Dear colleagues,
I invite you and your students to submit your contributions to the PhD
Forum at The 8th International Green and Sustainable Computing Conference
(IGSC¹17). Please find more information below. Thank you!
Best regards
Mahdi Nikdast
**Call for Papers: Ph.D. Forum at The 8th International Green and
Sustainable Computing Conference (IGSC'17)**
Forum webpage: http://igsc.eecs.wsu.edu/forum_17
The Ph.D. forum at IGSC'17 will provide an international forum for
doctoral students engaged in research on sustainable and energy-efficient
computing and/or computing for a more sustainable planet to present their
work to fellow researchers and practitioners in the green and sustainable
computing community. The forum includes a poster session during which the
students can present their work and receive constructive feedback for
completion of their dissertation research. The Ph.D. forum is intended for
students who have already settled on a specific research topic and have
some preliminary results, but still have enough time remaining before
their final defence that they can benefit from the forum discussions.
**Accepted submissions will appear in IGSC'17 proceedings**
*Paper submission guidelines*
Current Ph.D. students are encouraged to submit an extended abstract that
describes their doctoral work. The student should be the sole author of
the paper, but the advisor and other contributors should be acknowledged.
The topics of interest coincide with IGSC'17 are listed in the CFP page
(http://igsc.eecs.wsu.edu/cfp_17). The extended abstract should be three
pages in IEEE conference proceedings style
(http://www.ieee.org/conferences_events/conferences/publishing/templates.ht
ml). All manuscripts should be in pdf format, in English, and registered
and submitted through easychair
(http://easychair.org/conferences/?conf=igsc17) under the "IGSC17 PhD
Forum" submission track.
Please kindly note that:
- The research ideas in submissions should be mature enough to be
presented in a paper and content can evolve to become the substantial part
of a Ph.D. dissertation. The submissions should not have been published
and not under review by other conferences or journals elsewhere.
- The authors should outline related problems in the field and their
current solutions, clearly motivate and formulate the research topic,
present the preliminary idea, the proposed approach, and the preliminary
experimental results achieved thus far, explicitly point out the intended
contributions of the proposed work.
Each submission will be reviewed by members of the forum¼s technical
program committee. Abstracts will be judged on originality, technical
merit, presentation quality, and relevance to the
conference topics. Accepted abstracts will appear in the IGSC conference
proceedings and will be indexed by DBLP and the IEEE digital library. All
invited participants will be asked to provide a poster, which will be
displayed throughout the conference. Authors of accepted submissions are
expected to register for the conference and appear in person to present
their work. The student rate will apply to authors who are currently
full-time students.
*Poster Presentation*
Authors of accepted submissions should prepare a poster for presentation.
Posters will be displayed throughout the conference and the students are
required to be available during the poster session to discuss their work
and answer related questions. The poster size should not exceed 841 x 1189
mm (width x height). The organizers encourage all Ph.D. Students in the
fields of sustainable and energy-efficient computing and computing for a
more sustainable planet to participate in this Ph.D. Forum.
*Ph.D. Forum Chair*
Mahdi Nikdast (Polytechnique Montreal, Canada), mahdi.nikdast(a)polymtl.ca
*Important dates*
Paper submission due: August 31, 2017
Notifications sent to authors: September 4, 2017
Camera-ready papers due: September 7, 2017
==========================================================================
** Call for Papers **
==========================================================================
Third International Workshop on
Heterogeneous High-performance Reconfigurable Computing (H2RC 2017)
Held in conjunction with Supercomputing 2017
Friday Morning, November 17, 2017
Denver, CO
http://h2rc.cse.sc.edu
==========================================================================
Submission Deadline: September 1, 2017 (one page extended abstracts)
==========================================================================
As conventional von-Neumann architectures are suffering from rising
power densities, we are facing an era with power, energy efficiency, and
cooling as first-class constraints for scalable HPC. FPGAs can tailor
the hardware to the application, avoiding overheads and achieving higher
hardware efficiency than general-purpose architectures. Leading FPGA
manufacturers have recently made a concerted effort to provide a range
of higher-level, easier to use high-level programming models for FPGAs.
Such initiatives are already stimulating new interest within the HPC
community around the potential advantages of FPGAs over other
architectures. With this in mind, this workshop, now in its third year,
brings together HPC and heterogeneous-computing researchers to
demonstrate and share experiences on legacy and new high-level
programming models, optimizations specific to scientific computing and
data analytics, tools for performance/energy improvements, FPGA
computing in the cloud, and popular applications for reconfigurable
computing such as machine learning and big data.
