酒店预订已开启

我的酒店预订订单

已截止
活动简介

We are delighted to invite you to participate in the 4th International Conference on Big Data and Security (ICBDS 2022) will be held during December 8-12, 2022 in Xiamen, China.

组委会

General Chairs

Ting Huai Ma, Nanjing University of Information Science and Technology, China

Yi Pan, Georgia State University, USA

Muhammad Khurram Khan, King Saud University, Saudi Arabia

Yuan Tian, Nanjing Institute of Technology, China

 

Technical Program Chairs

Qingshan Jiang,Shenzhen Institutes of Advanced Technology,Chinese Academy of Science

Qi Liu, Nanjing University of Information Science and Technology, China

 

Technical Program Committee Members

Eui-Nam Huh, Kyung Hee University, South Korea

Heba Abdullataif Kurdi, Massachusetts Institute of Technology, USA

Omar Alfandi, Zayed University, UAE

DongXue Liang, Tsing Hua University, China

Mohammed Al-Dhelaan, King Saud University, Saudi Arabia
Päivi Raulamo-Jurvanen, University of Oulu, Finland

Zeeshan Pervez, University of the West of Scotland, Scotland

Adil Mehmood Khan, Innopolis University, Russia

Wajahat Ali Khan, Kyung Hee University, Korea
Qiao Lin Ye, Nanjing Forestry University, China
Pertti Karhapää, University of Oulu, Finland

Farkhund Iqbal, Zayed University, UAE

Muhammad Ovais Ahmad, Karlstad University, Sweden

Lejun Zhang, Yangzhou University, China
Linshan Shen, Harbin Engineering University, China

Ghada Al-Hudhud, King Saud University, Saudi Arabia 
Lei Han, Nanjing Institute of Technology, China

Tang Xin, University of International Relations, China

Zeeshan Pervez, University of West of Scotland, Scotland
Mznah Al Rodhaan, King Saud University, Saudi Arabia

Yao Zhenjian, Huazhong University of Science and Technology, China

Thant Zin Oo, Kyung Hee University, South Korea
Mohammad Rawashdeh, University of Central Missouri, United States

Alia Alabdulkarim, King Saud University, Saudi Arabia
Elina Annanperä, University of Oulu, Finland

Soha Zaghloul Mekki, King Saud University, Saudi Arabia

Basmah Alotibi, King Saud University, Saudi Arabia

Mariya Muneeb, King Saud University, Saudi Arabia
Maryam hajakbari, Islamic Azad University, Iran

Miada Murad, King Saud University, Saudi Arabia

Pilar Rodríguez, The Technical University of Madrid, Spain
Zhiwei Wang, Hebei Normal University, China
Rand.J, Shaqra University, Saudi Arabia
Jiagao Wu, Nanjing University of Posts and Telecommunications, China
Weipeng Jing, Northeast Forestry University, China
Yu Zhang, Harbin Institute of Technology, China
Nguyen H. Tran, University of Sydney, Australia
Hang Chen, Nanjing Institute of Technology, China

Sarah alkharji, King Saud University, Saudi Arabia

Chunguo Li, Southeast University, China

Babar Shah, Zayed University, UAE

Tianyang Zhou, State Key Laboratory of Mathematical Engineering and Advanced Computing, China

Manal Hazazi, King Saud University, Saudi Arabia

Jiagao Wu, Nanjing University of Posts and Telecommunications, China

Amiya Kumar TRIPATHY, Edith Cowan University, Australia

Shaoyong Guo, Beijing University of Posts and Telecommunications, China 

Shadan AlHamed, King Saud University, Saudi Arabia

Cunjie Cao, Hainan University, China

Linfeng Liu Nanjing University of Posts and Telecommunications, China

Chunliang Yang, China Mobile IoT Company Limited, China

Patrick Hung, University of Ontario Institute of Technology, Canada

Xinjian Zhao, State Grid Nanjing Power Supply Company,China

Sungyoung Lee, Kyung Hee University, South Korea

Zhengyu Chen, Jinling Institute of Technology, China

Jian Zhou Nanjing University of Posts and Telecommunications, China

Pasi Kuvaja, University of Oulu, Finland

Xiao Xue, Tianjin University, China
Jianguo Sun, Harbin Engineering University, China
Farkhund Iqbal, Zayed University, UAE
Zilong Jin, Nanjing University of Information Science and Technology, China
Susheela Dahiya, University of Petroleum & Energy Studies, India

Ming Pang, Harbin Engineering University, China
Yuanfeng Jin, Yanbian University, China
Maram Al-Shablan, King Saud University, Saudi Arabia
Kejia Chen , Nanjing University of Posts and Telecommunications, China

Valentina Lenarduzzi, University of Tampere, Finland

Davide Taibi, University of Tampere, Finland

Jinghua Ding, Sungkyunkwan University, South Korea

XueSong Yin, Nanjing Institute of Technology, China
Qiang Ma, King Saud University, Saudi Arabia

