Trust, Security and Privacy in Computing and Communications

Welcome to participate in IEEE TrustCom 2020, Guangzhou, China,
December 29, 2020 - January 1, 2021.  Guangzhou, a city in spring
forever, is the capital city of Guangdong Province. Guangzhou is also
the third largest city in China, located in the north of the Pearl
River Delta, close to Hong Kong and Macau. With evergreen plants and
flowers blooming all year round, the city has an alias of "City of
Flowers". Guangzhou is one of the first batch of 24 historical and
cultural cities released by the State Council, with more than 2200
years of history and profound cultural heritage, and also a major
terminus of the maritime Silk Road. Guangzhou is one of the most
famous tourist resorts in China, with a lot of tourist sites, such as
Baiyun Mountain, Guangzhou Tower, and Yuexiu Park.

The conference aims at bringing together researchers and practitioners
in the world working on trusted computing and communications, with
regard to trust, security, privacy, reliability, dependability,
survivability, availability, and fault tolerance aspects of computer
systems and networks, and providing a forum to present and discuss
emerging ideas and trends in this highly challenging research field.
 

TrustCom 2020 topics include, but are not limited to the following:



Trust Track

    --Trust semantics, metrics and models
    --Trusted computing platform
    --Trusted network computing
    --Trusted operating systems
    --Trusted software and applications
    --Trust in social networks
    --Trust in e-commerce and e-government
    --Trust in mobile and wireless communications
    --Risk and reputation management
    --Survivable computer systems/networks
    --Trust in 5G networks
    --Miscellaneous trust issues in cyber Security
    --System reverse engineering
    --Watermarking and security
    --Cryptanalysis and security solutions

Security Track

    --Network and cyber security
    --Computer security
    --Database security
    --Web applications security
    --Security policy, model and architecture
    --Security in social networks
    --Security in parallel and distributed systems
    --Security in mobile and wireless communications
    --Security in cloud/pervasive computing
    --Authentication, authorization and accounting
    --Security of 5G Networks
    --Miscellaneous security issues
    --Steganography and steganalysis
    --Security-aware facial recognition

Privacy Track

    --Privacy in web-based applications and services
    --Privacy in database systems
    --Privacy in parallel and distributed systems
    --Privacy in cloud/pervasive computing
    --Privacy in mobile and wireless communications
    --Privacy in e-commerce and e-government
    --Privacy in network deployment and management
    --Privacy and trust
    --Privacy and security
    --Privacy and anonymity
    --Privacy preservation in 5G
    --Miscellaneous privacy issues
    --Privacy-preserving biometrics

Forensics and Analytics Track

    --Anti-forensics and analytics
    --Big data forensics
    --CCTV forensics
    --Cloud forensics
    --Computational forensics
    --Cyber-physical system forensics
    --Datamining for forensics
    --Fingerprint forensics
    --Image forensics
    --Malware forensics
    --Mobile app forensics (e.g. Skype, WeChat and Facebook)
    --Mobile device forensics
    --Multimedia forensics
    --Network forensics

Emerging Tech Track

    --Emerging hardware security
    --Emerging security problems and solutions in edge/fog computing
    --Emerging paradigms of deep learning in security
    --Emerging applications of reinforcement learning for securing networks
    --Emerging secure mechanisms for service delivery models
    --Emerging quantum safe cryptography for 5G
    --Emerging web vulnerabilities and countermeasures
    --Emerging techniques in intelligent transportation systems
    --Emerging network attacks & anomalies detection and prevention
    --Emerging approaches to cybersecurity
    --Emerging techniques in identity management
    --Emerging approaches of smart contract and distributed ledger
    --Emerging blockchain techniques


IMPORTANT DATES

Paper Submission Deadline: July 29, 2020
Author Notification: September 29, 2020
Camera-Ready Paper Due: October 29, 2020
Conference Dates: December 29, 2020 - January 1, 2021

SUBMISSION and PUBLICATION INFORMATION

All papers need to be submitted electronically through the conference
website
(https://easychair.org/my/conference?conf=ieeetrustcom2020). Submitted
papers must not substantially overlap with papers that have been
published or that are simultaneously submitted to a journal or a
conference with proceedings. A submission is limited to 8 pages for
main conference regular papers, 6 pages for workshop papers or short
papers in the IEEE Computer Society Proceedings Format with Portable
Document Format (.pdf)
(https://www.ieee.org/conferences/publishing/templates.html). A
submission can have at most 4 additional pages with the pages
overlength charge if accepted. Papers must be clearly presented in
English, including tables, figures, references and appendices. Papers
will be selected based on their originality, significance, relevance,
and clarity of presentation assessed by at least three
reviewers. Submission of a paper should be regarded as a commitment
that, should the paper be accepted, at least one of the authors will
register and attend the conference to present the work. IEEE TrustCom
2020 reserves the right to exclude a paper from distribution after the
conference (e.g., removal from the digital library and indexing
services), if the paper is not presented at the conference. Accepted
and presented papers will be included in the IEEE CPS
Proceedings. Distinguished papers presented at the conference, after
further revision, will be published in special issues of high quality
international journals. Two or three outstanding papers will be
selected to receive the Best Paper Awards.