==========================================================================
Submissions (one page extended abstract):
Submissions are solicited that explore the state of the art in the use
of FPGAs in heterogeneous high-performance computing architectures and,
at a system level, in data centers and supercomputers. FPGAs may be
considered from either or both the distributed, parallel and composable
fabric of compute elements or from their dynamic reconfigurability. We
particularly encourage submissions which focus on the mapping of
algorithms and applications to heterogeneous FPGA-based systems as well
as the overall impact of such architectures on the compute capacity,
cost, power efficiency, and overall computational capabilities of data
centers and supercomputers. Submissions may report on theoretical or
applied research, implementation case studies, benchmarks, standards, or
any other area that promises to make a significant contribution to our
understanding of heterogeneous high-performance reconfigurable computing
and will help to shape future research and implementations in this
domain.
A non-comprehensive list of potential topics of interest is given below:
1. FPGAs in Supercomputer, Cloud and Data Center: FPGAs in relation to
challenges to Cloud/Data Center/Supercomputing posed by the end of
Dennard scaling
2. Supercomputing, Cloud and Data Center Applications: Exploiting FPGA
compute fabric to implement critical cloud/HPC applications
3. Leveraging Reconfigurability: Using reconfigurability for new
approaches to algorithms used in cloud/HPC applications
4. Benchmarks: Compute performance and/or power and cost efficiency for
cloud/HPC with heterogeneous architectures using FPGAs
5. Implementation Studies: Heterogenous Hardware and Management
Infrastructure
6. Programming Languages/Runtimes/OS/Tools/Frameworks for Heterogeneous
High Performance Reconfigurable Computing
7. Future-gazing: New Applications/The Cloud Enabled by Heterogeneous
High Performance Reconfigurable Computing, Evolution of Computer
Architecture in relation to Heterogeneous High Performance
Reconfigurable Computing
8. Community building: Standards, consortium activity, open source,
education, initiatives to enable and grow Heterogeneous High Performance
Reconfigurable Computing
Prospective authors are invited to submit original and unpublished
contributions as a ONE PAGE EXTENDED ABSTRACT in ACM SIG Proceedings
format.
==========================================================================
You can submit your contribution(s) through a link on the H2RC website:
http://h2rc.cse.sc.edu
==========================================================================
Important dates:
Submission Deadline: September 1, 2017
Acceptance Notification: October 15, 2017
Camera-ready Manuscripts Due: November 4, 2017
Workshop Date: November 17, 2017
==========================================================================
Workshop Format:
H2RC is a half-day Friday workshop. It will be comprised of Keynote and
invited talks and talks selected from paper submissions.
==========================================================================
Organizing Committee:
Workshop Organizers:
Michaela Blott, Xilinx
Franck Cappello, Argonne National Lab
Torsten Hoefler, ETH Zurich
Jason D. Bakos, University of South Carolina
Program Committee:
Rizwan Ashraf, Oak Ridge National Laboratory
Paul Chow, University of Toronto
Carl Ebeling, Altera
Hans Eberle, NVIDIA
Alan George, University of Florida
Christoph Hagleitner, IBM
Miriam Leeser, Northeastern University
Viktor Prasanna, Univ. of Southern California
Marco Santambrogio, Politecnico Di Milano
Jeffrey Vetter, Oak Ridge National Lab
--
Jason D. Bakos, Ph.D.
Professor
Dept. of Computer Science and Engineering
Univ. of South Carolina
301 Main St., Suite 3A01L
Columbia, SC 29208
803-777-8627 (voice), 803-777-3767 (fax)
http://www.cse.sc.edu/~jbakos
jbakos(a)cse.sc.edu
==============================================================================
ESORICS 2017: CALL FOR PARTICIPATION
22nd European Symposium on Research in Computer Security
Oslo, Norway — September 11-15, 2017
==============================================================================
WWW: https://www.ntnu.edu/web/esorics2017/
Overview
------------------------------------
ESORICS is the annual European research event in Computer Security. The
Symposium started in 1990 and has been held in several European
countries, attracting a wide international audience from both the
academic and industrial communities.
The 22nd European Symposium on Research in Computer Security (ESORICS
2017) will be held in Oslo, Norway.
ESORICS 2017 spans a total of 3 days, featuring:
* 3 keynote speeches
(Cormac Herley, Paul Syverson, Sandro Etalle)
* 54 paper presentations in 3 days (Sep 11-13)
* NN workshops (Sept 14 - 15)
Registration
------------------------------------
Early Registration for ESORICS+Workshops 2017 is open, but will end
soon. Early registration deadline is ***August, 15th 2017***
Registration rates:
https://www.ntnu.edu/web/esorics2017/registration
If an invitation letter is needed (e.g. VISA) the letter will be
provided after the registration. To do this, it is necessary to send an
email to the organizing committee: mailto:esorics2017@ntnu.edu
Venue page:
https://www.ntnu.edu/web/esorics2017/venue
Travel and accommodation page:
https://www.ntnu.edu/web/esorics2017/travel-accomodation
We hope to see you in Oslo, Norway!
