[Apologies if you receive multiple copies of this CFP]
IA^3 2017
Seventh Workshop on Irregular Applications: Architectures and Algorithms
http://hpc.pnl.gov/IA3/
November 13, 2017
In conjunction with SC17
In collaboration with ACM SIGHPC
Sponsored by IEEE TCHPC
Call for Papers
Irregular applications occur in many subject matters. While inherently parallel, they exhibit highly variable execution performance at a local level due to unpredictable memory access patterns and/or network transfers, divergent control structures, and data imbalances. Moreover, they often require fine-grain synchronization and communication on large-data structures such as graphs, trees, unstructured grids, tables, sparse matrices, deep nets, and their combinations (such as, for example, attributed graphs). They have a significant degree of latent parallelism, which however is difficult to exploit due to their complex behavior. Current high performance architectures rely on data locality and regular computation to reduce access latencies, and often do not cope well with the requirements of these applications. Furthermore, irregular applications are difficult to scale on current supercomputing machines, due to their limits in fine-grained synchronization and small data transfers.
Irregular applications pertain both to well established and emerging fields, such as machine learning, social network analysis, bioinformatics, semantic graph databases, Computer Aided Design (CAD), and computer security. Many of these application areas also process massive sets of unstructured data, which keep growing exponentially. Addressing the issues of irregular applications on current and future architectures will become critical to solve the challenges in science and data analysis of the next few years.
This workshop seeks to explore solutions for supporting efficient execution of irregular applications in the form of new features at the level of the micro- and system-architecture, network, languages and libraries, runtimes, compilers, analysis, algorithms. Topics of interest, of both theoretical and practical significance, include but are not limited to:
* Micro- and System-architectures, including multi- and many-core designs, heterogeneous processors, accelerators (GPUs, vector processors, Automata processor), reconfigurable (coarse grained reconfigurable and FPGA designs) and custom processors
* Network architectures and interconnect (including high-radix networks, optical interconnects)
* Novel memory architectures and designs (including processors-in memory)
* Impact of new computing paradigms on irregular workloads (including neuromorphic processors and quantum computing)
* Modeling, simulation and evaluation of novel architectures with irregular workloads
* Innovative algorithmic techniques
* Combinatorial algorithms (graph algorithms, sparse linear algebra, etc.)
* Impact of irregularity on machine learning approaches
* Parallelization techniques and data structures for irregular workloads
* Data structures combining regular and irregular computations (e.g., attributed graphs)
* Approaches for managing massive unstructured datasets (including streaming data)
* Languages and programming models for irregular workloads
* Library and runtime support for irregular workloads
* Compiler and analysis techniques for irregular workloads
* High performance data analytics applications, including graph databases
Besides regular papers, papers describing work-in-progress or incomplete but sound, innovative ideas related to the workshop theme are also encouraged. We solicit both 8-page regular papers and 4-page position papers. Authors of exciting but not mature enough regular papers may be offered the option of a short 4-page paper and related short presentation.
Artifact Evaluation
For this edition of IA3, authors of accepted regular papers will be invited to formally submit their supporting materials to the Artifact Evaluation process, similarly to the process followed for SC17. The participation to the Artifact Evaluation process is voluntary and will not change decisions regarding the paper. However, papers that undergo the evaluation process will receive a seal of approval on the paper, and will be able to participate in the BEST PAPER AWARD selection. DIVIDITI will provide an Amazon Gift Voucher (valued $200) to the authors of the paper that passes artifact evaluation with the highest score and that shares the artifact in the CK (Collective Knowledge - https://github.com/ctuning/ck) format. Authors that go through the Artifact Evaluation process are also encouraged (but not mandated) to submit the supporting materials as “Source Materials” in the digital library. For details on how to submit supporting materials to the Artifact Evaluation process, please refer to: http://ctuning.org/ae/submission.html.
For any additional question on the Artifact Evaluation process please contact the Artifact Evaluation Chair Flavio Vella.
Important Dates
Abstract submission: 22 August 2017
Position or full paper submission: 29 August 2017
Notification of acceptance: 3 October 2017
Camera-ready position and full papers: 10 October 2017
Workshop: 13 November 2017
Submissions
Submission site: https://easychair.org/conferences/?conf=ia32017
All submissions should be in double-column, single-spaced letter format, with at least one-inch margins on each side and respect the ACM standard proceedings templates (sigconf) available at: https://www.acm.org/publications/proceedings-template.
The proceedings of the workshop will be published in cooperation with ACM SIGHPC.
Submitted manuscripts may not exceed eight (8) pages in length for regular papers and four(4) pages for position papers including figures, tables and references.
Organizers
Antonino Tumeo, PNNL, US
John Feo, PNNL/NIAC, US,
Vito Giovanni Castellana, PNNL, US
Artifact Evaluation Chair
Flavio Vella, DIVIDITI, UK
Publication Chair
Marco Minutoli, PNNL, US
Program Committee
Scott Beamer, LBNL, US
Michela Becchi, North Carolina State University, US
Erik Boman, Sandia National Laboratories, US
David Brooks, Harvard University, US
Aydin Buluc, LBNL, US
Sunita Chandrasekaran, University of Delaware, US
Fabio Checconi, IBM, US
Rajiv Gupta, Univerisity of California Riverside, US
Maya Gokhale, LLNL, US
Peter Kogge, Univ. of Notre Dame, US
Vivek Kumar, Rice University, US
John Leidel, Texas Tech University, US
Kamesh Madduri, Pennsylvania State University, US
Naoya Maruyama, RIKEN AICS, JP
Tim Mattson, Intel, US
Miquel Moreto, BSC and UPC, SP
Richard Murphy, Micron Technology Inc, US
Walid Najjar, University of California Riverside, US
Maxim Naumov, NVIDIA, US
Jacob Nelson, University of Washington, US
Sreepathi Pai, University of Rochester, US
Roger Pearce, LLNL, US
Miquel Pericas, Chalmers University, SE
Viktor Prasanna, University Of Southern California, US
Alejandro Rico, ARM, US
Jason Riedy, Georgia Institute of Technology, US
Erik Saule, University of North Carolina at Charlotte, US
John Shalf, LBNL, US
Shaden Smith, University of Minnesota, US
Bora Ucar, CNRS and LIP ENS Lyon, FR
Ruud Van Der Pas, Oracle, US
Flavio Vella, DIVIDITI, UK
Ana Lucia Varbanescu, University of Amsterdam, NL
*** 10th HiPC Student Research Symposium (SRS) ***
Held in conjunction with the
24th IEEE INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING, DATA, and
ANALYTICS (HIPC 2017)
December 18-21, 2017 | Jaipur, INDIA | www.hipc.org
HiPC 2017 will feature the 10th Student Research Symposium on High
Performance Computing, Data, and Analytics (HPC) aimed at stimulating and
fostering student research, and providing an international forum to
highlight student research accomplishments. The symposium will also provide
exposure to students in the best practices in HPC in academia and industry.
