The First IEEE International Conference on Trust, Privacy and Security in Intelligent Systems, and Applications (IEEE TPS 2019) (URL: http://www.sis.pitt.edu/lersais/tps/2019/index.html) Sponsored by IEEE Computer Society (TC on Internet) [Right after IEEE Big Data 2019: https://cci.drexel.edu/bigdata/bigdata2019/CallPapers.html] [Co-located with conferences IEEE CIC 2019 & IEEE MIC 2019] Scope Recent advances in computing and information technologies such as IoT, mobile Edge/Cloud computing, cyber- physical-social systems, Artificial Intelligence/Machine Learning/ Deep Learning, etc., have paved way for creating next generation smart and intelligent systems and applications that can have transformative impact in our society while accelerating rapid scientific discoveries and innovations. Such newer technologies and paradigms are getting increasingly embedded in the computing platforms and networked information systems/infrastructures that form the digital foundation for our personal, organizational and social processes and activities. It is increasingly becoming critical that the trust, privacy and security issues in such digital environments are holistically addressed to ensure the safety and well-being of individuals as well as our society. IEEE TPS-ISA is an international multidisciplinary forum for presentation of state-of-the art innovations, and discussion among academic, industrial researchers, and practitioners on issues related to trust, privacy and security in emerging smart and intelligent systems and applications. Topics Topics of interest include, but are not limited to: Foundational, theoretical models for trust, privacy and security in emerging applications Trusted AI, Machine Learning and Deep Learning Privacy preserving Machine Learning and Deep Learning Trustworthy, safe and resilient intelligent systems Trusted, privacy-conscious and secure systems, applications and networks/infrastructures Security and privacy in IoT and Cyber-physical-human systems Trustworthy and secure Human-Machine collaboration Access and trust management/negotiation, and secure information flow/sharing Bio-inspired approaches to trust, privacy and security Game theoretical approaches to trust, privacy, and security Adversarial machine learning Trust, privacy and security for big data systems, applications and platforms Trust, privacy and security for smart cities and urban computing Machine Learning / Deep learning over encrypted data Usability and human factors for trust, privacy and security Tools, techniques and metrics for trust, privacy and security Anonymization techniques and differential privacy for emerging intelligent applications Trust, privacy and security approaches for services computing: microservices, service-oriented architectures, service composition and orchestration Blockchain and Distributed-ledger technologies Blockchain/Distributed ledger for e-commerce, mobile commerce and intelligent applications Bias, fairness and integrity/robustness of algorithmic machine / AI algorithms Trusted, privacy-aware and secure interoperation of interacting/collaborative systems Threat models and attack modeling for AI/ML and applications Identification/Detection of spam, phishing, malware and APTs Cryptographic approaches and secure multiparty computation Privacy-preserving data mining and big data analytics Application of AI/ML and Deep learning for trust, privacy and security Trust, privacy and security in edge/cloud computing, social computing Safe and trusted autonomous vehicles/UAVs, robotics Trust, security and safety in supply-chain environments and critical infrastructures Data quality/credence, privacy and provenance Trust in social media – disinformation/misinformation Risk metrics and measurements, assessment/analysis and mitigation Insider threat modeling, analysis and mitigation; behavioral modeling for security and trust Digital payments and cryptocurrencies; Secure and trustworthy e-commerce and mobile commerce Trust negotiation and/or propagation in interacting systems of systems, multi-agent systems, social networks. Important Dates Abstract Due August 23, 2019 (Highly Recommended) Submission Deadline August 30, 2019 Acceptance Notification September 30, 2019 Camera Ready: October 15, 2019 Blue Sky/Vision Track We would like to solicit papers that promote visionary ideas and blue sky thinking in areas aligned with the conference themes. These papers are expected to spark intense discussions and newer research directions/insights through potentially disruptive, controversial, or highly cross-disciplinary ideas that look forward to Trust, Privacy and Security areas for the next 10 years and beyond. Ideas that are just being conceived, not fully developed, far from experimentally evaluated, or out-of-the box are highly encouraged. The papers should follow the same format as the regular conference papers and are limited to 6 pages. Industry Track Papers We would like to solicit papers that focus on design, implementation and deployment of solutions related to Trust, privacy and