacy in new network computing - Trust evaluation mechanism - Trust model training based on edge computing - Secure and privacy computing based distributed learning - Analysis of network and security protocols - Intrusion and anomaly detection and prevention - Automated security analysis of source code and binaries - Automated security analysis of hardware designs and implementation - New cryptographic protocols with real-world applications - Anti-malware techniques: detection, analysis, and prevention - Intrusion detection based on distributed learning - Privacy and anonymity in networks and distributed systems - Privacy preserving in recommender systems - Privacy computing in a distributed environments - Special problems and case studies (e.g., tradeoffs between security and efficiency, usability, cost, and ethics) - Blockchain-based federated learning architecture - Chain of trust building process - Robust federated learning IMPORTANT DATES Paper Submission Deadline: August 15, 2022 (Extended) Author Notification: September 15, 2022 Author Registration Due: October 15, 2022 Camera-Ready Paper Due: October 15, 2022 Conference Dates: November 15 - 18, 2022 SUBMISSION and PUBLICATION INFORMATION All presented papers in the conference will be published in the conference proceedings with Springer Communications in Computer and Information Science (CCIS). Papers must be clearly presented in English, must not exceed 14 pages in Springer CCIS format (or up to 20 pages with the pages over length charge), including tables, figures, references and appendices. Notice that accepted papers less than 12 pages will be tagged as Short Papers. Papers should be submitted through the EasyChair paper submission system at the conference website. Distinguished papers, after further revisions, will be considered for possible publication in SCI & EI indexed special issues of prestigious international journals. The program committee will select and give two or three "Best Paper Awards" for the conference. By submitting a paper to the conference, authors assure that if the paper is accepted, at least one author will attend the conference and present the paper. General Chairs Tian Wang, Beijing Normal University, China Shuhong Chen, Guangzhou University, China Program Chairs Qin Liu, Hunan University, China Xiaofei Xing, Guangzhou University, China Chalee Vorakulpipat, NECTEC, Thailand Publicity Chairs Tao Peng, Guangzhou University, China Yannan Li, University of Wollongong, Australia Xiangyong Liu, Guangzhou University, China Md Redowan Mahmud, Curtin University, Australia Publication Chairs Tao Peng, Guangzhou University, China Fang Qi, Central South University, China Registration Chairs Xiaofei Xing, Guangzhou University, China Pin Liu, Central South University, China Conference Secretariat Wenyin Yang, Foshan University, China Web Chairs Ziwei Xiao, Foshan University, China Jianguo Jiang, Foshan University, China Steering Committee Guojun Wang, Guangzhou University, China (Chair) Ryan Ko, University of Queensland, Australia (Chair) Richard Hill, University of Huddersfield, United Kingdom Vimal Kumar, University of Waikato, New Zealand Xuejia Lai, Shanghai Jiao Tong University, China Kuan-Ching Li, Providence University, Taiwan Zhoujun Li, Beihang University, China Qin Liu, Hunan University, China Tian Wang, Beijing Normal University, China Miao Xie, AARNET, Australia Zheng Yan, Xidian University, China/Aalto University, Finland Yong Yu, Xi'an University of Posts & Telecommunications, China Fengwei Zhang, Southern University of Science and Technology, China Deqing Zou, Huazhong University of Science and Technology, China Program Committee Please check the "Program Committee" web page at the conference website for detail: http://ubisecurity.org/IWTC/2022/ Contact Please email inquiries concerning IWTC 2022 to Prof. Guojun Wang: csgjwang AT gmail DOT com and Conference Organizers: UbiSec2022 AT googlegroups.com. Prof. Guojun Wang, Steering Committee Chair of IWTC 2022 http://trust.gzhu.edu.cn/faculty/~csgjwang/ -- *********************************************************************** Dr. Guojun Wang, Pearl River Scholarship Distinguished Professor Director of Institute of Computer Networks, School of Computer Science and Cyber Engineering, Guangzhou University, Guangzhou, Guangdong Province, P. R. China, 510006 Tel/Fax: +86-20-39366920, Mobile: +86-13360581866 Email: csgjwang AT gzhu.edu.cn http://trust.gzhu.edu.cn/faculty/~csgjwang/ *********************************************************************** |
|