==============  UbiSec 2022 ====================================================

Call for Papers (CFPs) of 
The Second International Conference on Ubiquitous Security (UbiSec 2022)

Zhangjiajie, China, November 15 - 18, 2022

Organizer: Guangzhou University, China
http://ubisecurity.org/2022/


Conferences Pivoting to a Part-Virtual Platform
[UbiSec 2022] - Now Taking Place Part-Virtually
Due to the current COVID-19 situation, the UbiSec 2022 conference will
be a combination of online and offline event. For authors who consider
to present their papers online, please pay a half of author
registration fees for each paper and show this "Half Registration
Fees" information in the "Remarks" field in the registration form; For
attendees who will join the conference online, please pay a half of
attendee registration fees and show this "Half Registration Fees"
information in the "Remarks" field in the registration form. For
questions, contact [UbiSec2022 AT googlegroups DOT com].


================================================================================

Keynote Speeches Section

You are welcome to attend 5+ Keynote Speeches offerred by world-renowned professors and industry leaders. The detailed information will appear soon.

(1) Keynote 1: Prof. Richard Hill, University of Huddersfield, UK
Title: Next Generation Security for Cyber Physical Systems
https://pure.hud.ac.uk/en/persons/richard-hill

(2) Keynote 2: Prof. Tien N. Nguyen, University of Queensland, Australia
Title: TBD.
https://personal.utdallas.edu/~tien.n.nguyen/

(3) Keynote 3: Prof. Omer Rana, Cardiff University, UK
Title: Security-Aware Task Execution across the Edge-Cloud Continuum
https://www.cardiff.ac.uk/people/view/118157-rana-omer

(4) Keynote 4: Prof. Kouichi SAKURAI, Kyushu University, Japan
Title: State and Issues of Non-Fungible Token from Technical Point of View
https://hyoka.ofc.kyushu-u.ac.jp/search/details/K000220/english.html

(5) Keynote 5: Prof. Deqing Zou, Huazhong University of Science and Technology, China 
Title: Achieving Scalability and Interpretability Simultaneously in Detecting Multi-granularity Vulnerabilities
http://faculty.hust.edu.cn/zoudeqing/zh_CN/index.htm

======================================================================

Invited Talks Section

You are welcome to attend 10+ Invited Talks offerred by world-renowned professors and industry leaders. The detailed information will appear soon.

(1) Prof. Arcangelo Castiglione, University of Salerno, Italy
Title: New Insights on Cryptographic Hierarchical Access Control: Models, Schemes, and Analysis
https://docenti.unisa.it/026260/en/home

(2) Prof. Scott Fowler, Linkoping University, Sweden
Title: Optimize Industrial IoT HVAC by using Machine Learning
https://liu.se/en/employee/scofo47, https://sites.google.com/site/scofo47

(3) Prof. Wenjun Jiang, Hunan University, China
Title: Online user analysis and learning optimization
http://csee.hnu.edu.cn/people/jiangwenjun

(4) Prof. Ryan Ko, University of Queensland, Australia
Title: TBD.
https://itee.uq.edu.au/profile/1409/ryan-ko

(5) Prof. Qin Liu, Hunan University, China
Title: Secure Search in Cloud Computing and Emerging Applications
https://qinliu-hnu.github.io/

(6) Prof. Sabu M. Thampi, Kerala University of Digital Sciences, Innovation and Technology (KUDSIT), India
Title: Security and Privacy Issues in the Internet of Drones
http://www.sabumthampi.in

(7) Prof. Tian Wang, Beijing Normal University, China
Title: Distributed Mobile Computation Offloading and Edge Intelligence
https://cist.bnu.edu.cn/xygk/szdw/zgj/104104.html

(8) Prof. Carlos Becker Westphall, Federal University of Santa Catarina, Brazil
Title: Mutual Authentication with Multi-factor and Hybrid Approach to Intrusion Detection in IoT-Fog-Cloud Environment
https://lrg.ufsc.br/westphal/

(9) Prof. Yulei Wu, University of Exeter, UK
Title: Trustworthiness of anomaly detection for IIoT
http://empslocal.ex.ac.uk/people/staff/yw433/

(10) Prof. Yang Xu, Hunan University, China
Title: Blockchain-enabled Cloud Security: Frameworks and Solutions
http://csee.hnu.edu.cn/people/xuyang
======================================================================

Panel Discussions Section

You are welcome to attend 2+ Panel Discussions offerred by
world-renowned professors and industry leaders. The detailed
information will appear soon.