The symposium will feature student posters and provide students with other
enriching experiences, such as workshops, industry exhibits, and demos. The
Conference Reception and multiple Student Symposium Poster Exhibit sessions
will provide an opportunity for students to interact with HPC researchers
and practitioners (and recruiters) from academia and industry. Papers are
solicited in all areas of high-performance computing, data, and analytics.
Awards for Best Poster will be presented at the symposium. An online book
containing the resumes of the students participating in the symposium will
be compiled and made available to the sponsors of the HiPC 2017 conference.
IMPORTANT DATES
Aug 15, 2017 - Submission Opens
Sep 16, 2017 - Submission Deadline
Nov 1, 2017 - Accept/Reject Decision Notification
Dec 18-21, 2017 - Symposium
ELIGIBILITY
Submissions should have at least one author who is a student during any
part of the calendar year 2017. Submissions may have multiple student or
non-student co-authors. Submissions must mark student authors with an
asterisk (*).
SUBMISSION INSTRUCTIONS
In order to be considered for a poster at the student Research Symposium,
authors must submit papers, not exceeding five (5) letter size (8.5in x
11in) pages, in 11 or 12 point font, singled spaced, with 1'' margins on
all sides. Papers are to be submitted online in PDF format through
Easychair at: https://easychair.org/conferences/?conf=hipcsrs10.
The papers will be used to select posters, but will NOT be published in the
conference proceedings. This will provide students flexibility to publish
an extended version of their paper at other venues, after benefiting from
reviewer feedback from the symposium. Papers submitted to the symposium are
expected to be reviewed by at least three independent reviewers. Papers
will be judged on technical merit, quality, relevance to the symposium, and
related parameters. Plagiarism is prohibited. Papers that are plagiarized
will be rejected and the corresponding department and institution will be
notified.
Facilities for displaying posters will be made available and the exact
specifications of the poster size will be provided later. At least one
student author of each paper that is accepted must register and attend the
conference to present their work. Papers with no-shows will be
retroactively rejected.
TRAVEL SUPPORT
We expect to provide a travel scholarship to at least one student author of
each accepted submission from an Indian university, subject to availability
of funding. This scholarship will cover partial expenses for attending the
conference. Further details on this scholarship and the application process
will be provided later.
SYMPOSIUM CO-CHAIRS
KISHORE KOTHAPALLI, IIIT Hyderabad, India
MADHURA PURNAPRAJNA, Amrita Vishwa Vidyapeetham University, India
ASHOK SRINIVASAN, Florida State University, USA
Contact student_symposium(a)hipc.org for more details.
------------------------------------------------------------------------------------------------
Follow us on Twitter https://twitter.com/hipcconf
Google+ https://plus.google.com/+HipcOrg
Facebook https://www.facebook.com/hipc.conference/
------------------------------------------------------------------------------------------------
Dear colleagues,
I invite you and your students to submit your contributions to the PhD
Forum at The 8th International Green and Sustainable Computing Conference
(IGSC¹17). Please find more information below. Thank you!
Best regards
Mahdi Nikdast
**Call for Papers: Ph.D. Forum at The 8th International Green and
Sustainable Computing Conference (IGSC'17)**
Forum webpage: http://igsc.eecs.wsu.edu/forum_17
The Ph.D. forum at IGSC'17 will provide an international forum for
doctoral students engaged in research on sustainable and energy-efficient
computing and/or computing for a more sustainable planet to present their
work to fellow researchers and practitioners in the green and sustainable
computing community. The forum includes a poster session during which the
students can present their work and receive constructive feedback for
completion of their dissertation research. The Ph.D. forum is intended for
students who have already settled on a specific research topic and have
some preliminary results, but still have enough time remaining before
their final defence that they can benefit from the forum discussions.
**Accepted submissions will appear in IGSC'17 proceedings**
*Paper submission guidelines*
Current Ph.D. students are encouraged to submit an extended abstract that
describes their doctoral work. The student should be the sole author of
the paper, but the advisor and other contributors should be acknowledged.
The topics of interest coincide with IGSC'17 are listed in the CFP page
(http://igsc.eecs.wsu.edu/cfp_17). The extended abstract should be three
pages in IEEE conference proceedings style
(http://www.ieee.org/conferences_events/conferences/publishing/templates.ht
ml). All manuscripts should be in pdf format, in English, and registered
and submitted through easychair
(http://easychair.org/conferences/?conf=igsc17) under the "IGSC17 PhD
Forum" submission track.
Please kindly note that:
- The research ideas in submissions should be mature enough to be
presented in a paper and content can evolve to become the substantial part
of a Ph.D. dissertation. The submissions should not have been published
and not under review by other conferences or journals elsewhere.
- The authors should outline related problems in the field and their
current solutions, clearly motivate and formulate the research topic,
present the preliminary idea, the proposed approach, and the preliminary
experimental results achieved thus far, explicitly point out the intended
contributions of the proposed work.
Each submission will be reviewed by members of the forum¼s technical
program committee. Abstracts will be judged on originality, technical
merit, presentation quality, and relevance to the
conference topics. Accepted abstracts will appear in the IGSC conference
proceedings and will be indexed by DBLP and the IEEE digital library. All
invited participants will be asked to provide a poster, which will be
displayed throughout the conference. Authors of accepted submissions are
expected to register for the conference and appear in person to present
their work. The student rate will apply to authors who are currently
full-time students.
*Poster Presentation*
Authors of accepted submissions should prepare a poster for presentation.
Posters will be displayed throughout the conference and the students are
required to be available during the poster session to discuss their work
and answer related questions. The poster size should not exceed 841 x 1189
mm (width x height). The organizers encourage all Ph.D. Students in the
fields of sustainable and energy-efficient computing and computing for a
more sustainable planet to participate in this Ph.D. Forum.
*Ph.D. Forum Chair*
Mahdi Nikdast (Polytechnique Montreal, Canada), mahdi.nikdast(a)polymtl.ca
*Important dates*
Paper submission due: August 31, 2017
Notifications sent to authors: September 4, 2017
Camera-ready papers due: September 7, 2017
==========================================================================
** Call for Papers **
==========================================================================
Third International Workshop on
Heterogeneous High-performance Reconfigurable Computing (H2RC 2017)
Held in conjunction with Supercomputing 2017
Friday Morning, November 17, 2017
Denver, CO
http://h2rc.cse.sc.edu
==========================================================================
Submission Deadline: September 1, 2017 (one page extended abstracts)
==========================================================================
As conventional von-Neumann architectures are suffering from rising
power densities, we are facing an era with power, energy efficiency, and
cooling as first-class constraints for scalable HPC. FPGAs can tailor
the hardware to the application, avoiding overheads and achieving higher
hardware efficiency than general-purpose architectures. Leading FPGA
manufacturers have recently made a concerted effort to provide a range
of higher-level, easier to use high-level programming models for FPGAs.
Such initiatives are already stimulating new interest within the HPC
community around the potential advantages of FPGAs over other
architectures. With this in mind, this workshop, now in its third year,
brings together HPC and heterogeneous-computing researchers to
demonstrate and share experiences on legacy and new high-level
programming models, optimizations specific to scientific computing and
data analytics, tools for performance/energy improvements, FPGA
computing in the cloud, and popular applications for reconfigurable
computing such as machine learning and big data.
