posted by user: xyuancs || 1776 views || tracked by 3 users: [display]

IEEE TPS 2019 : The First IEEE International Conference on Trust, Privacy and Security in Intelligent Systems, and Applications


When Dec 12, 2019 - Dec 14, 2019
Where Los Angeles
Abstract Registration Due Aug 23, 2019
Submission Deadline Aug 30, 2019

Call For Papers

The First IEEE International Conference on Trust, Privacy and Security in Intelligent Systems, and Applications

(IEEE TPS 2019)


Sponsored by IEEE Computer Society (TC on Internet)

[Right after IEEE Big Data 2019:]

[Co-located with conferences IEEE CIC 2019 & IEEE MIC 2019]


Recent advances in computing and information technologies such as IoT, mobile Edge/Cloud computing, cyber- physical-social systems, Artificial Intelligence/Machine Learning/ Deep Learning, etc., have paved way for creating next generation smart and intelligent systems and applications that can have transformative impact in our society while accelerating rapid scientific discoveries and innovations. Such newer technologies and paradigms are getting increasingly embedded in the computing platforms and networked information systems/infrastructures that form the digital foundation for our personal, organizational and social processes and activities. It is increasingly becoming critical that the trust, privacy and security issues in such digital environments are holistically addressed to ensure the safety and well-being of individuals as well as our society.

IEEE TPS-ISA is an international multidisciplinary forum for presentation of state-of-the art innovations, and discussion among academic, industrial researchers, and practitioners on issues related to trust, privacy and security in emerging smart and intelligent systems and applications.


Topics of interest include, but are not limited to:

Foundational, theoretical models for trust, privacy and security in emerging applications
Trusted AI, Machine Learning and Deep Learning
Privacy preserving Machine Learning and Deep Learning
Trustworthy, safe and resilient intelligent systems
Trusted, privacy-conscious and secure systems, applications and networks/infrastructures
Security and privacy in IoT and Cyber-physical-human systems
Trustworthy and secure Human-Machine collaboration
Access and trust management/negotiation, and secure information flow/sharing
Bio-inspired approaches to trust, privacy and security
Game theoretical approaches to trust, privacy, and security
Adversarial machine learning
Trust, privacy and security for big data systems, applications and platforms
Trust, privacy and security for smart cities and urban computing
Machine Learning / Deep learning over encrypted data
Usability and human factors for trust, privacy and security
Tools, techniques and metrics for trust, privacy and security
Anonymization techniques and differential privacy for emerging intelligent applications
Trust, privacy and security approaches for services computing: microservices, service-oriented architectures, service composition and orchestration
Blockchain and Distributed-ledger technologies
Blockchain/Distributed ledger for e-commerce, mobile commerce and intelligent applications
Bias, fairness and integrity/robustness of algorithmic machine / AI algorithms
Trusted, privacy-aware and secure interoperation of interacting/collaborative systems
Threat models and attack modeling for AI/ML and applications
Identification/Detection of spam, phishing, malware and APTs
Cryptographic approaches and secure multiparty computation
Privacy-preserving data mining and big data analytics
Application of AI/ML and Deep learning for trust, privacy and security
Trust, privacy and security in edge/cloud computing, social computing
Safe and trusted autonomous vehicles/UAVs, robotics
Trust, security and safety in supply-chain environments and critical infrastructures
Data quality/credence, privacy and provenance
Trust in social media – disinformation/misinformation
Risk metrics and measurements, assessment/analysis and mitigation
Insider threat modeling, analysis and mitigation; behavioral modeling for security and trust
Digital payments and cryptocurrencies; Secure and trustworthy e-commerce and mobile commerce
Trust negotiation and/or propagation in interacting systems of systems, multi-agent systems, social networks.

Important Dates

Abstract Due August 23, 2019 (Highly Recommended)
Submission Deadline August 30, 2019
Acceptance Notification September 30, 2019
Camera Ready: October 15, 2019

Blue Sky/Vision Track

We would like to solicit papers that promote visionary ideas and blue sky thinking in areas aligned with the conference themes. These papers are expected to spark intense discussions and newer research directions/insights through potentially disruptive, controversial, or highly cross-disciplinary ideas that look forward to Trust, Privacy and Security areas for the next 10 years and beyond. Ideas that are just being conceived, not fully developed, far from experimentally evaluated, or out-of-the box are highly encouraged. The papers should follow the same format as the regular conference papers and are limited to 6 pages.

Industry Track Papers

We would like to solicit papers that focus on design, implementation and deployment of solutions related to Trust, privacy and security within the industrial or government environments. The papers submitted to this track are expected to advance practical and applied research focused on the use of TPS technologies, and real-world networks, systems applications.

