Track Co-Chairs:
Michele Nogueira Lima, Federal University of Minas Gerais, Brazil, michele@dcc.ufmg.br
Wei Yu, Towson University, USA, wyu@towson.edu
Description:
The universal network connectivity and the rapid growth of Internet applications (such as broadband mobile networks, Cloud/Edge computing, and Internet of Things that support numerous smart-world systems) have made our society more and more depending on connected networks and applications. However, how to enforce security, privacy and trust in these systems has become one of the most critical issues we are facing. Although we already have many solutions, new methods and new algorithms are needed for enforcing security and trust, preserving user and system privacy, and encouraging better and stronger practices with strong incentives. The Security, Privacy and Trust track welcomes submissions of original research papers from academic and practitioners which show novel contributions on algorithms, system designs, implementations, and evaluations. We welcome papers in the following areas and other related areas.
• Anonymous Communication and Applications
• Blockchain and Decentralized Trust Management
• Confidential Computing and Next Frontiers in Security
• Cloud/Edge Security and Privacy
• Computer Network Security and Privacy
• Computer and Network Forensics
• Cyber Threat Intelligence
• Cyber-physical System Security
• Data Security and Multiparty Access Control
• Intelligent Forensics Tools, Techniques and Procedures
• Optimization of Utility-Privacy Tradeoffs
• Security Driven Configuration Management
• Security, Privacy, and Trust for Artificial Intelligence
• Security, Privacy, and Trust for Big Data
• Security, Privacy, and Trust for Cyber-Physical Systems
• Security, Privacy, and Trust for Networked Control Systems
• Security, Privacy, and Trust for Resource-Constrained Devices
• Security, Privacy, and Trust for Software Defined Networking
• Security, Privacy, and Trust for Wireless Networks
• Smart Cards and Secure Hardware
• Penetration Testing and Network Security
• Private Information Retrieval
• Privacy-Preserving Data Aggregation
• Privacy-Preserving Trust Management
• Trust and Reputation Models
• Usable Security and Privacy
• Vulnerability, Exploitation Tools, and Virus/Worm Analysis
TPC list:
• Lourenço A Pereira, Instituto Tecnológico de Aeronautica, Brazil
• Jeandro Bezerra, Federal University of Ceara, Brazil
• Fei Chen, Shenzhen University, China
• Xuhui Chen, Kent State University, USA
• Zhijiang Chen, Frostburg State University, USA
• Long Cheng, Clemson University, USA
• Yuan Cheng, Grand Valley State University, USA
• Baek-Young Choi, University of Missouri - Kansas City, USA
• Lin Deng, Towson University, USA
• Zhenhai Duan, Florida State University, USA
• Parisa Eslami, University of Maryland Baltimore County, USA
• Song Fu, University of North Texas, USA
• Xinwen Fu, University of Massachusetts Lowell, USA
• Linqiang Ge, Columbus State University, USA
• Yong Guan, Iowa State University, USA
• Yifan Guo, Towson University, USA
• Kun Hua, California Polytechnic State University, USA
• Xin Huang, Towson University, USA
• Woosub June, Towson University, USA
• Fanxin Kong, University of Notre Dame, USA
• Kai Li, San Diego State University, USA
• Qingqing Li, Towson University, USA
• Wenjia Li, New York Institute of Technology, USA
• Weixian Liao, Towson University, USA
• Zhen Ling, Southeast University, China
• Anyi Liu, Oakland University, USA
• Xing Liu, Sam Houston State University, USA
• Akshita Maradapu Vera Venkata Sai, Towson University, USA
• Jianbing Ni, Queen's University, Canada
• Cheng Qian, Towson University, USA
• Mohamed Rahouti, Fordham University, USA
• Xuebin Ren, Xi'an Jiaotong University, China
• Pu Tian, Stockton University, USA
• Emmanouil Vasilomanolakis, Technical University of Denmark, Denmark
• Alex Vieira, DCC - UFJF, Brazil
• An Wang, Case Western Reserve University, USA
• Jianwu Wang, University of Maryland, Baltimore County, USA
• Qianlong Wang, Towson University, USA
• Wei Wang, San Diego State University, USA
• Sixiao Wei, Intelligent Fusion Technology, Inc., USA
• Yang Xiao, The University of Alabama, USA
• Guobin Xu, Frostburg State University, USA
• Qing Yang, University of North Texas, USA
• Hanlin Zhang, Towson University, China
• Yue Zhang, Drexel University, USA
• Yuchen Zhao, University of York, United Kingdom
• Jingyi Zheng, Auburn University, USA