==========================================================================
Submissions (one page extended abstract):
Submissions are solicited that explore the state of the art in the use
of FPGAs in heterogeneous high-performance computing architectures and,
at a system level, in data centers and supercomputers. FPGAs may be
considered from either or both the distributed, parallel and composable
fabric of compute elements or from their dynamic reconfigurability. We
particularly encourage submissions which focus on the mapping of
algorithms and applications to heterogeneous FPGA-based systems as well
as the overall impact of such architectures on the compute capacity,
cost, power efficiency, and overall computational capabilities of data
centers and supercomputers. Submissions may report on theoretical or
applied research, implementation case studies, benchmarks, standards, or
any other area that promises to make a significant contribution to our
understanding of heterogeneous high-performance reconfigurable computing
and will help to shape future research and implementations in this
domain.
A non-comprehensive list of potential topics of interest is given below:
1. FPGAs in Supercomputer, Cloud and Data Center: FPGAs in relation to
challenges to Cloud/Data Center/Supercomputing posed by the end of
Dennard scaling
2. Supercomputing, Cloud and Data Center Applications: Exploiting FPGA
compute fabric to implement critical cloud/HPC applications
3. Leveraging Reconfigurability: Using reconfigurability for new
approaches to algorithms used in cloud/HPC applications
4. Benchmarks: Compute performance and/or power and cost efficiency for
cloud/HPC with heterogeneous architectures using FPGAs
5. Implementation Studies: Heterogenous Hardware and Management
Infrastructure
6. Programming Languages/Runtimes/OS/Tools/Frameworks for Heterogeneous
High Performance Reconfigurable Computing
7. Future-gazing: New Applications/The Cloud Enabled by Heterogeneous
High Performance Reconfigurable Computing, Evolution of Computer
Architecture in relation to Heterogeneous High Performance
Reconfigurable Computing
8. Community building: Standards, consortium activity, open source,
education, initiatives to enable and grow Heterogeneous High Performance
Reconfigurable Computing
Prospective authors are invited to submit original and unpublished
contributions as a ONE PAGE EXTENDED ABSTRACT in ACM SIG Proceedings
format.
==========================================================================
You can submit your contribution(s) through a link on the H2RC website:
http://h2rc.cse.sc.edu
==========================================================================
Important dates:
Submission Deadline: September 1, 2017
Acceptance Notification: October 15, 2017
Camera-ready Manuscripts Due: November 4, 2017
Workshop Date: November 17, 2017
==========================================================================
Workshop Format:
H2RC is a half-day Friday workshop. It will be comprised of Keynote and
invited talks and talks selected from paper submissions.
==========================================================================
Organizing Committee:
Workshop Organizers:
Michaela Blott, Xilinx
Franck Cappello, Argonne National Lab
Torsten Hoefler, ETH Zurich
Jason D. Bakos, University of South Carolina
Program Committee:
Rizwan Ashraf, Oak Ridge National Laboratory
Paul Chow, University of Toronto
Carl Ebeling, Altera
Hans Eberle, NVIDIA
Alan George, University of Florida
Christoph Hagleitner, IBM
Miriam Leeser, Northeastern University
Viktor Prasanna, Univ. of Southern California
Marco Santambrogio, Politecnico Di Milano
Jeffrey Vetter, Oak Ridge National Lab
--
Jason D. Bakos, Ph.D.
Professor
Dept. of Computer Science and Engineering
Univ. of South Carolina
301 Main St., Suite 3A01L
Columbia, SC 29208
803-777-8627 (voice), 803-777-3767 (fax)
http://www.cse.sc.edu/~jbakos
jbakos(a)cse.sc.edu
==============================================================================
ESORICS 2017: CALL FOR PARTICIPATION
22nd European Symposium on Research in Computer Security
Oslo, Norway — September 11-15, 2017
==============================================================================
WWW: https://www.ntnu.edu/web/esorics2017/
Overview
------------------------------------
ESORICS is the annual European research event in Computer Security. The
Symposium started in 1990 and has been held in several European
countries, attracting a wide international audience from both the
academic and industrial communities.
The 22nd European Symposium on Research in Computer Security (ESORICS
2017) will be held in Oslo, Norway.
ESORICS 2017 spans a total of 3 days, featuring:
* 3 keynote speeches
(Cormac Herley, Paul Syverson, Sandro Etalle)
* 54 paper presentations in 3 days (Sep 11-13)
* NN workshops (Sept 14 - 15)
Registration
------------------------------------
Early Registration for ESORICS+Workshops 2017 is open, but will end
soon. Early registration deadline is ***August, 15th 2017***
Registration rates:
https://www.ntnu.edu/web/esorics2017/registration
If an invitation letter is needed (e.g. VISA) the letter will be
provided after the registration. To do this, it is necessary to send an
email to the organizing committee: mailto:esorics2017@ntnu.edu
Venue page:
https://www.ntnu.edu/web/esorics2017/venue
Travel and accommodation page:
https://www.ntnu.edu/web/esorics2017/travel-accomodation
We hope to see you in Oslo, Norway!
Presentations Program
------------------------------------
The 54 papers of ESORICS 2017 are distributed between **18 sessions**
in **two parallel tracks**.
Following is the list of paper presentations for the main ESORICS
conference. For the workshop programs, please consult their
corresponding websites:
* SECPRE 2017: https://samosweb.aegean.gr/secpre2017/
* SecSE 2017: http://secse.org
* CBT 2017: http://www.deic.uab.cat/~jherrera/CBT/
* DPM 2017: http://deic.uab.cat/conferences/dpm/dpm2017/
* STM 2017: http://stm2017.di.unimi.it
* QASA 2017: http://www.iit.cnr.it/qasa2017/
* CyberICPS: http://www.ds.unipi.gr/cybericps2017/
* SIoT 2017: http://siot-workshop.org
### September 11 - Day 1 ###########
09:30 - 10:30
* Keynote: Cormac Herley
11:00 - 12:30
* Session 1: Security of embedded things
- Shortfall-based Optimal Placement of Security Resources for Mobile
IoT Scenarios
Antonino Rullo, Edoardo Serra, Elisa Bertino and Jorge Lobo
- Analyzing the Capabilities of the CAN Attacker
Sibylle Froeschle and Alexander Stühring
- Boot Attestation: Secure Remote Reporting with Off-The-Shelf IoT
Sensors
André Schaller, Florian Kohnhäuser, Steffen Schulz and Stefan
Katzenbeisser
* Session 2: Cryptographic Application I
- Per-Session Security: Password-Based Cryptography Revisited
Gregory Demay, Peter Gazi, Ueli Maurer and Björn Tackmann
- Non-Interactive Provably Secure Attestations for Arbitrary RSA Prime
Generation Algorithm
Fabrice Benhamouda, Houda Ferradi, Rémi Géraud and David
Naccache
- Tightly Secure Ring-LWE Based Key Encapsulation with Short
Ciphertexts
Martin Albrecht, Emmanuela Orsini, Kenneth Paterson, Guy Peer and
Nigel Smart
14:00 - 15:30
* Session 3: Documents and Authorship
- Identifying Multiple Authors in a Binary Program
Xiaozhu Meng, Barton Miller and Kwang-Sung Jun
- Verifiable Document Redacting
Herve Chabanne, Rodolphe Hugel and Julien Keuffer
- Source Code Authorship Attribution using Long Short-Term Memory
Based Networks
Bander Alsulami, Edwin Dauber, Richard Harang, Spiros Mancoridis
and Rachel Greenstadt
* Session 4: Analysis of Security Protocols
- Automated analysis of equivalence properties for security protocols
using else branches
Ivan Gazeau and Steve Kremer and Levente Buttyán
- Secure Authentication in the Grid: A formal analysis of DNP3: SAv5
Cas Cremers, Martin Dehnel-Wild and Kevin Milner
- Modular Verification of Protocol Equivalence in the Presence of
Randomness
Matthew Bauer, Rohit Chadha and Mahesh Viswanathan
16:00 - 17:30
* Session 5: Threat Analysis
- Preventing Advanced Persistent Threats in Complex Control Networks
Juan E. Rubio, Cristina Alcaraz and Javier Lopez
- MTD CBITS: Moving Target Defense for Cloud-Based IT Systems
Alexandru G. Bardas, Sathya C. Sundaramurthy, Xinming Ou and Scott
A. Deloach
- Is my attack tree correct?
