posted by organizer: sigdrmposter || 6695 views || tracked by 6 users: [display]

MTAP SI MSNSA 2015 : Springer MTAP Special Issue on Multimedia Social Network Security and Applications


When N/A
Where N/A
Submission Deadline Jan 15, 2016
Notification Due Mar 15, 2016
Final Version Due Sep 15, 2016
Categories    social network   security   multimedia   applications

Call For Papers

Multimedia Tools and Applications
(A Springer Journal, SCI JCR IF=1.346)
Call for Papers
Special Issue on Multimedia Social Network Security and Applications

Aims and Scopes
In the increasingly inter-connected society, multimedia social network (MSN) has become a ‘mainstream’ tool used by online users to connect and share contents with other users 24/7 in real-time. It is, therefore, unsurprising that MSN has become a salient area of inquiry by computer scientists and computer security researchers. For example, researchers need to design intelligent computing and soft computing technologies to improve multimedia system functions, efficiency and performance, and improving user’s sharing experiences (e.g. using recommendation systems and more effective algorithms). In addition, security of users and data are also an ongoing topic of interest and importance due to the ease in producing and sharing user and multimedia content using MSNs. In recent years, we have seen advances in multimedia system security and soft computing for MSN applications, such as “hard” security mechanisms (e.g. protocols and methodologies) and “soft” computing methods (e.g. machine learning and rough set), as well as research efforts in trust assessment, risk management and social factors to understand the trade-off between the effectiveness and security in MSNs.
This special issue aims to bring together researchers in both academia and industry to publish cutting edge research on the following:
 Multimedia social network security architecture, model and networking
 Cryptographic methods for multimedia social network and system security
 Reactive watermarking and forensics for multimedia content
 Digital rights management, usage control and privacy protection for multimedia social network
 Soft computing techniques for multimedia social network applications, including neural network, rough set and machine learning
 Multimedia recommendation systems and highly-efficient algorithms for multimedia social network applications
 Trust assessment, risk management and social-factor considerations in multimedia social network applications
 Personal and mobile multimedia social network applications
 Multimedia social network-oriented prototypes, cases studies and other applications
High quality survey papers on the above topics are also welcome.
Submissions Guideline
Papers submitted to this special issue for possible publication must be original and must not be under consideration for publication in any other journal or conference. If the submission is an extended version of a previously published workshop or conference paper, this should also be explicitly mentioned in the cover letter, the published paper must be cited in the submitted journal paper, and the submitted journal paper must technically extend the conference version, by 30% according to general rules; i.e., the technical contribution in the journal version must be extended beyond what was presented in the conference version.
Authors must follow the formatting and submission instructions of MTAP at and follow the "Submit Online" link on that page. Please make sure you select the SI title “Multimedia Social Network Security and Applications” at the column of “Article Type” when you submit on-line, and mention in your cover letter that you are submitting to this special issue.
All submitted papers will be peer reviewed by at least three reviewers according to the usual standards of this journal, and will be evaluated on the basis of originality, quality and relevance to this Special Issue and the journal, and on the basis of clarity and correct usage of English.
If you have any question, please do not hesitate to contact the corresponding GE, Prof. Zhiyong Zhang, by and
Paper submission: January 15, 2016
1st round review notification: March 15, 2016
1st revision due: June 1, 2016
2nd round review notification: July 1, 2016
2nd revision due: August 15, 2016
Final acceptance: September 15, 2016
Publication (Tentative): The last quarter of 2016

Guest Editors
Zhiyong Zhang (Corresponding GE)
Visiting Professor, Iowa State University, Ames, Iowa, USA;
Henan Province Distinguished Professor, Henan University of Science & Technology, Luoyang, Henan, P. R. of China

Kim-Kwang Raymond Choo
Fulbright Scholar and Senior Researcher, University of South Australia, Adelaide, South Australia, Australia

Related Resources

Reshaping the Nation 2019   Reshaping the Nation: Collective Identities and Post-War Violence in Europe 1944–48
CLOUD 2019   8th International Conference on Cloud Computing: Services and Architecture
MMSP 2019   IEEE 21st International Workshop on Multimedia Signal Processing
ECML PKDD 2019   Joint Call for Papers for the Research and ADS tracks, ECML PKDD 2019
WTDSI-SBSI 2019   Workshop de Teses e Dissertações em Sistemas de Informação
BIOE 2019   International Conference on Bioscience & Engineering
IMSS 2019   3rd International Business Management and Social Sciences Conference
InWeS 2019   10th International Conference on Internet Engineering & Web Services
BSSR 2019   2nd International Conference on Economic Growth, Business Strategy and Social Sciences Reforms
ISAIR 2019   The 4th International Symposium on Artificial Intelligence and Robotics 2019