======================================================================

Special Issues Section

Distinguished papers, after further revisions, will be published in 10+ SCI & EI indexed special issues. 

Here is the list of Special Issues that we will recommend high-quality
papers for possible publication *:

(1) IEICE Transactions on Information and Systems (SCI & EI Indexed,
Impact Factor: 0.559)
Special Section on Blockchain and Security (Pending).

(2) Information Sciences (SCI & EI Indexed, Impact Factor: 6.795) 
Special Issue on Decentralized Trust Management with Intelligence (Pending).

(3) Sensors (SCI & EI Indexed, Impact Factor: 3.576)
Special Issue on Fog/Edge Computing based Smart Sensing System
 http://www.mdpi.com/journal/sensors/special_issues/FCSCS
Deadline for manuscript submissions: 31 March 2023.

(4) Connection Science (SCI & EI Indexed, Impact Factor: 1.972)
https://www.tandfonline.com/ccos20 
Some selected conference papers will be recommended for possible
publication in regular issues of this journal, with a sufficient
amount of new materials added into the journal version.  Deadline for
manuscript submissions: 31 March 2023.

(5) Sensors (SCI & EI Indexed, Impact Factor: 3.576)
Special Issue on Security and Privacy for Edge, Fog, and Cloud
Computing; the Internet of Things and Mobile Crowdsensing
https://www.mdpi.com/journal/sensors/special_issues/SP_EFC 
Deadline for manuscript submissions: 10 October 2022.

(6) Electronics (SCI & EI Indexed, Impact Factor: 2.397)
Special Issue on Cybersecurity and Privacy Issues in Cyber-Physical
Systems and Industrial Control Systems
https://www.mdpi.com/journal/electronics/special_issues/cyber_industrial_control
Deadline for manuscript submissions: 25 November 2022.

(7) International Journal of Computational Science and Engineering
    (IJCSE) (EI Indexed)
http://www.inderscience.com/browse/index.php?journalCODE=ijcse 
Some selected conference papers will be recommended for possible
publication in regular issues of this journal, with a sufficient
amount of new materials added into the journal version.  Deadline for
manuscript submissions: 31 March 2023.

(8) Distributed Ledger Technologies: Research and Practice (DLT) (EI Indexed)
Special Issue on Recent Advances of Blockchain Evolution: Architecture
and Performance
https://dl.acm.org/pb-assets/static_journal_pages/dlt/pdf/DLT-SI-Recent-Advances-Blockchain-Evolution-1651176743000.pdf
Deadline for manuscript submissions: 15 December 2022.

(9) Acta Informatica Pragensia
Special Issue on Deep Learning Blockchain-enabled Technology for
Improved Healthcare Industrial Systems
https://aip.vse.cz/getrevsrc.php?identification=public&mag=aip&raid=305&type=fin&ver=1
Deadline for manuscript submissions: 20 December 2022. 

* More special issues will be available soon.

======================================================================

Welcome to participate in UbiSec 2022, Zhangjiajie, China, November 15
- 18, 2022! Zhangjiajie is an emerging tourist destination famous for
its unique natural scenery and abundant tourism resources. It is
located in the northwest of Hunan province, about 400 kilometers away
from Changsha, the capital of Hunan province, covering a total area of
9,516 square kilometers, of which 76% are mountainous area. Out of its
total population of 1.52 million, almost 77% belong to ethnic minority
groups, including Tujia, Bai and Miao nationalities. Zhangjiajie
National Forest Park was established by the State Council in 1982 as
the first National Forest Park of China. Wulingyuan in Zhangjiajie was
listed into the World Natural Heritage Catalogue by the UNESCO in 1992
and appraised as a national AAAAA scenic area. Zhangjiajie was awarded
the title of "World Geological Park" in 2004. The amazing landscape
here had been a source of creation of the CGI artist in the Avatar
movie, and since the movie was released and achieved a great success,
many tourists keeping coming to Zhangjiajie admiring this natural
beauty.