General Chairs

Guojun Wang, Guangzhou University, China
Peter Mueller, IBM Zurich Research Laboratory, Switzerland
Albert Zomaya, The University of Sydney, Australia

Program Chairs

Ryan Ko, University of Queensland, Australia
Md Zakirul Alam Bhuiyan, Fordham University, USA
Yi Pan, Georgia State University, USA

Program Vice Chairs

Track 1: Trust Track

Priyadarsi Nanda, University of Technology, Australia
Sheikh Mahbub Habib, Continental AG, Germany
Jie Hu, University of Electronic Science and Technology, China
Mohammad, Shojafar, Ryerson University, Canada
Gerardo Pelosi, Politecnico di Milano, Italy
Zheng Yan, Xidian University, China/Aalto University, Finland

Track 2: Security Track

Raja Naeem Akram, Royal Holloway University of London, United Kingdom
Dongseong Kim, The University of Queensland, Australia
Jonathan Oliver, Trend Micro, Australia
Yulei Wu, Exeter University, United Kingdom
Vimal Kumar, University of Waikato, New Zealand
Jaydip Sen, National Institute of Science & Technology, India
Zhe Liu, Nanjing University of Aeronautics and Astronautics, China
Jean-Luc Beuchat, University of Applied Sciences Western Switzerland,
   Switzerland

Track 3: Privacy Track

Ken Barker, University of Calgary, Canada
Shujie Cui, Imperial College, United Kingdom
Thomas Plantard, University of Wollongong, Australia
Mamoun Alazab, Charles Darwin University, Australia
Changqing Luo, Virginia Commonwealth University, USA
Ismail San, Eskisehir Technical University, Turkey

Track 4: Forensics and Analytics Track

Nour Moustafa, University of New South Wales Canberra, Australia
Julian Jang-Jaccard, Massey University, New Zealand
Ban Tao, NICT, Japan
Jianming Yong, University of Southern Queensland, Australia
Brian Cusack, Auckland University of Technology, New Zealand
Adnan Anwar, Deakin University, Australia

Track 5: Emerging Technologies Track

Jose Lopes Esteves, ANSSI, France
Rongxing Lu, University of New Brunswick, Canada
Ricardo Seguel, Universidad Adolfo Ibanez, Chile
Mike Johnstone, Edith Cowan University, Australia
Pelin Angin, Middle East Technical University, Turkey
Yuli Yang, University of Lincoln, UK
Abderrahim Benslimane, University of Avignon, France
Vallipuram Muthukkumarasamy, Griffith University, Australia


Journal Special Issue Chairs

Zheng Yan, Xidian University, China/Aalto University, Finland
Arcangelo Castiglione, University of Salerno, Italy
Georgios Kambourakis, University of the Aegean, Greece
Qin Liu, Hunan University, China
Tian Wang, Huaqiao University, China

Workshop Chairs

Debiao He, Wuhan University, China
Syed Hassan Ahmed, JMA Wireless, USA

Local Organizing Committee Chair

Jianer Chen, Guangzhou University, China




Publicity Chairs

Carlos Becker Westphall, Federal University of Santa Catarina, Brazil
Aniello Castiglione, University of Naples Parthenope, Italy
Wenbin Jiang, Huazhong University of Science and Technology, China
Muhammad Faizan Khan, Guangzhou University, China


Publication Chairs

Tao Peng, Guangzhou University, China
Fang Qi, Central South University, China

Registration Chairs

Xiaofei Xing, Guangzhou University, China
Pin Liu, Central South University, China

Conference Secretariat

Wenyin Yang, Foshan University, China

Webmasters

Junyu Ma, Guangzhou University, China

Mingrui Yang, Guangzhou University, China


Steering Committee

Guojun Wang, Guangzhou University, China (Chair)
Laurence T. Yang, St. Francis Xavier University, Canada (Chair)
Jiannong Cao, Hong Kong Polytechnic University, Hong Kong
Hsiao-Hwa Chen, National Cheng Kung University, Taiwan
Jinjun Chen, Swinburne University of Technology, Australia
Kim-Kwang Raymond Choo, University of Texas at San Antonio, USA
Minyi Guo, Shanghai Jiao Tong University, China
Weijia Jia, Macau University, Macau
Ryan Ko, University of Queensland, Australia

Jie Li, Shanghai Jiao Tong University, China
Jianhua Ma, Hosei University, Japan
Gregorio Martinez, University of Murcia, Spain
Peter Mueller, IBM Zurich Research Laboratory, Switzerland
Maria S. Perez-Hernandez, Universidad Politecnica de Madrid, Spain
Indrakshi Ray, Colorado State University, USA
Srinivas Sampalli, Dalhousie University, Canada
Kouichi Sakurai, Kyushu University, Japan
Bhavani Thuraisingham, The University of Texas at Dallas, USA
Jie Wu, Temple University, USA
Wanlei Zhou, University of Technology, Sydney, Australia

CALL FOR PROPOSALS for SYMPOSIA, WORKSHOPS and SPECIAL SESSIONS

The IEEE TrustCom 2020 Symposia/Workshops/Special Sessions provide
vibrant opportunities for academic researchers and industry
practitioners to share their research experiences, original research
achievements and practical development products on specific new
challenges and emerging issues. The themes of the IEEE TrustCom 2020
Symposia, Workshops and Special Sessions should be related to the
scopes of the IEEE TrustCom 2020 main conference, reflecting to
advances in all aspects of Trust, Security and Privacy in Computing
and Communications. Please email your workshop proposals in PDF format
by May 31, 2020 to: the TrustCom 2020 workshop co-chairs, Prof. Debiao
He (hedebiao@163.com) and Prof. Syed Hassan Ahmed (sh.ahmed@ieee.org).

For submission guidelines in detail please see "Call for Workshop
Proposals" at: http://ieee-trustcom.org/TrustCom2020/



Contact

Please email inquiries concerning IEEE TrustCom 2020 to Prof. Guojun Wang: csgjwang AT gmail DOT com and Conference Organizers: TrustCom2020@googlegroups.com.

Prof. Guojun Wang, General Chair of IEEE TrustCom 2020
http://trust.gzhu.edu.cn/faculty/~csgjwang/