Maxime Audinot, Sophie Pinchinat and Barbara Kordy
* Session 6: Side Channels and data leakage
- On-Demand Time Blurring to Support Side-Channel Defense
Weijie Liu, Debin Gao and Mike Reiter
- Acoustic Data Exfiltration from Speakerless Air-Gapped Computers via
Covert Hard-Drive Noise
Mordechai Guri, Yosef Solewicz, Andrey Daidakulov and Yuval
Elovici
- Practical Keystroke Timing Attacks in Sandboxed JavaScript
Moritz Lipp, Daniel Gruss, Michael Schwarz, David Bidner,
Clémentine Maurice and Stefan Mangard
### September 12 - Day 2 ###########
09:00 - 10:00
* Keynote: Paul Syverson
10:30 - 12:00
* Session 7: Vulnerabilities and Malware
- Mirage: Toward a Stealthier and Modular Malware Analysis Sandbox for
Android
Lorenzo Bordoni, Mauro Conti and Riccardo Spolaor
- VuRLE: Automatic Vulnerability Detection and Repair by Learning from
Examples
Siqi Ma, Ferdian Thung, David Lo, Cong Sun and Robert Deng
- Adversarial Examples for Malware Detection
Kathrin Grosse, Nicolas Papernot, Praveen Manoharan, Backes
Michael and Patrick McDaniel Russo
* Session 8: Privacy in Systems
- PerfWeb: How to Violate Web Privacy with Hardware Performance Events
Berk Gulmezoglu, Andreas Zankl, Thomas Eisenbarth and Berk Sunar
- SePCAR: A Secure and Privacy-enhancing Protocol for Car Access
Provision
Iraklis Symeonidis, Abdelrahaman Aly, Mustafa Asan Mustafa, Bart
Mennink, Siemen Dhooghe and Bart Preneel
- Privacy Implications of Room Climate Data
Philipp Morgner, Christian Müller, Matthias Ring, Björn
Eskofier, Christian Riess, Frederik Armknecht and Zinaida Benenson
13:30 - 15:00
* Session 9: Network security
- Link-Layer Device Type Classification on Encrypted Wireless Traffic
with COTS Radios
Rajib Ranjan Maiti, Sandra Siby, Ragav Sridharan and Nils Ole
Tippenhauer
- Preventing DNS amplification attacks using the history of DNS
queries with SDN
Soyoung Kim, Sora Lee, Geumhwan Cho, Muhammad Ejaz Ahmed, Jaehoon
Paul Jeong and Hyoungshick Kim
- Zero Round-Trip Time for the Extended Access Control Protocol
Jacqueline Brendel and Marc Fischlin
* Session 10: Controlling Access
- No sugar but all the taste! Memory Encryption without Architectural
Support
Panagiotis Papadopoulos, George Christou, Giorgos Vasiliadis,
Evangelos Markatos and Sotiris Ioannidis
- Tree-based Cryptographic Access Control
James Alderman, Naomi Farley and Jason Crampton
- Securing Data Analytics on SGX With Randomization
Swarup Chandra, Vishal Karande, Zhiqiang Lin, Latifur Khan, Murat
Kantarcioglu and Bhavani Thuraisingham
15:30 - 17:00
* Session 11: Information Flow
- We are Family: Relating Information-Flow Trackers
Musard Balliu, Daniel Schoepe and Andrei Sabelfeld
- A Better Composition Operator for Quantitative Information Flow
Analyses
Kai Engelhardt
- WebPol: Fine-grained Information Flow Policies for Web Browsers
Abhishek Bichhawat, Vineet Rajani, Jinank Jain, Deepak Garg and
Christian Hammer
* Session 12: Blockchain and social networks
- A Traceability Analysis of Monero’s Blockchain
Amrit Kumar, Clément Fischer, Shruti Tople and Prateek Saxena
-RingCT 2.0: A Compact Linkable Ring Signature Based Protocol for
Blockchain Cryptocurrency Monero
Shi-Feng Sun, Man Ho Au, Joseph Liu and Tsz Hon Yuen
- Secure Computation in Online Social Networks
Foteini Baldimtsi, Dimitrios Papadopoulos, Stavros Papadopoulos,
Alessandra Scafuro and Nikos Triandopoulos
### September 13 - Day 3 ###########
09:00 - 10:00
* Keynote: Sandro Etalle
10:30 - 12:30
* Session 13: Web Security
- DeltaPhish: Detecting Phishing Webpages in Compromised Websites
Igino Corona, Battista Biggio, Matteo Contini, Luca Piras, Roberto
Corda, Mauro Mereu, Guido Mureddu, Davide Ariu and Fabio Roli
- DOMPurify: Client-Side Protection against XSS and Markup Injection
Mario Heiderich, Jörg Schwenk and Christopher Spaeth
- Quantifying Web Adblocker Privacy
Arthur Gervais, Alexandros Filios, Vincent Lenders and Srdjan
Capkun
* Session 14: Cryptographic signatures
- Reusing Nonces in Schnorr Signatures
Marc Beunardeau, Aisling Connolly, Remi Geraud, David Naccache and
Damien Vergnaud
- How to Circumvent the Structure-Preserving Signatures Lower Bounds
MEssam Ghadafi
- Server-Supported RSA Signatures for Mobile Devices
Ahto Buldas, Aivo Kalu, Peeter Laud and Mart Oruaas
13:30 - 15:00
* Session 15: Formal techniques
- Inference-Proof Updating of a Weakened View under the Modification
of Input Parameters
Marcel Preuß and Joachim Biskup
- Verifying Constant-Time Implementations by Abstract Interpretation
Sandrine Blazy, David Pichardie and Alix Trieu
- AVR Processors as a Platform for Language-Based Security
Florian Dewald, Heiko Mantel and Alexandra Weber
* Session 16: Privacy and garbled circuits
- Labeled Homomorphic Encryption: Scalable and Privacy-Preserving
Processing of Outsourced Data
Manuel Barbosa, Dario Catalano and Dario Fiore
- New Way for Privacy-Preserving Decision Tree Evaluation
Raymond K. H. Tai, Jack P. K. Ma, Yongjun Zhao and Sherman S. M.
