posted by organizer: sigdrmposter || 5984 views || tracked by 5 users: [display]

MTAP SI MSNSA 2015 : Springer MTAP Special Issue on Multimedia Social Network Security and Applications

FacebookTwitterLinkedInGoogle

Link: https://www.springer.com/?SGWID=0-102-2-1486992-preview&dynamic=true
 
When N/A
Where N/A
Submission Deadline Jan 15, 2016
Notification Due Mar 15, 2016
Final Version Due Sep 15, 2016
Categories    social network   security   multimedia   applications
 

Call For Papers

Multimedia Tools and Applications
(A Springer Journal, SCI JCR IF=1.346)
Call for Papers
Special Issue on Multimedia Social Network Security and Applications

Aims and Scopes
In the increasingly inter-connected society, multimedia social network (MSN) has become a ‘mainstream’ tool used by online users to connect and share contents with other users 24/7 in real-time. It is, therefore, unsurprising that MSN has become a salient area of inquiry by computer scientists and computer security researchers. For example, researchers need to design intelligent computing and soft computing technologies to improve multimedia system functions, efficiency and performance, and improving user’s sharing experiences (e.g. using recommendation systems and more effective algorithms). In addition, security of users and data are also an ongoing topic of interest and importance due to the ease in producing and sharing user and multimedia content using MSNs. In recent years, we have seen advances in multimedia system security and soft computing for MSN applications, such as “hard” security mechanisms (e.g. protocols and methodologies) and “soft” computing methods (e.g. machine learning and rough set), as well as research efforts in trust assessment, risk management and social factors to understand the trade-off between the effectiveness and security in MSNs.
This special issue aims to bring together researchers in both academia and industry to publish cutting edge research on the following:
 Multimedia social network security architecture, model and networking
 Cryptographic methods for multimedia social network and system security
 Reactive watermarking and forensics for multimedia content
 Digital rights management, usage control and privacy protection for multimedia social network
 Soft computing techniques for multimedia social network applications, including neural network, rough set and machine learning
 Multimedia recommendation systems and highly-efficient algorithms for multimedia social network applications
 Trust assessment, risk management and social-factor considerations in multimedia social network applications
 Personal and mobile multimedia social network applications
 Multimedia social network-oriented prototypes, cases studies and other applications
High quality survey papers on the above topics are also welcome.
Submissions Guideline
Papers submitted to this special issue for possible publication must be original and must not be under consideration for publication in any other journal or conference. If the submission is an extended version of a previously published workshop or conference paper, this should also be explicitly mentioned in the cover letter, the published paper must be cited in the submitted journal paper, and the submitted journal paper must technically extend the conference version, by 30% according to general rules; i.e., the technical contribution in the journal version must be extended beyond what was presented in the conference version.
Authors must follow the formatting and submission instructions of MTAP at http://www.springer.com/computer/information+systems+and+applications/journal/11042 and follow the "Submit Online" link on that page. Please make sure you select the SI title “Multimedia Social Network Security and Applications” at the column of “Article Type” when you submit on-line, and mention in your cover letter that you are submitting to this special issue.
All submitted papers will be peer reviewed by at least three reviewers according to the usual standards of this journal, and will be evaluated on the basis of originality, quality and relevance to this Special Issue and the journal, and on the basis of clarity and correct usage of English.
If you have any question, please do not hesitate to contact the corresponding GE, Prof. Zhiyong Zhang, by zzy@iastate.edu and z.zhang@ieee.org.
IMPORTANT DATES
Paper submission: January 15, 2016
1st round review notification: March 15, 2016
1st revision due: June 1, 2016
2nd round review notification: July 1, 2016
2nd revision due: August 15, 2016
Final acceptance: September 15, 2016
Publication (Tentative): The last quarter of 2016

Guest Editors
Zhiyong Zhang (Corresponding GE)
Visiting Professor, Iowa State University, Ames, Iowa, USA;
Henan Province Distinguished Professor, Henan University of Science & Technology, Luoyang, Henan, P. R. of China
E-mail: zzy@iastate.edu, z.zhang@ieee.org
Homepage: www.sigdrm.org/~zzhang

Kim-Kwang Raymond Choo
Fulbright Scholar and Senior Researcher, University of South Australia, Adelaide, South Australia, Australia
E-mail: raymond.choo@fulbrightmail.org
Homepage: http://people.unisa.edu.au/raymond.choo

Related Resources

SI: MTAP UVS 2017   MTAP Springer Special issue on ‘Ubiquitous Visual Surveillance for Public Security’
TrustCom 2018   The 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications
MTAP-1083T 2017   MTAP Special Issue on Data Preprocessing for Big Multimedia Data
IJMSA 2017   International Journal of Modeling, Simulation and Applications
HCIS TI CFPs 2018   Call for Papers Thematic Issue of HCIS-Springer (indexed by SCIE)
IJE 2017   International Journal of Education (IJE)
MLDM 2018   14th International Conference on Machine Learning and Data Mining MLDM 2018
FI-IoTSP 2018   Future Internet Journal: Special Issue on IoT Security and Privacy
Social Information Systems @ HICSS-51   Social Information Systems Minitrack - Hawaii International Conference on System Sciences (HICSS-51)
ICMR 2018   ACM International Conference on Multimedia Retrieval