| |||||||||||||||
SKM 2023 : International Conference on Secure Knowledge Management (SKM) 2023 | |||||||||||||||
Link: https://www.secure-km.org/ | |||||||||||||||
| |||||||||||||||
Call For Papers | |||||||||||||||
International Conference on Secure Knowledge Management (SKM) 2023
https://www.secure-km.org/ Tempe, AZ USA September 22-23, 2023 ========Important Dates======== + Deadline for paper submission: May 20, 2023 + Notification to authors: July 01, 2023 + Author registration: July 15, 2023 + Deadline for final papers: July 15, 2023 + Early registration: July 15, 2023 + Regular registration: August 15, 2023 + Conference dates: September 22-23, 2023 + Note: As a result of NSF funding, selected US-based students whose papers are accepted will be provided support to attend the conference. + We are glad to announce our keynote speaker: Dr. Anna Squicciarini, Program Director of NSF Secure and Trustworthy Cyberspace (SaTC). ========Call For Papers======== Knowledge Management (KM) deals with issues relating to gathering, organizing, sharing, processing, analyzing and storing knowledge sourced from the data and human assets of an organization. Recent trends suggest an ever-evolving vulnerability surface in KM which poses significant challenges with securing the entire KM lifecycle: first, there is the increased availability and diversity of high performance devices producing and processing large amounts data; second, advancements in AI/ML techniques is driving increased adoption of AI/ML in a wide range of domains raising different challenges in different contexts; emerging platforms and environments such as Blockchains, Web3, Metaverse, etc., are contributing additional complexities to the SKM challenge. Consequently, the issue of how to ensure the security of the entire KM cycle is a growing and important concern. Knowledge Management (KM) deals with issues relating to gathering, organizing, sharing, processing, analyzing and storing knowledge sourced from the data and human assets of an organization. Recent trends suggest an ever-evolving vulnerability surface in KM which poses significant challenges with securing the entire KM lifecycle: first, there is the increased availability and diversity of high performance devices producing and processing large amounts data; second, advancements in AI/ML techniques is driving increased adoption of AI/ML in a wide range of domains raising different challenges in different contexts; emerging platforms and environments such as Blockchains, Web3, Metaverse, etc., are contributing additional complexities to the SKM challenge. Consequently, the issue of how to ensure the security of the entire KM cycle is a growing and important concern. SKM is a biannual conference that brings together researchers & practitioners from academia, industry, and government on a global scale to focus on relevant issues at the intersection of security and knowledge management. The aim of the SKM-2023 conference is to present, discuss and disseminate the most recent innovations, trends, concerns, and solutions to practical challenges relevant to the mitigation and detection of threats across the multiple software layers that support AI and KM. SKM-2021 was originally scheduled to be held in San Antonio, TX was eventually held virtually due to the COVID pandemic. SKM 2019 was held in BITS Pilani, Goa Campus, Goa, India and past iterations of SKM were held at SUNY at Buffalo, SUNY Albany, NYU, SUNY Stony Brook, UT Dallas, Rutgers University, BITS Dubai, University of South Florida, University of Texas, San Antonio. Following the biennial tradition of the Secure Knowledge Management Workshop that began in 2004, SKM-2023 will be held on September 22-23, 2023, at Arizona State University, Tempe, AZ USA. Papers offering novel research contributions in all aspects of SKM are solicited for submission. Topics of interest include, but are not limited to: + Advanced Software Techniques for SKM - Security, Quality & Confidentiality of ML Labeling and Training - Privacy Preserving AI/ML - Security in Distributed Trust and Decentralized Applications - Explainability and Traceability of AI/ML - Security Testing and Risk Assessment of AI/ML - Online Social Networks - Security in Blockchains and Smart Contracts - Bias in AI + Secure Knowledge Management Computing Frameworks - Security in Cyber Physical Systems - Security in Collaborative Environments - Security in Middleware Environments - Security in Cloud and Edge Computing - Security in Virtual Environments - Security in Specialized Computing Platforms e.g. Blockchains + Advanced Techniques for Domain-specific SKM - Healthcare - Social Networks and Media - Fake News, Conversation, Voice, Video, Deep Fakes - Online Advertising - Industry 4.0 - Finance - Internet of Things - Current & Future Web, including Web3 & Metaverse - Smart Manufacturing - Insider Threat ========Organizational Committee======== Latest info: https://www.secure-km.org/committee/ + Steering Committee - Kevin Kwiat, Air Force Research Laboratory, USA, (Retd) - Nasir Memon, New York University, USA - Raghav Rao, University of Texas at San Antonio, USA - Bhavani M. Thuraisingham, University of Texas at Dallas, USA - Shambhu Upadhyaya, University at Buffalo, The State University of New York, USA + General Chairs - Raghu Santanam, Arizona State University, USA - Binil Starly, Arizona State University, USA + Technical Program Committee Chairs - Victor Benjamin, Arizona State University, USA - Kemafor Anyanwu, North Carolina State University, USA + Scientific Chair - Sanjay Sahay, Birla Institute of Technology and Science – Pilani, India + Publicity Chair - Sangram Redkar, Arizona State University, USA - Hongyi Zhu, University of Texas at San Antonio, USA + Technical Program Committee Members (More update to come) - Abdullah Al-Alaj, Virginia Wesleyan University - Abhishek Vaish, Indian Institute of Information Technology, Allahabad - Amirreza Masoumzadeh, University at Albany, SUNY, USA - Ankit Shah, University of South Florida - Bhavani Thuraisingham, University of Texas, Dallas - Chittaranjan Hota, BITS Pilani - David Hyland-Wood, Griffith University - Femi Akanfe, University of Alabama - Hemant Purohit, George Mason University - Hongxin Hu, University at Buffalo - Hongyi Zhu, University of Texas at San Antonio - Indrakshi Ray, Colorado State University - Jiwan Ninglekhu, InterDigital Communications Inc. - Mahmoud Abdelsalam, North Carolina A&T State University - Manas Gaur, University of Maryland Baltimore County - Manish Agrawal, University of South Florida - Mariano Consens, University of Toronto - Ragav Rao, University of Texas at San Antonio - Raghu Santanam, Arizona State University - Reza Samavi, Toronto Metropolitan University - Sagar Samtani, Indiana University - Sanjay Goel, SUNY Albany - Sanjay Sahay, BITS Pilani - Satya Sahoo, Case Western Reserve University - Thi Tran, Binghampton University - Vijay Atluri, Rutgers University - Weifeng Li, University of Georgia - Yuan Cheng, California State University, Sacramento - Yunji Liang, Northwestern Polytechnical University - Zhe Shan, Miami University - Ziming Zhao, University at Buffalo ========Submission Guidelines======== Only original papers should be submitted. Submissions should not substantially overlap work which has been published elsewhere or simultaneously submitted to a journal or another conference with proceedings. Papers that contain any form of plagiarism will be rejected without a review. Paper Format All submissions must be in English and should adhere to the LNCS/CCIS format guidelines. All papers will be published in Springer CCIS (as full papers and short papers). Guidelines for proceedings authors (pdf): ftp://ftp.springernature.com/cs-proceeding/svproc/guidelines/Springer_Guidelines_for_Authors_of_Proceedings_CS.pdf LaTeX2e Proceedings Templates (zip): ftp://ftp.springernature.com/cs-proceeding/llncs/llncs2e.zip CCIS Consent form for the publication: https://www.secure-km.org/files/Consent_Form.pdf Including references and appendices, full paper should be 10-20 pages in the LNCS / CCIS one-column page format. To facilitate the double-blind paper evaluation, authors are kindly requested to submit the paper WITHOUT any self-reference to any of the authors anywhere in the paper, including the acknowledgments section of the paper and any other reference that may disclose the authors’ identity. Papers should be uploaded to Microsoft CMT (https://cmt3.research.microsoft.com/SKM2023/Submission/Index) in PDF format only. After the paper submission has been successfully completed, authors will receive an automatic confirmation e-mail. Each paper should clearly indicate the nature of its technical/scientific contribution and the problems, domains or environments to which it is applicable. It is planned to publish the peer-reviewed and selected papers of conference as proceedings with Springer in their prestigious Communications in Computer and Information Science series (Scopus and DBLP indexed). Some selected papers presented at the conference will be invited for extension and further review for a fast-tracked special issue of Information Systems Frontiers (SCIE, Scopus and DBLP indexed) a Springer journal. Authors of registered papers (including posters) must guarantee that their papers will be presented at the conference. At least one FULL registration is mandatory for each accepted paper. Papers which are not presented will be excluded from the conference proceedings. |
|