Chow
- Enforcing Input Correctness via Certification in Garbled Circuit
Evaluation
Yihua Zhang, Marina Blanton and Fattaneh Bayatbabolghani
15:30 - 17:00
* Session 17: Intrusion Detection
- Secure IDS Offloading with Nested Virtualization and Deep VM
Introspection
Shohei Miyama and Kenichi Kourai
- Network Intrusion Detection based on Semi-Supervised Variational
Auto-Encoder
Genki Osada, Kazumasa Omote and Takashi Nishide
- LeaPS: Learning-Based Proactive Security Auditing for Clouds
Suryadipta Majumdar, Yosr Jarraya, Momen Oqaily, Amir
Alimohammadifar, Makan Pourzandi, Lingyu Wang and Mourad Debbabi
* Session 18: Cryptographic Applications II
- Multiple Rate Threshold FlipThem
David Leslie, Chris Sherfield and Nigel Smart
- Stringer: Measuring the Importance of Static Data Comparisons to
Detect Backdoors and Undocumented Functionality
Sam L. Thomas, Tom Chothia and Flavio D. Garcia
- Generic Constructions for Fully Secure Revocable Attribute-Based
Encryption
Kotoko Yamada, Nuttapong Attrapadung, Keita Emura, Goichiro
Hanaoka and Keisuke Tanaka
[Apologies if you receive this more than once]
[SCAC Call for Papers]
http://static.springer.com/sgw/documents/1608722/application/pdf/scalable+a…
=======================================================================
Scalable Computing and Communications
Special Issue on
Scalable Algorithms and Behavior Analytics in Cyber-Enabled World
-----------------------------------------------------------------------------------------------------------------------------
Aims and Scope
Due to the emerging computing paradigm, the physical, social, and mental
world are increasingly integrating and merging into the cyberspace. In this
emerging but significant field, it is necessary to model the human
individual information processing along with their corresponding behaviors,
in order to build systematic knowledge about new phenomena, behaviors,
properties and practices across the broad applications in cyber-enabled
world. Specifically, studies related to scalable algorithm and behavioral
analysis are conducted in terms of the cyber entities, as well as their
relations and conjugations in physical, social and mental spaces, which
focuses more on the basic attributes, models, functions, and evolutions of
cyber entities, and all their possible relations conjugated with real
things. For this scientific and systematic study, numerous challenges are
raised as: How to establish and improve the foundational theory and
methodology for the scalable computing and data processing in the
cyber-enabled world? How to find a unified way to study and represent the
diversified cyber entities along with their behavior patterns and
communications? How to systematically extract, create, and fuse the
information, knowledge, and intelligence generated across the
physical-social systems for the sustainable utilization? How to deal with
the accompanying issues while producing numerous cyber things, such as
security, reliability, and etc.
Topics may include (but are not limited to):
• Scalable Communications in Cyber-world
• Data Centric Computing in Cyberspace
• Scalable Knowledge Modeling and Management in Cyber-world
• User Behavior Analysis and Modeling in Cyber-physical Systems
• User Influence Measure and Model in Cyberspace
• Cyber-Social Sensing and Behavior Analysis
• Scalable Cyber Hybrid Interface/System Design
• Scalable Mechanisms for Intelligent Transportation Systems
• Cyber-Based Learning Analytics with Scalable Computing
• Cyber-Empowered Sentiment Analysis and Mental Computing
• Wearable Computing and Smart Sensor
• Scalable Computing for Healthcare
• Scalability in Cyber Security, Privacy and Reliability
• Scalable algorithms for Cyber Visualization
• Scalable deep learning architectures
• Scalable Brain-inspired Computing and Soft Computing
• Scalable Agent-based Computing
• Scalable algorithms for the Internet of Things
• Scalable algorithms for Edge computing (EC) and Mobile Edge Computing
(MEC)
• Scalable Services for Pervasive Computing
Submissions
Authors should prepare their manuscript according to the Guide for Authors
of Scalable Computing and Communications available from
http://www.springer.com/41122 , and submit online at:
https://www.editorialmanager.com/scac . To ensure that the manuscript is
correctly identified for inclusion into the special issue, authors must
select "Scalable Algorithms and Behavior Analytics in Cyber-Enabled World"
when they reach the “Article Type” step in the submission process.
Tentative Schedule
Paper Submission Due: Mar. 31,
2018
Completion of first review cycle: Jul. 15,
2018
Deadline for submitting the revised papers: Oct. 15, 2018
2nd review completion: Nov.
30, 2018
Camera-ready Manuscript Due: Dec. 31, 2018
Guest editors:
Xiaokang Zhou, Shiga University, Japan
Kevin Wang, The University of Auckland, New Zealand
Flavia C. Delicato, Federal University of Rio de Janeiro, Brazil
Adnan Al-Anbuky, Auckland University of Technology, New Zealand
Contact Information
Corresponding Guest Editor, Dr. Zhou (zhou(a)biwako.shiga-u.ac.jp)
--
Xiaokang Zhou (周 暁康), Ph.D.
Faculty of Data Science
The Center for Data Science Education and Research, Shiga University
1-1-1 Banba, Hikone, Shiga 522-8522, Japan
Email: zhou(a)biwako.shiga-u.ac.jp
Phone: +81-749-27-1290
Dear Colleague,
(Apologies for multiple postings)
We would like to invite you to submit your contributions to the 1st
International Workshop on Big Data Analytic for Cyber Crime
Investigation and Prevention. It is co-located with IEEE International
Conference on Big Data 2017 that will take place in Boston, USA,
December 11-14, 2017.
Workshop webpage: https://www.ntnu.edu/iik/digital_forensics/ieeebigdata2017
*** IMPORTANT DATES ***
Sept 10, 2017: Due date for full workshop papers submission
Oct 15, 2017: Notification of paper acceptance to authors
Nov 15, 2017: Camera-ready for accepted papers
Dec 11-14, 2017: Workshop
*** INTRODUCTION ***
The big data paradigm has become inevitable in every aspect of the
digital forensics process. Increase in personal devices (such as
computers, smart phones, tablets, sensors and storage mediums) results
in an expanding volume of potential evidence found in them. The increase
in data is one of the largest challenges facing law enforcements’ timely
prosecutions; with the effect, that human analysts can no longer be the
lone actor in the loop. There is a need to create innovative and
advanced models and analysis methods to help human analysts within law
enforcements in order to automatically aid with the discovery,
correlation, examination, analysis and understanding of evidence in
criminal cases. Advanced big data analytics are important for cybercrime
investigation and require novel approaches for automation.
*** PROPOSED TOPICS ***
Note that the topics are not limited to this proposed list.