The Second International Conference on Ubiquitous Security (UbiSec
2022) stems from three conference/symposium/workshop series:

(1) The well-established SpaCCS conference series with Springer LNCS:
UbiSec is inspired by the SpaCCS style of three tracks (Security,
Privacy, and Anonymity, "Spa" for short), which covers "Big Security"
leveraging computation, communication and storage ("CCS" for short)
systems and networks. UbiSec extends this style with three new tracks:
Cyberspace Security, Cyberspace Privacy, and Cyberspace Anonymity.

(2) The UbiSafe symposium series: UbiSec follows the UbiSafe vision on
"Ubiquitous Safety", also meaning that "YOU (will) BE SAFE"
(pronounced "UbiSafe"). UbiSec extends this vision to "Ubiquitous
Security", using "Big Security" to embrace NOT ONLY security, privacy
and anonymity, BUT ALSO safety, reliability, dependability,
trustworthiness and more, also meaning that "YOU (will) BE SEC(ure)"
(pronounced "UbiSec").

(3) The IWCSS workshop series: UbiSec follows the IWCSS theme on
"Cyberspace Security", with "Cyberspace" as the 5th national sovereign
space besides the traditional four domains of land, sea, air, and
aerospace. UbiSec extends this theme to "Ubiquitous Security", meaning
that cyberspace will be secure, physical world will be secure, social
networking systems will be secure, and thus "YOU (will) BE SECure"!

The UbiSec 2022 Conference ("The Conference" for short) is the second
event in the series of conferences/symposia/workshops which are
devoted to security, privacy and anonymity in cyberspace, physical
world, and social networks. The Conference covers many dimensions
including security algorithms and architectures, privacy-aware
policies, regulations and techniques, anonymous computation and
communication, encompassing fundamental theoretical approaches,
practical experimental projects, and commercial application systems
for cyberspace, physical world, and social networking systems. As
applications of computer and information technology have permeated in
every aspect of our daily life, the issues of security, privacy, and
anonymity have become increasingly critical. The Conference will
provide a forum for world-class researchers to gather and share their
research achievements, emerging ideas and trends in the highly
challenging research fields.

UbiSec 2022 follows the UbiSec 2021 conference in Guangzhou and also
the traditions of previous successful SpaCCS/UbiSafe/IWCSS
conference/symposium/workshop series, held in Nanjing, China (SpaCCS
2020/UbiSafe 2020), Guangzhou, China (IWCSS 2020); Altanta, USA
(SpaCCS 2019/UbiSafe 2019), Guangzhou, China (IWCSS 2019); Melbourne,
Australia (SpaCCS 2018/UbiSafe 2018), Guangzhou China (IWCSS 2018);
Guangzhou, China (SpaCCS 2017/UbiSafe 2017/IWCSS 2017); Zhangjiajie,
China (SpaCCS 2016/UbiSafe 2016); Helsinki, Finland (UbiSafe 2015);
Beijing, China (UbiSafe 2014); Melbourne, Australia (UbiSafe 2013);
Liverpool, UK (UbiSafe 2012); Changsha, China (UbiSafe 2011); Chengdu
China (UbiSafe 2009); and Niagara Falls, Canada (UbiSafe 2007). The
conference aims at bringing together researchers and practitioners in
the world working in the research fields of security, privacy, and
anonymity aspects of computer systems and networks. The conference
will focus on broad areas of architectures, algorithms, techniques,
and applications for cyberspace security, cyberspace privacy, and
cyberspace anonymity.

UbiSec 2022 topics include, but are not limited to the following:

Track 1: Cyberspace Security

    --Security Model and Architecture
    --Software and System Security
    --Trustworthy Computing
    --Security in Cloud/Fog/Edge Computing and Pervasive/Ubiquitous Computing
    --Machine Learning and AI Security
    --Network Security
    --Attacks and Defenses
    --Intrusion Detection and Prevention
    --Security in Web Services
    --Security in Mobile Social Networks
    --Security in Internet of Things
    --Fraud and Cyber Crime
    --Accounting and Auditing
    --Applied Cryptography
    --Database Security
    --Authentication
    --Forensics and Diagnostics for Security
    --Information Hiding
    --Security in Big Data and its Applications
    --Blockchain and Distributed System Security
    --Security in Hardware, Side Channels, and CyberPhysical Systems
    --Security in Formal Methods and Programming Languages
 