Shiwen Hu, Accelor Ltd., USA

Manar Hosny, King Saud University, Saudi Arabia

Lei Cui, Chinese Academy of Sciences (CAS), China

Yonghua Gong, Nanjing University of Posts and Telecommunications, China

Kashif Saleem, King Saud University, Saudi Arabia

Xiaojian Ding, Nanjing University of Finance and Economics, China

Irfan Mohiuddin, King Saud University, Saudi Arabia

Ming Su, Beijing University of Posts and Telecommunications, China 

Yunyun Wang, Nanjing University of Posts and Telecommunications, China
Abdullah Al-Dhelaan, King Saud University, Saudi Arabia

 

Workshop Chairs

Mohammad Mehedi Hassan, King Saud University, Saudi Arabia

Asad Masood Khattak, Zayed University, UAE

 

Publication Chair

Vidyasagar Potdar, Curtin University, Australia

 

Organization Chairs

Qingshan Jiang, Shenzhen Institute of Advanced Technology, Chinese Academy of Sciences, China

Zhong Tan, Xiamen University, China

 

Organization Committee Members

Jalal Al Muhtadi, King Saud University, Saudi Arabia

GengYang, Nanjing University of Posts and Telecommunications, China

Qiao Lin Ye, Nanjing Forestry University, China

Pertti Karhapää, University of Oulu, Finland

Lei Han, Nanjing Institute of Technology, China

Yong Zhu,Jingling Instituteof Technology, China

Bin Xie, Hebei Normal University, China

Dawei Li, Nanjing Institute of Technology, China

Jing Rong Chen, Nanjing Institute of Technology, China

Thant Zin Oo, Kyung Hee University, South Korea

Alia Alabdulkarim, King Saud University, Saudi Arabia

Rand.J, Shaqra University, Saudi Arabia

Hang Chen, Nanjing Institute of Technology, China

Jiagao Wu, Nanjing University of Posts and Telecommunications, China

征稿信息

重要日期

2022-10-15
初稿录用日期
2022-08-31
终稿截稿日期

征稿范围

1. Topics of interest include, but are not limited to:

  • Big Data
  • Security in Blockchain
  • IoT Security
  • Security in Cloud and Fog Computing
  • Artificial Intelligence/Machine Learning Security
  • Cybersecurity & Privacy

2. The following Workshops will be conducted as part of the conference:

Big Data

  • Big data models and algorithms
  • Big data management
  • Tools and systems for big data
  • Big data analytics and social media
  • Hardware/software infrastructure for big data
  • Mobile communications and networks
  • Security applications of big data
  • Big data protection, integrity and privacy 
  • Big data search and mining  
  • Machine learning and AI for big data
  • Big data persistence and preservation
  • Big data quality and provenance control
  • Big data for enterprise, government and society
  • Big data storage and retrieval

IoT Security

  • Security and privacy issues in IoT
  • Identity and access management in IoT
  • Usable security and privacy frameworks for home networks
  • Security architectures for the IoT stack
  • IoT ecosystem-level security analysis
  • Network architectures and protocols for scalable, robust, secure, and privacy enhancing IoT
  • Measurement of industrial IoT
  • Secure operating systems in IoT

Security in Cloud and Fog Computing

  • Cloud/fog Computing Architecture and Systems
  • Information management in cloud/fog computing
  • Auditing and accountability in cloud/fog computing
  • Access control mechanisms in cloud/fog computing
  • Security models and frameworks for cloud/fog applications
  • Key management in cloud/fog computing
  • Privacy preserving in cloud/fog computing
  • Privacy enhanced technologies for cloud/fog applications
  • Data confidentiality in cloud/fog devices
  • Security Evaluation and Benchmarks Based on cloud/fog computing
  • Intrusion Detection & Prevention in cloud/fog computing
  • Cyber physical security of cloud/fog devices

Artificial Intelligence/Machine Learning Security 

  • Adversarial attacks on machine learning 
  • Defenses against adversarial attacks 
  • Security of deep learning systems 
  • Theoretical foundations of machine learning security 
  • Formal verification of machine learning models 
  • Differential privacy and privacy-preserving learning 
  • Vulnerability discovery 

Cybersecurity & Privacy

  • Post Quantum Cybersecurity
  • Visualization for Security
  • Cryptography and key algorithms
  • Language-based Security
  • Location Privacy and Exposure
  • Mobile security
  • Network security and malware
  • Usability/energy/cost/efficiency of security in the network

 

作者指南

Paper Submission

  • The submission has not been previously published anywhere, and should not be submitted to any other conferences before and during the ICBDS2022 reviewing process.
  • All submissions should be prepared in English language.
  • Papers are 12-15 LNCS pages including figures and references.
  • For any difficulties and other issues regarding submission, please contact:icbdsconf@yeah.net

 

Acceptance

Manuscripts should present the current research in areas identified in the call for papers. All submitted manuscripts will be reviewed by experts in the field and will be judged on problem significance, contributions, originality, correctness, technical strength, quality of presentation, relevance, and value to conference attendees.

Publication

All the accepted paper (including regular submission and workshop papers),will be published in the proceedings with Springer in their Communications in Computer and Information Science series (EI-Index)

留言
验证码 看不清楚,更换一张
全部留言
重要日期
  • 12月08日

    2022

    会议日期

  • 08月31日 2022

    终稿截稿日期

  • 10月15日 2022

    初稿录用通知日期

主办单位
厦门大学
移动端
在手机上打开
小程序
打开微信小程序
客服
扫码或点此咨询