1. Algorithms
- Machine learning-aided analysis
- Graph-based detection
- Topic modeling
- Secure platforms
- Distributed storage and processing
- Secure collaborative platforms
2. Applications
- Network forensics readiness
- Cyber threats intelligence
- Malware analysis and detection
- Emails mining
- Events correlations
- Access logs analysis
- Mobile and Internet of Things forensics
- Fraud detection
- Database forensics
3. Data
- Novel datasets
- Digital forensics data simulation
- Anonymised case data
- Data storage standards
- New formats and taxonomies
*** PROGRAM CO-CHAIRS ***
Andrii Shalaginov, Norwegian University of Science and Technology
Katrin Franke, Norwegian University of Science and Technology
Jan William Johnsen, Norwegian University of Science and Technology
*** PROGRAM COMMITTEE ***
Asif Iqbal (KTH Royal Institute of Technology)
Bojan Kolosnjaji (Technical University of Munich)
Carl Leichter (Norwegian University of Science and Technology)
Dmitry Kangin (University of Exeter)
Emiliano Casalicchio (Blekinge Institute of Technology)
Ethan Rudd (University of Colorado Colorado Springs)
Hamid Ebadi (Chalmers University of Technology)
Hanno Langweg (Konstanz University of Applied Sciences)
Heri Ramampiaro (Norwegian University of Science and Technology)
Martin Boldt (Blekinge Institute of Technology)
Michael McGuire (Towson University)
Olaf M. Maennel (Tallinn University of Technology)
Pavel Gladyshev (Dublin School of Computer Science)
Pierre Lison (Norwegian Computing Centre)
*** PAPER SUBMISSION ***
Our workshop invites authors to submit: full-length papers (up to ten
pages), short papers (up to six pages) or abstract papers (up to three
pages) through the online submission system:
https://wi-lab.com/cyberchair/2017/bigdata17/scripts/submitform.php?subarea…
Papers have to follow the IEEE 2-column format and the Computer Society
Proceedings Manuscript Formatting Guidelines. See formatting
instructions here:
https://www.ntnu.edu/iik/digital_forensics/ieee-bigdata-2017-formatting-ins…
*** BEST PAPERS ***
Selected papers are nominated for submission to “Special Issue on Cyber
Threat Intelligence and Analytics”. Extended papers should have at least
60% of new material and will be sent through a review process to ensure
the quality of contributions.
*** CONTACTS***
If you have any questions, do not hesitate to contact Andrii Shalaginov
(andrii.shalaginov(a)ntnu.no) and Jan William Johnsen (jan.w.johnsen(a)ntnu.no).
Best regards,
Andrii Shalaginov, on behalf of
Katrin Franke and Jan William Johnsen
Norwegian University of Science and Technology, Gjøvik, Norway
******************************************************************
GraMSec 2017
The Fourth International Workshop on Graphical Models for Security
Co-located with CSF 2017
Santa Barbara, CA, USA - August 21, 2017
http://gramsec.uni.lu/
******************************************************************
ABOUT GraMSec
Graphical security models provide an intuitive but systematic
methodology to analyze security weaknesses of systems and to evaluate
potential protection measures. Such models have been subject of
academic research and they have also been widely accepted by the
industrial sector, as a means to support and facilitate threat
analysis and risk assessment processes. The objective of GraMSec is to
contribute to the development of well-founded graphical security
models, efficient algorithms for their analysis, as well as
methodologies and tools for their practical usage.
PROGRAM
8:45 – 10:00 INVITED TALK
Dr. Anoop Singhal, NIST
Security Metrics and Risk Analysis for Enterprise Systems
10:00 – 10:35 BREAK (eclipse + coffee)
10:35 – 12:35 SESSION 1: Security Modeling
10:35 – 11:15 (regular paper)
Dan Ionita, Margaret Ford, Alexandr Vasenev, and Roel Wieringa
Graphical Modeling of Security Arguments: Current State and Future
Directions
11:15 – 11:35 (short paper)
Brian Ruttenberg, Dave Blumstein, Jeff Druce, Michael Howard, Fred
Reed, Leslie Wilfong, Crystal Lister, Steve Gaskin, Meaghan Foley, and
Dan Scofield
Probabilistic Modeling of Insider Threat Detection Systems
11:35 – 12:15 (regular paper)
Angèle Bossuat and Barbara Kordy
Evil Twins: Handling Repetitions in Attack–Defense Trees - A
Survival Guide
12:15 – 12:35 (short paper)
Letitia Li, Florian Lugou, and Ludovic Apvrille
Security Modeling for Embedded System Design
12:40 – 14:00 LUNCH
14:00 – 15:40 SESSION 2: Risk Analysis
14:00 – 14:40 (regular paper)
Karin Bernsmed, Christian Frøystad, Per Håkon Meland, Dag Atle
Nesheim, and Ørnulf Jan Rødseth
Visualizing Cyber Security Risks with Bow-Tie Diagrams
14:40 – 15:20 (regular paper)
Aitor Couce-Vieira, Siv Hilde Houmb, and David Ríos-Insua
CSIRA: A Method for Analysing the Risk of Cybersecurity Incidents
15:20 – 15:40 (short paper)
Ryan Habibi, Jens Weber, and Morgan Price
Circle of Health Based Access Control for Personal Health
Information Systems
15:40 – 16:10 BREAK
16:10 – 17:10 SESSION 3: Attack Trees
16:10 – 16:50 (regular paper)
Peter Gjøl Jensen, Axel Legay, Kim Guldstrand Larsen, and Danny
Bøgsted Poulsen
Quantitative Evaluation of Attack Defense Trees using Stochastic
Timed Automata
16:50 – 17:10 (short paper)
Olga Gadyatskaya and Rolando Trujillo-Rasua
New Directions in Attack Tree Research: Catching up with Industrial
Needs
GraMSec REGISTRATION IS NOW OPEN
To register please follow the instructions given at
http://www.gramsec.uni.lu/registration.php
If you need a visa support letter, please check
http://csf2017.tecnico.ulisboa.pt/visa.html
GENERAL CHAIR
Sjouke Mauw, University of Luxembourg, Luxembourg
PROGRAM COMMITTEE CO-CHAIRS
Ketil Stølen, SINTEF Digital and University of Oslo, Norway
Peng Liu, Pennsylvania State University, USA
CONTACT
For inquiries please send an e-mail to gramsec17(a)easychair.org
The 5th ICDM Workshop on Data Science and Big Data Analytics (DSBDA 2017)
[http://www.bigdatalab.ac.cn/~dsbda/2017/]
In conjunction with
The IEEE International Conference on Data Mining (ICDM 2017)
[http://icdm2017.bigke.org/]
New Orleans, USA · November 18, 2017
Introduction
================
Due to the rapid development of IT technology including Internet, Cloud
Computing, Mobile Computing, and Internet of Things, as well as the
consequent decrease of cost on collecting and storing data, big data has
been generated from almost every industry and sector as well as
governmental department. The volume of big data often grows exponentially
or even in rates that overwhelm the well-known Moore’s Law. Meanwhile, big
data has been extended from traditional structured data into
semi-structured and completely unstructured data of various types, such as
text, image, audio, video, click streams, log files, etc.