security within the industrial or government environments. The papers submitted to this track are expected to advance practical and applied research focused on the use of TPS technologies, and real-world networks, systems applications. The Industry/Government Track will include papers selected through a separate program committee. Authors must clearly indicate sub-areas their papers are to be evaluated in because distinct criteria may be used for reviewing different category of submissions: Deployed:Deployed systems that aim to provide real practical value to industry, Government, or other organizations, or communities. The papers should point out how the deployed system explicitly address TPS issues or describe either qualitatively (lessons learnt, deployment experiences, etc.) or quantitatively how Trust, Privacy and Security issues are addressed in smart, intelligence systems and applications. Emerging:Newer models and mechanisms or innovative solutions related to trust, privacy and security in networks, systems and applications are expected here. The authors should clearly demonstrate value and interest to Industry, Government of society (e.g., scientific or medical professions; critical infrastructures). Papers that describe infrastructure development and deployment that enables the large-scale deployment of trusted, safe, secure and privacy-aware technologies/applications or their validation are also in these areas. Awards IEEE TPS will feature a Best Paper award and a Best Student Paper award (to be selected by the program committee/best paper award team). A paper is eligible for the Best Student Paper award if the first author is a full-time student at the time of submission. A partial travel grant or cash award may be offered to the winner student depending on the availability of funds. Paper Submission We invite original research papers that have not been previously published and are not currently under review for publication elsewhere. Contributions addressing all areas related to trust, privacy and security issues related to networks, systems, and applications are solicited. Papers submitted to Regular or Industry/Gov track should be no longer than 10 pages in the standard two column IEEE proceedings format, which can be found at Manuscript Templates for Conference Proceedings. The papers can be submitted at EasyChair. Workshops Proposals Proposals for half-day or full day workshops that focus on IEEE TPS 2019 related themes are solicited. Workshop proposals should be at most five pages, including a biographical sketch of each instructor, and submitted to the Workshop Chairs. Proposals will be evaluated based on the expertise and experience of the organizers and the relevance and importance of the subject matter. Please refer to call for workshop proposals for details. Panels Proposals Proposals for panel discussions that focus on future visions relevant to trust, privacy and security are preferred. Potential panel organizers should submit a panel proposal of at most five pages, including biographical sketches of the proposed panelists to the Panel Chairs. Tutorials Proposals Proposals for full and half-day tutorials are solicited. Tutorials are intended to enhance the technical program, and as such they should be relevant to the conference related themes. Potential tutorial presenters should submit a tutorial proposal of at most three pages, including: description of potential audience and background knowledge expected from the audience, if any; tutorial description; biographical sketch(s) of presenter(s). Organizing Committee General Co-Chairs Ravi Sandhu, University of Texas, San Antonio, United States Kui Ren, Zhejiang University, China Program Co-Chairs Elisa Bertino, Purdue University, USA Elena Ferrari, University of Insubria, Italy Jaideep Vaidya, Rutgers University, USA Industry/Gov Track Co-Chairs Yuecel Karabulut, Oracle, United States Mudhakar Srivatsa, IBM Watson, United States Workshop Co-Chairs Barbara Carminati, University of Insubria, Italy Danda Rawat, Howard University, United States Sponsorship Co-Chairs James Joshi, University of Pittsburgh, United States Ling Liu, Gerogia Tech, United States Proceedings Chair Amirreza Masoumzadeh, State University of New York at Albany, United States Publicity Co-Chair Cong Wang, City University of Hong Kong, China Finance and Local Arrangements Chair Julian Jarrett, Drexel University, United States Student Travel Grants Co-Chair Amirreza Masoumzadeh, State University of New York at Albany, United States Webmaster Runhua Xu, University of Pittsburgh, United States Steering Committee James Joshi, Chair, University of Pittsburgh, USA Arun Iyengar, IBM, USA Calton Pu, Georgia Institute of Technology, USA Dimitrios Gerogakopolous, Swinsburne University of Technology, Australia Elisa Bertino, Purdue University, USA Karl Aberer, EPFL, Switzerland Ling Liu, Georgia Institute of Technology, USA M. Brian Blake, Drexel University, USA Tao Zhang, Cisco, USA Weisong Shi, Wayne State University, USA Zhaohui Wu, Zhejiang University, China
|