posted by user: nidhirastogi81 || 8104 views || tracked by 15 users: [display]

WIFS 2016 : 8th IEEE International Workshop on Information Forensics and Security (WIFS)

FacebookTwitterLinkedInGoogle

Link: http://www.wifs2016.org/
 
When Dec 4, 2016 - Dec 7, 2016
Where Abu Dhabi, UAE
Submission Deadline Aug 5, 2016
Notification Due Sep 25, 2016
Final Version Due Oct 21, 2016
Categories    forensics   security   information   computer science
 

Call For Papers

In its 2016 edition, the IEEE International Workshop on Information Forensics and Security will continue to adhere to its earlier established wide scope, covering various aspects of forensics and information security. We invite potential authors to submit articles on the following topics but will not be limited to only these.

Forensics: evidence recovery; evidence validation; media forensics; source attribution; incident response; and counter forensics
Information and system security: authentication, vulnerability discovery/assessment; malware analysis; cyber-physical systems; mobile and intelligent devices; and physical layer fingerprinting
Biometrics: new biometric modalities; pattern recognition; multimodal decision 
making; and feature extraction
Multimedia content security: cryptography for multimedia; hashing; and data hiding
Steganography and covert communications
Hardware security: hardware trojans; PUFS; and anti-counterfeiting
Network traffic analysis
Surveillance: tracking; person (re-)identification; crowd analysis; and anti-surveillance 
and de-identification
Sousvelliance and anti-sousveillance: users collecting data from other users instead of authorities; possibilities and risks.*
Privacy in data analytics
Privacy in the Internet of everything
.

Submission of Papers

Prospective authors are invited to submit full-length, six-page papers, including figures and references. All submitted papers will go through double-blinded peer review process. The WIFS Technical Program Committee will select papers for the formal proceedings based on technical quality, relevance to the workshop, and ability to inspire new research. Accepted papers will be presented in either lecture tracks or poster sessions. Authors of the accepted papers are required to present their papers at the conference. For questions contact WIFS’16 Technical Program Chairs at tpc@wifs2016.org.

Notice

The IEEE Signal Processing Society enforces a “no-show” policy. Any accepted paper included in the final program is expected to have at least one author or qualified proxy attend and present the paper at the conference. Authors of the accepted papers included in the final program who do not attend the conference will be subscribed to a “no-show” list, compiled by the Society. The “no-show” papers will not be published by IEEE on IEEEXplore or other public access forums, but these papers will be distributed as part of the on-site electronic proceedings and the copyright of these papers will belong to the IEEE.
.

Tutorial Proposals Submission

Up to four tutorials will be scheduled for the first day of the conference, Sunday December 4, 2016. Prospective tutorial contributors are encouraged to submit a tutorial proposal with the tutorial title, the presenters’ name, affiliation, and brief CV, along with the detailed structure of the tutorial to the Tutorials Chair at tutorials@wifs2016.org.

Demo and Ongoing Work Proposals

This session will provide both academic researchers and industrial exhibitors to showcase innovative implementations, systems and technologies demonstrating new ideas in the field. We encourage both the submission of early research prototypes and interesting mature systems. Formal proposals must be accompanied by a description of the work or demo to be presented. All material has to be submitted to the Demo Session Chair at demo@wifs2016.org.

Submission of SPL and TIFS Papers

Authors of IEEE Signal Processing Letters (SPL) and IEEE Transactions on Information Forensics and Security (TIFS) papers will be given the opportunity to present their work at WIFS 2015, subject to space availability and approval by the WIFS Technical Program Chairs. Proposals have to be submitted to the Technical Program Chairs at tpc@wifs2015.org.

. .

Related Resources

ACISP 2019   The 24th Australasian Conference on Information Security and Privacy
ICDMML 2019   【ACM ICPS EI SCOPUS】2019 International Conference on Data Mining and Machine Learning
WIFS 2018   IEEE International Workshop on Information Forensics and Security 2018
ISCSAI 2018   2018 International Symposium on Computer Science and Artificial Intelligence
IFIPSEC 2019   IFIP Information Security Conference & Privacy Conference - IFIP Technical Commitee 11
DSN 2019   Dependable Systems and Networks
ETRIJ Cyber Security & AI 2019   ETRI Journal Special issue on Cyber Security and AI
QRS 2019   The 19th IEEE International Conference on Software Quality, Reliability, and Security
SSCI 2019   The 2019 IEEE Symposium Series on Computational Intelligence
MDPI Information 2019   MDPI OA Journal of Information Science, Technology and Engineering --SI on Machine Learning for Cyber-Security