It is no doubt that big data can offer us unprecedented opportunities.
However, it also poses many grand challenges. Due to the massive volume and
inherent complexity, it is extremely difficult to store, aggregate, manage,
and analyze big data and finally mine valuable information/knowledge from
the complex data/information networks. Therefore, in the presence of big
data, the theories, models, algorithms and methods of traditional data
related fields, such as, data mining, data engineering, machine learning,
statistical learning, computer programming, pattern recognition and
learning, visualization, uncertainty modeling, and high performance
computing etc., become no longer effective and efficient. On the other
hand, some data is generated exponentially or super-exponentially in a
streaming manner. Therefore, how to delicately analyze and deeply
understand big data so as to obtain dynamical and incremental information /
knowledge, is a grand challenge. In general, at the era of big data, it is
expected to develop new theories, models, algorithms, methods, and
paradigms for mining, analyzing, and understanding big data, and even a new
inter-discipline, Data Science, for studying the perception, acquisition,
transportation, storage, management, analysis, visualization, and
applications of big data, and finally implement the transformation from
data to knowledge.
DSBDA 2017 aims to provide a networking venue that will bring together
scientists, researchers, professionals, and practitioners from both
industry and academia and from different disciplines (including computer
science, social science, network science, etc.) to exchange ideas, discuss
solutions, share experiences, promote collaborations, and report
state-of-the-art research work on various aspects of data science and big
data analytics.
Topics
================
The topics of interest include, but are not limited to:
* Data science and data analytics
* Acquisition, representation, indexing, storage, and management of big data
* Processing, pre-processing, and post-processing of big data
* Models, algorithms, and methods for big data mining and understanding
* Knowledge discovery and acquisition from big data
* Visualizing analytics and organization for big data
* Streaming data processing
* Context data mining from big Web data
* Social computing over big Web data
* Industrial and scientific applications of big data
* Tools for big data analytics
Submissions
================
The page limit of workshop papers is 8 pages in the standard IEEE 2-column
format (http://www.ieee.org/conferences_events/conferences/publishing/
templates.html), including the bibliography and any possible appendices.
All papers must be formatted according to the IEEE Computer Society
proceedings manuscript style, following IEEE ICDM 2017 submission
guidelines available at http://icdm2017.bigke.org/. Papers should be
submitted in PDF format, electronically, using the CyberChair submission
system: https://wi-lab.com/cyberchair/2017/icdm17/scripts/submit.
php?subarea=SP04&undisplay_detail=1&wh=/cyberchair/2017/
icdm17/scripts/ws_submit.php.
Note that all accepted papers will be included in the IEEE ICDM 2017
Workshops Proceedings volume published by IEEE Computer Society Press, and
will also be included in the IEEE Xplore Digital Library. The workshop
proceedings will be in a CD separated from the CD of the main conference.
The CD is produced by IEEE Conference Publishing Services (CPS). Therefore,
papers must not have been accepted for publication elsewhere or be under
review for another workshop, conferences or journals.
Important Dates
================
Submissions Due Date: August 7, 2017
Notifications of Acceptance: September 7, 2017
Camera-Ready Deadline: September 15, 2017
Workshop Date: November 18, 2017
Steering Committee
===================
Prof. Benjamin W. Wah, Chinese University of Hong Kong, China
Prof. Jinpeng Huai, Beihang University, China
Prof. Xueqi Cheng, Institute of Computing Technology, Chinese Academy of
Sciences, China
Workshop Chairs
================
Dr. Xiaolong Jin
Institute of Computing Technology, Chinese Academy of Sciences (CAS), China
Email: jinxiaolong(a)ict.ac.cn
Dr. Jiafeng Guo
Institute of Computing Technology, Chinese Academy of Sciences (CAS), China
Email: guojiafeng(a)ict.ac.cn
Dr. Huewei Shen
Institute of Computing Technology, Chinese Academy of Sciences (CAS), China
Email: shenhuawei(a)ict.ac.cn
[Apologies if you receive this more than once]
CALL FOR ABSTRACTS
The 2017 International Conference on Brain Informatics (BI'17)
"Investigating the Brain and Mind from Informatics Perspective"
November 16-18, 2017, Beijing, China
Homepage: http://bii.ia.ac.cn/bi-2017/
---------------------------------------
SUBMISSION DEADLINE: August 30, 2017
One-line submission:
https://wi-lab.com/cyberchair/2017/bi17/scripts/submit.php?subarea=B
---------------------------------------
*** INVITED SPEECHES ***
1. "Multimodal Modelling of Network Propagation of Neuropathology in Dementia"
Alan Evans (McGill University, Canada)
2. "Neural Correlates of Word, Sentence and Story Comprehension"
Tom Mitchell (Carnegie Mellon University, US)
3. "The Cognitive Neural Basis of Object Knowledge"
Yanchao Bi (Beijing Normal University, China)
4. "Harnessing Large-Scale Data-Sharing to Drive Discovery and Bench-to-Bedside
Translation in Traumatic Brain Injury and Spinal Cord Injury"
Adam Ferguson (University of California San Francisco, US)
5. "Computational Psychophysiology Based Research Methodology for Mental Health"
Bin Hu (Lanzhou University, China)
6. "Multiscale Gene Expression Signatures in the Mammalian Brain in Health and Disease"
Michael Hawrylycz (Allen Institute for Brain Science, US)
7. "Machine Learning in Medical Imaging Analysis"
Dinggang Shen (University of North Carolina at Chapel Hill, US)
*** WORKSHOPS AND SPECIAL SESSIONS ***
++++++++++++++++++++++++++++++++++++++++++++
Abstract submission (TYPE II) is still open!
