Technical Tracks

Track 8: Security, Privacy, and Trust
Track Co-Chairs:
Rui Zhang, University of Delaware, USA, ruizhang@udel.edu
Abderrahim Benslimane, University of Avignon, France,Abderrahim.benslimane@univ-avignon.fr
Haojin Zhu, Shanghai Jiao Tong University, China, zhu-hj@cs.sjtu.edu.cn

Description:
The widespread network connectivity and the rapid proliferation of Internet applications—such as broadband mobile networks, Cloud/Edge computing, and the Internet of Things that underpin numerous smart-world systems—have increasingly intertwined our society with connected networks and applications. However, ensuring security, privacy, and trust within these systems has emerged as one of the most pressing challenges we face today. Despite the availability of numerous solutions, there is a growing need for new methods and algorithms to enhance security and trust, safeguard user and system privacy, and foster stronger practices through compelling incentives. The Security, Privacy, and Trust track invites submissions of original research papers from both academia and industry practitioners that present novel contributions in algorithms, system designs, implementations, and evaluations. We welcome papers in these and related areas.

Track Topics:
• Anonymous Communication and Applications
• Blockchain and Decentralized Trust Management
• Confidential Computing and Next Frontiers in Security
• Cloud/Edge Security and Privacy
• Computer Network Security and Privacy
• Computer and Network Forensics
• Cyber Threat Intelligence
• Cyber-physical System Security
• Data Security and Multiparty Access Control
• Intelligent Forensics Tools, Techniques and Procedures
• Optimization of Utility-Privacy Tradeoffs
• Security Driven Configuration Management
• Security, Privacy, and Trust for Machine Learning and Artificial Intelligence
• Security, Privacy, and Trust for Big Data
• Security, Privacy, and Trust for Cyber-Physical Systems
• Security, Privacy, and Trust for Networked Control Systems
• Security, Privacy, and Trust for Resource-Constrained Devices
• Security, Privacy, and Trust for Software Defined Networking
• Security, Privacy, and Trust for Wireless Networks
• Machine Learning and Artificial Intelligence for Security, Privacy, and Trust
• Smart Cards and Secure Hardware
• Penetration Testing and Network Security
• Private Information Retrieval
• Privacy-Preserving Data Aggregation
• Privacy-Preserving Trust Management
• Trust and Reputation Models
• Usable Security and Privacy
• Vulnerability, Exploitation Tools, and Virus/Worm Analysis

TPC list:
• Guoxing Chen, Shanghai Jiao Tong University, China, guoxingchen@sjtu.edu.cn
• Yingfei Dong, University of Hawaii, USA yingfei@hawaii.edu
• Song Fang, University of Oklahoma, USA songf@ou.edu
• Xing Gao, University of Delaware, USA xgao@udel.edu
• Linke Guo, Clemson University, USA linkeg@clemson.edu
• Xiaonan Guo, George Mason University, USA xguo8@gmu.edu
• Hongxin Hu, University at Buffalo, USA hongxinh@buffalo.edu
• Yidan Hu, Rochester Institute of Technology, USA yidan.hu@rit.edu
• Ming Li, University of Texas at Arlington, USA ming.li@uta.edu
• Qinghua Li, University of Arkansas, USA qinghual@uark.edu
• Shaofeng Li, Southeast University, China, shaofengli2013@gmail.com
• Tao Li, Purdue University, USA litao@purdue.edu
• Hongbo Liu, Electronic Science and Technology of China, China hongbo.liu@uestc.edu.cn
• Yao Liu, University of South Florida, USA yliu21@usf.edu
• Zhuo Lu, South Florida University, USA zhuolu@usf.edu
• Lichuan Ma, Xidian University, China, lcma@xidian.edu.cn
• Yan Meng,Shanghai Jiao Tong University, china,yan_meng@sjtu.edu.cn
• Wenhai Sun, Purdue University, USA whsun@purdue.edu
• Boyang Wang, University of Cincinnati, USA boyang.wang@uc.edu
• Wei Wang, Saint Louis University, USA wei.wang.5@slu.edu
• Yan Wang, Temple University, USA y.wang@temple.edu
• Xiangyu Xu, Southeast University, China, xy-xu@seu.edu.cn
• Xu Yuan, University of Delaware, USA xyuan@udel.edu
• Qiben Yan, Michigan State University, USA qyan@msu.edu
• Zheng Yan, Xidian University, China zyan@xidian.edu.cn
• Jie Yang, University of Electronic Science and Technology of China, China yangjie1126@163.com
• Chenhao Ying, Shanghai Jiao Tong University, China, yingchenhao@sjtu.edu.cn
• Jiadi Yu, Shanghai Jiao Tong University, China jiadiyu@sjtu.edu.cn
• Le Yu, Shanghai Maritime University, China, yule@shmtu.edu.cn
• Shucheng Yu, Stevens Institute of Technology, USA syu19@stevens.edu
• Wei Yu, Towson University, USA wyu@towson.edu
• Kai Zeng, George Mason University, USA kzeng2@gmu.edu
• Ning Zhang, Washington University in St. Louis, USA zhang.ning@wustl.edu
• Ziming Zhao, University at Buffalo, USA z.zhao@northeastern.edu
• Lu Zhou, Xidian University, China, zhoulu@xidian.edu.cn