Track 2: Cyberspace Privacy

    --Economics, Policies, Metrics, and Mechanisms of Privacy
    --Privacy Modeling and Analysis
    --Privacy-Preserving Computing
    --Privacy-Preserving Data Mining
    --Privacy-enhancing Technologies and Anonymity
    --Privacy for the Internet of Things
    --Privacy in Big Data and its Applications
    --Privacy-Preserving in Blockchain
    --Privacy-Preserving in Mobile Social Networks
    --Privacy-Preserving Crowdsensing
    --Privacy-Preserving Deep Learning
 

Track 3: Cyberspace Anonymity

    --Anonymous Data Mining and Data Sharing
    --Anonymous Management in Trust Relationships
    --Anonymous Video Analytics Technology
    --Anonymity Metrics, Measures and Evaluations
    --Anonymity Models, Hardware/Device of Anonymity
    --Anonymity in Wireless Communication Systems
    --Anonymous Communication Protocols
    --Anonymity in Mobile, Ad Hoc, and Wireless Sensor Networks
    --Anonymous Communication and Internet
    --Anonymous Social Networks, Structural k-Anonymity in Social Networks
    --Authentication Protocol Providing User Anonymity
    --Anonymous Information Storage and Management
    --Private and Anonymous Data Storage
    --Anonymity, Pseudonymity & Identity Management
    --Anonymity in Big Data and Cloud Scenarios
    --Anonymity in Health and Medical Databases
    --Anonymity in Sensor-Cloud Systems
    --Anonymity in Edge Computing

IMPORTANT DATES
Paper Submission Deadline: June 15, 2022
Author Notification: August 15, 2022
Author Registration Due: September 15, 2022
Camera-Ready Paper Due: September 15, 2022
Conference Dates: November 15 - 18, 2022

SUBMISSION and PUBLICATION INFORMATION
All presented papers in the conference will be published in the
conference proceedings with Springer Communications in Computer and
Information Science (CCIS). Papers must be clearly presented in
English, must not exceed 14 pages in Springer CCIS format (or up to 20
pages with the pages over length charge), including tables, figures,
references and appendices. Notice that accepted papers less than 12
pages will be tagged as Short Papers. Papers should be submitted
through the EasyChair paper submission system at the conference
website. Distinguished papers, after further revisions, will be
considered for possible publication in SCI & EI indexed special issues
of prestigious international journals. The program committee will
select and give two or three "Best Paper Awards" for the
conference. By submitting a paper to the conference, authors assure
that if the paper is accepted, at least one author will attend the
conference and present the paper.

Excecutive General Chair
Guojun Wang, Guangzhou University, China

Local Organizing Chair
Jianfeng Li, Jishou University, China

General Chairs
Richard Hill, University of Huddersfield, United Kingdom
Aniello Castiglione, University of Naples Parthenope, Italy

Program Chairs
Guojun Wang, Guangzhou University, China
Kim-Kwang Raymond Choo,University of Texas at San Antonio, USA
Jie Wu, Temple University, USA
Ernesto Damiani, Khalifa University, UAE/Universita' degli Studi di
   Milano, Italy

Program Vice Chairs
(1) Cyberspace Security Track
Qin Liu, Hunan University, China
Wenjia Li, New York Institute of Technology, USA
Jie Hu, University of Electronic Science and Technology of China, China
Saed Alrabaee, United Arab Emirates University, UAE
Charalambos (Harrys) Konstantinou, King Abdullah University of Science
   and Technology, Saudi Arabia

(2) Cyberspace Privacy Track
Yulei Wu, University of Exeter, United Kingdom
Wenjun Jiang, Hunan University, China
Saqib Ali, University of Agriculture Faisalabad, Pakistan
Md Tariqul Islam, Syracuse University, USA
Saad Khan, University of Huddersfield, United Kingdom

(3) Cyberspace Anonymity Track
Tian Wang, Beijing Normal University & UIC, China
A. S. M. Kayes, La Trobe University, Australia
Oana Geman, University of Suceava, Romania
Mamoun Alazab, Charles Darwin University, Australia
Hudan Studiawan, Institut Teknologi Sepuluh Nopember, Indonesia

