posted by organizer: sigdrmposter || 6322 views || tracked by 5 users: [display]

MTAP SI MSNSA 2015 : Springer MTAP Special Issue on Multimedia Social Network Security and Applications

FacebookTwitterLinkedInGoogle

Link: https://www.springer.com/?SGWID=0-102-2-1486992-preview&dynamic=true
 
When N/A
Where N/A
Submission Deadline Jan 15, 2016
Notification Due Mar 15, 2016
Final Version Due Sep 15, 2016
Categories    social network   security   multimedia   applications
 

Call For Papers

Multimedia Tools and Applications
(A Springer Journal, SCI JCR IF=1.346)
Call for Papers
Special Issue on Multimedia Social Network Security and Applications

Aims and Scopes
In the increasingly inter-connected society, multimedia social network (MSN) has become a ‘mainstream’ tool used by online users to connect and share contents with other users 24/7 in real-time. It is, therefore, unsurprising that MSN has become a salient area of inquiry by computer scientists and computer security researchers. For example, researchers need to design intelligent computing and soft computing technologies to improve multimedia system functions, efficiency and performance, and improving user’s sharing experiences (e.g. using recommendation systems and more effective algorithms). In addition, security of users and data are also an ongoing topic of interest and importance due to the ease in producing and sharing user and multimedia content using MSNs. In recent years, we have seen advances in multimedia system security and soft computing for MSN applications, such as “hard” security mechanisms (e.g. protocols and methodologies) and “soft” computing methods (e.g. machine learning and rough set), as well as research efforts in trust assessment, risk management and social factors to understand the trade-off between the effectiveness and security in MSNs.
This special issue aims to bring together researchers in both academia and industry to publish cutting edge research on the following:
 Multimedia social network security architecture, model and networking
 Cryptographic methods for multimedia social network and system security
 Reactive watermarking and forensics for multimedia content
 Digital rights management, usage control and privacy protection for multimedia social network
 Soft computing techniques for multimedia social network applications, including neural network, rough set and machine learning
 Multimedia recommendation systems and highly-efficient algorithms for multimedia social network applications
 Trust assessment, risk management and social-factor considerations in multimedia social network applications
 Personal and mobile multimedia social network applications
 Multimedia social network-oriented prototypes, cases studies and other applications
High quality survey papers on the above topics are also welcome.
Submissions Guideline
Papers submitted to this special issue for possible publication must be original and must not be under consideration for publication in any other journal or conference. If the submission is an extended version of a previously published workshop or conference paper, this should also be explicitly mentioned in the cover letter, the published paper must be cited in the submitted journal paper, and the submitted journal paper must technically extend the conference version, by 30% according to general rules; i.e., the technical contribution in the journal version must be extended beyond what was presented in the conference version.
Authors must follow the formatting and submission instructions of MTAP at http://www.springer.com/computer/information+systems+and+applications/journal/11042 and follow the "Submit Online" link on that page. Please make sure you select the SI title “Multimedia Social Network Security and Applications” at the column of “Article Type” when you submit on-line, and mention in your cover letter that you are submitting to this special issue.
All submitted papers will be peer reviewed by at least three reviewers according to the usual standards of this journal, and will be evaluated on the basis of originality, quality and relevance to this Special Issue and the journal, and on the basis of clarity and correct usage of English.
If you have any question, please do not hesitate to contact the corresponding GE, Prof. Zhiyong Zhang, by zzy@iastate.edu and z.zhang@ieee.org.
IMPORTANT DATES
Paper submission: January 15, 2016
1st round review notification: March 15, 2016
1st revision due: June 1, 2016
2nd round review notification: July 1, 2016
2nd revision due: August 15, 2016
Final acceptance: September 15, 2016
Publication (Tentative): The last quarter of 2016

Guest Editors
Zhiyong Zhang (Corresponding GE)
Visiting Professor, Iowa State University, Ames, Iowa, USA;
Henan Province Distinguished Professor, Henan University of Science & Technology, Luoyang, Henan, P. R. of China
E-mail: zzy@iastate.edu, z.zhang@ieee.org
Homepage: www.sigdrm.org/~zzhang

Kim-Kwang Raymond Choo
Fulbright Scholar and Senior Researcher, University of South Australia, Adelaide, South Australia, Australia
E-mail: raymond.choo@fulbrightmail.org
Homepage: http://people.unisa.edu.au/raymond.choo

Related Resources

SI SocInf+MAISoN 2018   Special Issue on Mining Social Influence and Actionable Insights from Social Networks
FI-IoTSP 2018   Future Internet Journal: Special Issue on IoT Security and Privacy
Computing SI on SoftBDA 2018   Springer Computing Special Issue on Software-driven Big Data Analytics
IJAB 2018   International Journal of Advances in Biology
J.Imaging-Multimedia 2018   Special Issue on Multimedia Content Analysis and Applications (Journal of Imaging)
IJIS-IoTSec 2018   Springer IJIS Special Issue on IoT Security and Privacy
IJCCSA 2018   International Journal on Cloud Computing: Services and Architecture
ICCC--IEEE, Ei Compendex and Scopus 2018   2018 4th IEEE International Conference on Computer and Communications (ICCC 2018)--Ei Compendex and Scopus
ICDIM 2018   Thirteenth International Conference on Digital Information Management (ICDIM 2018)
MMM 2019   Conference on Multimedia Modeling