The Industry/Government Track will include papers selected through a separate program committee. Authors must clearly indicate sub-areas their papers are to be evaluated in because distinct criteria may be used for reviewing different category of submissions:

Deployed:Deployed systems that aim to provide real practical value to industry, Government, or other organizations, or communities. The papers should point out how the deployed system explicitly address TPS issues or describe either qualitatively (lessons learnt, deployment experiences, etc.) or quantitatively how Trust, Privacy and Security issues are addressed in smart, intelligence systems and applications.
Emerging:Newer models and mechanisms or innovative solutions related to trust, privacy and security in networks, systems and applications are expected here. The authors should clearly demonstrate value and interest to Industry, Government of society (e.g., scientific or medical professions; critical infrastructures). Papers that describe infrastructure development and deployment that enables the large-scale deployment of trusted, safe, secure and privacy-aware technologies/applications or their validation are also in these areas.


IEEE TPS will feature a Best Paper award and a Best Student Paper award (to be selected by the program committee/best paper award team). A paper is eligible for the Best Student Paper award if the first author is a full-time student at the time of submission. A partial travel grant or cash award may be offered to the winner student depending on the availability of funds.

Paper Submission

We invite original research papers that have not been previously published and are not currently under review for publication elsewhere. Contributions addressing all areas related to trust, privacy and security issues related to networks, systems, and applications are solicited. Papers submitted to Regular or Industry/Gov track should be no longer than 10 pages in the standard two column IEEE proceedings format, which can be found at Manuscript Templates for Conference Proceedings. The papers can be submitted at EasyChair.

Workshops Proposals

Proposals for half-day or full day workshops that focus on IEEE TPS 2019 related themes are solicited. Workshop proposals should be at most five pages, including a biographical sketch of each instructor, and submitted to the Workshop Chairs. Proposals will be evaluated based on the expertise and experience of the organizers and the relevance and importance of the subject matter. Please refer to call for workshop proposals for details.

Panels Proposals

Proposals for panel discussions that focus on future visions relevant to trust, privacy and security are preferred. Potential panel organizers should submit a panel proposal of at most five pages, including biographical sketches of the proposed panelists to the Panel Chairs.

Tutorials Proposals

Proposals for full and half-day tutorials are solicited. Tutorials are intended to enhance the technical program, and as such they should be relevant to the conference related themes. Potential tutorial presenters should submit a tutorial proposal of at most three pages, including: description of potential audience and background knowledge expected from the audience, if any; tutorial description; biographical sketch(s) of presenter(s).

Organizing Committee

General Co-Chairs

Ravi Sandhu, University of Texas, San Antonio, United States

Kui Ren, Zhejiang University, China

Program Co-Chairs

Elisa Bertino, Purdue University, USA

Elena Ferrari, University of Insubria, Italy

Jaideep Vaidya, Rutgers University, USA

Industry/Gov Track Co-Chairs

Yuecel Karabulut, Oracle, United States

Mudhakar Srivatsa, IBM Watson, United States

Workshop Co-Chairs

Barbara Carminati, University of Insubria, Italy

Danda Rawat, Howard University, United States

Sponsorship Co-Chairs

James Joshi, University of Pittsburgh, United States

Ling Liu, Gerogia Tech, United States

Proceedings Chair

Amirreza Masoumzadeh, State University of New York at Albany, United States

Publicity Co-Chair

Cong Wang, City University of Hong Kong, China

Finance and Local Arrangements Chair

Julian Jarrett, Drexel University, United States

Student Travel Grants Co-Chair

Amirreza Masoumzadeh, State University of New York at Albany, United States


Runhua Xu, University of Pittsburgh, United States

Steering Committee

James Joshi, Chair, University of Pittsburgh, USA

Arun Iyengar, IBM, USA

Calton Pu, Georgia Institute of Technology, USA

Dimitrios Gerogakopolous, Swinsburne University of Technology, Australia

Elisa Bertino, Purdue University, USA

Karl Aberer, EPFL, Switzerland

Ling Liu, Georgia Institute of Technology, USA

M. Brian Blake, Drexel University, USA

Tao Zhang, Cisco, USA

Weisong Shi, Wayne State University, USA

Zhaohui Wu, Zhejiang University, China

Related Resources

INES 2022   26th IEEE International Conference on Intelligent Engineering Systems 2022
SISY 2022   20th IEEE International Symposium on Intelligent Systems and Informatics
MobiWis 2022   The 18th International Conference on Mobile Web and Intelligent Information Systems
ASE 2022   37th IEEE/ACM International Conference on Automated Software Engineering
CEVVE 2022   2022 International Conference on Electric Vehicle and Vehicle Engineering (CEVVE 2022)
Computer SI on SE4RAI 2023   IEEE Computer - Special Issue on Software Engineering for Responsible AI
IEEE SSCI 2023   2023 IEEE Symposium Series on Computational Intelligence
EvoCompAISecurity&Privacy 2022   Evolutionary Computing for AI-Driven Security and Privacy: Advancing the state-of-the-art applications
IEEE SSCI 2022   2022 IEEE Symposium Series on Computational Intelligence
IEEE COINS 2022   IEEE COINS 2022: Hybrid (3 days on-site | 2 days virtual)