++++++++++++++++++++++++++++++++++++++++++++
To submit abstracts to workshops/special sessions,
please visit http://bii.ia.ac.cn/bi-2017/workshops.htm
# Workshop on Brain and Artificial Intelligence (BAI 2017)
Organizers:
Yi Zeng, Chinese Academy of Sciences, China
Shuliang Wang, Beijing Institute of Technology, China
# Workshop on Knowledge Representation: Brain and Machine (KRBM 2017)
Organizers:
Yanchao Bi, Beijing Normal University, China
Yi Zeng, Chinese Academy of Sciences, China
# Workshop on Affective, Psychological and Physiological Computing
(APPC 2017)
Organizers:
Bin Hu, Lanzhou University, China
Zhijun Yao, Lanzhou University, China
Mi Li, Beijing University of Technology, China
# Workshop on Big Data and Visualization for Brainsmatics (BDVB 2017)
Organizers:
Qingming Luo, Huazhong University of Science and Technology, China
Anan LI, Huazhong University of Science and Technology, China
# Workshop on Brain Big Data Based Wisdom Service (BBDBWS 2017)
Organizer:
Jiajin Huang, Beijing University of Technology, China
# Workshop on Semantic Technology for eHealth (STeH 2017)
Organizers:
Jiao Li, Chinese Academy of Medical Sciences, China
Zhisheng Huang, Vrije University Amsterdam, The Netherlands
# Workshop on Big Data Neuroimaging Analytics for Brain and Mental
Health (BDNABMH 2017)
Organizer:
Shouyi Wang, University of Texas at Arlington, USA
# Workshop on Novel Methods of the Brain Imaging in the Clinical and
Preclinical Neuroscience (NMBICPN 2017)
Organizers:
Vassiliy Tsytsarev, University of Maryland School of Medicine, USA
Vicky Yamamoto, Keck School of Medicine of USC, USA
Yan Li, University of Southern Queensland, Australia
# The 1st International Workshop on Deep Learning in Brain MRI and
Pathology Images (DLBMPI 2017)
Organizers:
Yan Xu, School of Biological Science and Medical Engineering, BUAA
Eric Chang, Microsoft Research Asia
# Workshop on Mesoscopic Brainformatics (MBAI 2017)
Organizers:
Dezhong Yao, University of Electronic Science and Technology of China, China
Pedro A. Valdes-Sosa, University of Electronic Science and Technology of China, China
Yong He, Beijing Normal University, China
Li Dong, University of Electronic Science and Technology of China, China
# Special Session on Brain Informatics in Neurogenetics (BIN 2017)
Organizers:
Hong Liang, Harbin Engineering University, China
Lei Du, Northwestern Polytechnical University, China
Li Shen, Indiana University School of Medicine, USA
# Special Session on BigNeuron Project (BP 2017)
Organizers:
Zhi Zhou, Allen Institute for Brain Sciences, USA
Min Liu, Hunan University, China
==================================================
Brain Informatics (BI) conference series provides a premier forum to
bring together researchers and practitioners in the fields of
neuroscience, cognitive science, computer science, data science,
artificial intelligence, information communication technologies, and
neuroimaging technologies.
BI'17 addresses the computational, cognitive, physiological,
biological, physical, ecological and social perspectives of brain
informatics, as well as topics relating to mental health and
well-being. It also welcomes emerging information technologies,
including but not limited to Internet/Web of Things (IoT/WoT), cloud
computing, big data analytics and interactive knowledge discovery
related to brain research. BI'17 also encourages submissions that
explore how advanced computing technologies are applied to and make a
difference in various large-scale brain studies and their
applications.
BI'17 welcomes paper submissions (full paper and abstract
submissions). Both research and application papers are solicited. All
submitted papers will be reviewed on the basis of technical quality,
relevance, significance and clarity. Accepted full papers will be
included in the proceedings by Springer LNCS/LNAI.
Workshop, Special-Session and Tutorial proposals, and
Industry/Demo-Track papers are also welcome. The organizers of
Workshops and Special-Sessions are invited to prepare a book proposal
based on the topics of the workshop/special session for possible book
publication in the Springer-Nature Brain Informatics & Health book
series (http://www.springer.com/series/15148).
*** Topics and Areas ***
Track 1: Cognitive and Computational Foundations of Brain Science
Track 2: Investigations of Human Information Processing Systems
Track 3: Brain Big Data Analytics, Curation and Management
Track 4: Informatics Paradigms for Brain and Mental Health
Track 5: Brain-Inspired Intelligence and Computing
IMPORTANT DATES :
===========================
May 1, 2017: Submission deadline for full papers
June 20, 2017: Notification of full paper acceptance
July 20, 2017: Submission deadline for workshop/special-session papers
August 30, 2017: Submission deadline for abstracts (TYPE-II)
(for both main conference and workshops/special sessions)
November 16, 2017: Tutorials, workshops and special-sessions
November 17-18, 2017: Main conference
ABSTRACT (TYPE-II) SUBMISSIONS :
=================================
(Submission Deadline: August 30, 2017):
Abstracts have a word limit of 500 words. Experimental research is
particularly welcome. Accepted abstract submissions will be included
in the conference program, and will be published as a single,
collective proceedings volume.
Title: Include in the title of the abstract all words critical for a
subject index. Write your title in sentence case (first letter is
capitalized; remaining letters are lower case). Do not bold or
italicize your full title.
Author: List all authors who contributed to the work discussed in the
abstract. The presenting author must be listed in the first author
slot of the list. Be prepared to submit contact information as well as
conflict of interest information for each author listed.
Abstract: Enter the body of the abstract and attach any applicable
graphic files or tables here. Do not re-enter the title, author,
support, or other information that is collected in other steps of the
submission form.
Presentation Preference: Authors may select from three presentation
formats when submitting an abstract: "poster only", "talk preferred"
or "no preference." The "talk preferred" selection indicates that you
would like to give a talk, but will accept a poster format if
necessary. Marking "poster only" indicates that you would not like to
be considered for an oral-presentation session. Selecting "no
preference" indicates the author's willingness to be placed in the
best format for the program.
Each paper or abstract requires one sponsoring attendee (i.e. someone
who registered and is attending the conference). A single attendee
can not sponsor more than two abstracts or papers.
Oral presentations will be selected from both full length papers and
abstracts.
-----------------------------------------------
One-line submission:
https://wi-lab.com/cyberchair/2017/bi17/scripts/submit.php?subarea=B
-----------------------------------------------
*** Post-Conference Journal Publication ***
The Brain Informatics conferences have the formal ties with Brain
Informatics journal (Springer-Nature,
http://www.springer.com/40708). Accepted abstracts from the conference
will be expanded and revised for possible inclusion in the
Brain Informatics journal each year. It is fully sponsored and no any
article-processing fee charged for authors of Brain Informatics conference.
ORGANIZERS
==========
General Chairs
Bo Xu (Chinese Academy of Sciences, China)
Hanchuan Peng (Allen Institute for Brain Sciences, USA)
Qingming Luo (Huazhong University of Science and Technology, China)
Program Committee Chairs
Yi Zeng (Chinese Academy of Sciences, China)
Yong He (Beijing Normal University, China)
Jeanette Kotaleski (Karolinska Institute, Sweden)
Maryann Martone (University of California, San Diego, USA)
Organizing Chairs
Ning Zhong (Maebashi Institute of Technology, Japan, and
Beijing Advanced Innovation Center for Future Internet Technology,
Beijing University of Technology, China
Jianzhou Yan (Beijing Advanced Innovation Center for Future Internet Technology,
Beijing University of Technology, China)
Shengfu Lu (Beijing Advanced Innovation Center for Future Internet Technology,
Beijing University of Technology, China)
Workshop/Special-Session Chairs
An'an Li (Huazhong University of Science and Technology, China)
Sen Song (Tsinghua University, China)
Tutorial Chair
Wenming Zheng (South East University, China)
Publicity Chairs
Tielin Zhang (Chinese Academy of Sciences, China)
Shouyi Wang (University of Texas at Arlington, USA)
Yang Yang (Maebashi Institute of Technology, Japan, and
Beijing Advanced Innovation Center for Future Internet Technology,
Beijing University of Technology, China)
Steering Committee Chairs
Ning Zhong (Maebashi Institute of Technology, Japan)
Hanchuan Peng (Allen Institute for Brain Science, USA)
*** Contact Information ***
tielin.zhang(a)ia.ac.cn
shouyiw(a)uta.edu
yang(a)maebashi-it.org