The Data Mining Forum                             open-source data mining software data mining conferences Data Science for Social and Behavioral Analytics DSSBA 2022 data science journal
IMPORTANT: This is the old Data Mining forum.
I keep it online so that you can read the old messages.

Please post your new messages in the new forum:
CFP UBISEQ 2022 - Guangzhou, China Deadline: June 15, 2022
Date: February 03, 2022 07:12AM

Call for Papers for the Second International Conference on Ubiquitous Security

(UbiSec 2022)

Venue & Dates:

Zhangjiajie, China, November 15 - 18, 2022



The Second International Conference on Ubiquitous Security (UbiSec 2022) stems from three conference/symposium/workshop series:

(1) The well-established SpaCCS conference series with Springer LNCS: UbiSec is inspired by the SpaCCS style of three tracks (Security, Privacy, and Anonymity, "Spa" for short), which covers "Big Security" leveraging computation, communication and storage ("CCS" for short) systems and networks. UbiSec extends this style with three new tracks: Cyberspace Security, Cyberspace Privacy, and Cyberspace Anonymity.

(2) The UbiSafe symposium series: UbiSec follows the UbiSafe vision on "Ubiquitous Safety", also meaning that "YOU (will) BE SAFE" (pronounced "UbiSafe"winking smiley. UbiSec extends this vision to "Ubiquitous Security", using "Big Security" to embrace NOT ONLY security, privacy and anonymity, BUT ALSO safety, reliability, dependability, trustworthiness and more, also meaning that "YOU (will) BE SEC(ure)" (pronounced "UbiSec"winking smiley.

(3) The IWCSS workshop series: UbiSec follows the IWCSS theme on "Cyberspace Security", with "Cyberspace" as the 5th national sovereign space besides the traditional four domains of land, sea, air, and aerospace. UbiSec extends this theme to "Ubiquitous Security", meaning that cyberspace will be secure, physical world will be secure, social networking systems will be secure, and thus "YOU (will) BE SECure"!

The UbiSec 2022 Conference ("The Conference" for short) is the second event in the series of conferences/symposia/workshops which are devoted to security, privacy and anonymity in cyberspace, physical world, and social networks. The Conference covers many dimensions including security algorithms and architectures, privacy-aware policies, regulations and techniques, anonymous computation and communication, encompassing fundamental theoretical approaches, practical experimental projects, and commercial application systems for cyberspace, physical world, and social networking systems. As applications of computer and information technology have permeated in every aspect of our daily life, the issues of security, privacy, and anonymity have become increasingly critical. The Conference will provide a forum for world-class researchers to gather and share their research achievements, emerging ideas and trends in the highly challenging research fields.

UbiSec 2022 follows the UbiSec 2021 conference in Guangzhou and also the traditions of previous successful SpaCCS/UbiSafe/IWCSS conference/symposium/workshop series, held in Nanjing, China (SpaCCS 2020/UbiSafe 2020), Guangzhou, China (IWCSS 2020); Altanta, USA (SpaCCS 2019/UbiSafe 2019), Guangzhou, China (IWCSS 2019); Melbourne, Australia (SpaCCS 2018/UbiSafe 2018), Guangzhou China (IWCSS 2018); Guangzhou, China (SpaCCS 2017/UbiSafe 2017/IWCSS 2017); Zhangjiajie, China (SpaCCS 2016/UbiSafe 2016); Helsinki, Finland (UbiSafe 2015); Beijing, China (UbiSafe 2014); Melbourne, Australia (UbiSafe 2013); Liverpool, UK (UbiSafe 2012); Changsha, China (UbiSafe 2011); Chengdu China (UbiSafe 2009); and Niagara Falls, Canada (UbiSafe 2007). The conference aims at bringing together researchers and practitioners in the world working in the research fields of security, privacy, and anonymity aspects of computer systems and networks. The conference will focus on broad areas of architectures, algorithms, techniques, and applications for cyberspace security, cyberspace privacy, and cyberspace anonymity.

Scope and Interests

Topics of particular interest include, but not limited to:

Track 1: Cyberspace Security

Security Model and Architecture
Software and System Security
Trustworthy Computing
Security in Cloud/Fog/Edge Computing and Pervasive/Ubiquitous Computing
Machine Learning and AI Security
Network Security
Attacks and Defenses
Intrusion Detection and Prevention
Security in Web Services
Security in Mobile Social Networks
Security in Internet of Things
Fraud and Cyber Crime
Accounting and Auditing
Applied Cryptography
Database Security
Forensics and Diagnostics for Security
Information Hiding
Security in Big Data and its Applications
Blockchain and Distributed System Security
Security in Hardware, Side Channels, and CyberPhysical Systems
Security in Formal Methods and Programming Languages

Track 2: Cyberspace Privacy

Economics, Policies, Metrics, and Mechanisms of Privacy
Privacy Modeling and Analysis
Privacy-Preserving Computing
Privacy-Preserving Data Mining
Privacy-enhancing Technologies and Anonymity
Privacy for the Internet of Things
Privacy in Big Data and its Applications
Privacy-Preserving in Blockchain
Privacy-Preserving in Mobile Social Networks
Privacy-Preserving Crowdsensing
Privacy-Preserving Deep Learning

Track 3: Cyberspace Anonymity

Anonymous Data Mining and Data Sharing
Anonymous Management in Trust Relationships
Anonymous Video Analytics Technology
Anonymity Metrics, Measures and Evaluations
Anonymity Models, Hardware/Device of Anonymity
Anonymity in Wireless Communication Systems
Anonymous Communication Protocols
Anonymity in Mobile, Ad Hoc, and Wireless Sensor Networks
Anonymous Communication and Internet
Anonymous Social Networks, Structural k-Anonymity in Social Networks
Authentication Protocol Providing User Anonymity
Anonymous Information Storage and Management
Private and Anonymous Data Storage
Anonymity, Pseudonymity & Identity Management
Anonymity in Big Data and Cloud Scenarios
Anonymity in Health and Medical Databases
Anonymity in Sensor-Cloud Systems
Anonymity in Edge Computing

Submission and Publication Information

All presented papers in the conference will be published in the conference proceedings with Springer Communications in Computer and Information Science (CCIS). Papers must be clearly presented in English, must not exceed 14 pages in Springer CCIS format (or up to 20 pages with the pages over length charge), including tables, figures, references and appendices. Notice that accepted papers less than 12 pages will be tagged as Short Papers. Papers should be submitted through the EasyChair paper submission system at the conference website. Distinguished papers, after further revisions, will be considered for possible publication in SCI & EI indexed special issues of prestigious international journals. The program committee will select and give two or three "Best Paper Awards" for the conference. By submitting a paper to the conference, authors assure that if the paper is accepted, at least one author will attend the conference and present the paper.

Important Dates

Paper Submission Deadline:

June 15, 2022

Author Notification:

August 15, 2022

Author Registration Due:

September 15, 2022

Camera-Ready Paper Due:

September 15, 2022

Conference Date:

November 15 - 18, 2022


Please email inquiries concerning UbiSec 2022 to:

UbiSec2022 AT googlegroups DOT com

Options: ReplyQuote

This forum is powered by Phorum and provided by P. Fournier-Viger (© 2012).
Terms of use.