Publicity Chairs
Carlos Becker Westphall, Federal University of Santa Catarina, Brazil
Scott Fowler, Linkoping University, Sweden
Peter Mueller, IBM Zurich Research Laboratory, Switzerland
Haroon Elahi, Umea University, Sweden
Yulei Wu, University of Exeter, United Kingdom
Xiangyong Liu, Guangzhou University, China

Workshop Chairs
Sabu M. Thampi, Kerala University of Digital Sciences, Innovation and
   Technology (KUDSIT), India
Arcangelo Castiglione, University of Salerno, Italy
Shuhong Chen, Guangzhou University, China

Publication Chairs
Tao Peng, Guangzhou University, China
Fang Qi, Central South University, China

Registration Chairs
Xiaofei Xing, Guangzhou University, China
Pin Liu, Central South University, China
Pengfei Yin, Jishou University, China

Conference Secretariat
Wenyin Yang, Foshan University, China

Web Chairs
Jiemin Huang, Foshan University, China
Yuming Xia, Foshan University, China

Steering Committee
Guojun Wang, Guangzhou University, China (Chair)
Kim-Kwang Raymond Choo, University of Texas at San Antonio, USA (Chair)
Saqib Ali, University of Agriculture Faisalabad, Pakistan
Valentina E. Balas, Aurel Vlaicu University of Arad, Romania
Md Zakirul Alam Bhuiyan, Fordham University, USA
Jiannong Cao, The Hong Kong Polytechnic University, Hong Kong
Aniello Castiglione, University of Naples Parthenope, Italy
Scott Fowler, Linkoping University, Sweden
Oana Geman, University of Suceava, Romania
Richard Hill, University of Huddersfield, United Kingdom
Ryan Ko, University of Queensland, Australia
Kuan-Ching Li, Providence University, Taiwan
Jianhua Ma, Hosei University, Japan
Gregorio Martinez, University of Murcia, Spain
Peter Mueller, IBM Zurich Research Laboratory, Switzerland
Kouichi Sakurai, Kyushu University, Japan
Sabu M. Thampi, Indian Institute of Information Technology and
  Management - KeralaKerala University of Digital Sciences, Innovation
  and Technology (KUDSIT), India
Carlos Becker Westphall, Federal University of Santa Catarina, Brazil
Jie Wu, Temple University, USA
Yang Xu, Hunan University, China
Zheng Yan, Xidian University, China/Aalto University, Finland
Wenyin Yang, Foshan University, China
Haojin Zhu, Shanghai Jiao Tong University, China

Program Committee
Please check the "Program Committee" web page at the conference
website for detail:
http://ubisecurity.org/2022/

Archived Conference Proceedings:

(1) UbiSec 2021 Conference Proceedings
https://link.springer.com/book/10.1007/978-981-19-0468-4

(2) SpaCCS 2020 Conference Proceedings
https://link.springer.com/book/10.1007/978-3-030-68851-6

SpaCCS 2020 Workshops Proceedings
https://link.springer.com/book/10.1007/978-3-030-68884-4

(3) SpaCCS 2019 Conference Proceedings
https://link.springer.com/book/10.1007/978-3-030-24907-6

SpaCCS 2019 Workshops Proceedings
https://link.springer.com/book/10.1007/978-3-030-24900-7

(4) SpaCCS 2018 Conference Proceedings
https://link.springer.com/book/10.1007/978-3-030-05345-1

(5) SpaCCS 2017 Conference Proceedings
https://link.springer.com/book/10.1007/978-3-319-72389-1

SpaCCS 2017 Workshops Proceedings
https://link.springer.com/book/10.1007/978-3-319-72395-2

(6) SpaCCS 2016 Conference Proceedings
https://link.springer.com/book/10.1007/978-3-319-49148-6

SpaCCS 2016 Workshops Proceedings
https://link.springer.com/book/10.1007/978-3-319-49145-5

Contact

Please email inquiries concerning UbiSec 2022 to Prof. Guojun Wang:
csgjwang AT gmail DOT com and Conference Organizers: UbiSec2022 AT
googlegroups.com.

Prof. Guojun Wang, General Chair of UbiSec 2022
http://trust.gzhu.edu.cn/faculty/~csgjwang/