Presentations Program
------------------------------------
The 54 papers of ESORICS 2017 are distributed between **18 sessions**
in **two parallel tracks**.
Following is the list of paper presentations for the main ESORICS
conference. For the workshop programs, please consult their
corresponding websites:
* SECPRE 2017: https://samosweb.aegean.gr/secpre2017/
* SecSE 2017: http://secse.org
* CBT 2017: http://www.deic.uab.cat/~jherrera/CBT/
* DPM 2017: http://deic.uab.cat/conferences/dpm/dpm2017/
* STM 2017: http://stm2017.di.unimi.it
* QASA 2017: http://www.iit.cnr.it/qasa2017/
* CyberICPS: http://www.ds.unipi.gr/cybericps2017/
* SIoT 2017: http://siot-workshop.org
### September 11 - Day 1 ###########
09:30 - 10:30
* Keynote: Cormac Herley
11:00 - 12:30
* Session 1: Security of embedded things
- Shortfall-based Optimal Placement of Security Resources for Mobile
IoT Scenarios
Antonino Rullo, Edoardo Serra, Elisa Bertino and Jorge Lobo
- Analyzing the Capabilities of the CAN Attacker
Sibylle Froeschle and Alexander Stühring
- Boot Attestation: Secure Remote Reporting with Off-The-Shelf IoT
Sensors
André Schaller, Florian Kohnhäuser, Steffen Schulz and Stefan
Katzenbeisser
* Session 2: Cryptographic Application I
- Per-Session Security: Password-Based Cryptography Revisited
Gregory Demay, Peter Gazi, Ueli Maurer and Björn Tackmann
- Non-Interactive Provably Secure Attestations for Arbitrary RSA Prime
Generation Algorithm
Fabrice Benhamouda, Houda Ferradi, Rémi Géraud and David
Naccache
- Tightly Secure Ring-LWE Based Key Encapsulation with Short
Ciphertexts
Martin Albrecht, Emmanuela Orsini, Kenneth Paterson, Guy Peer and
Nigel Smart
14:00 - 15:30
* Session 3: Documents and Authorship
- Identifying Multiple Authors in a Binary Program
Xiaozhu Meng, Barton Miller and Kwang-Sung Jun
- Verifiable Document Redacting
Herve Chabanne, Rodolphe Hugel and Julien Keuffer
- Source Code Authorship Attribution using Long Short-Term Memory
Based Networks
Bander Alsulami, Edwin Dauber, Richard Harang, Spiros Mancoridis
and Rachel Greenstadt
* Session 4: Analysis of Security Protocols
- Automated analysis of equivalence properties for security protocols
using else branches
Ivan Gazeau and Steve Kremer and Levente Buttyán
- Secure Authentication in the Grid: A formal analysis of DNP3: SAv5
Cas Cremers, Martin Dehnel-Wild and Kevin Milner
- Modular Verification of Protocol Equivalence in the Presence of
Randomness
Matthew Bauer, Rohit Chadha and Mahesh Viswanathan
16:00 - 17:30
* Session 5: Threat Analysis
- Preventing Advanced Persistent Threats in Complex Control Networks
Juan E. Rubio, Cristina Alcaraz and Javier Lopez
- MTD CBITS: Moving Target Defense for Cloud-Based IT Systems
Alexandru G. Bardas, Sathya C. Sundaramurthy, Xinming Ou and Scott
A. Deloach
- Is my attack tree correct?
Maxime Audinot, Sophie Pinchinat and Barbara Kordy
* Session 6: Side Channels and data leakage
- On-Demand Time Blurring to Support Side-Channel Defense
Weijie Liu, Debin Gao and Mike Reiter
- Acoustic Data Exfiltration from Speakerless Air-Gapped Computers via
Covert Hard-Drive Noise
Mordechai Guri, Yosef Solewicz, Andrey Daidakulov and Yuval
Elovici
- Practical Keystroke Timing Attacks in Sandboxed JavaScript
Moritz Lipp, Daniel Gruss, Michael Schwarz, David Bidner,
Clémentine Maurice and Stefan Mangard
### September 12 - Day 2 ###########
09:00 - 10:00
* Keynote: Paul Syverson
10:30 - 12:00
* Session 7: Vulnerabilities and Malware
- Mirage: Toward a Stealthier and Modular Malware Analysis Sandbox for
Android
Lorenzo Bordoni, Mauro Conti and Riccardo Spolaor
- VuRLE: Automatic Vulnerability Detection and Repair by Learning from
Examples
Siqi Ma, Ferdian Thung, David Lo, Cong Sun and Robert Deng
- Adversarial Examples for Malware Detection
Kathrin Grosse, Nicolas Papernot, Praveen Manoharan, Backes
Michael and Patrick McDaniel Russo
* Session 8: Privacy in Systems
- PerfWeb: How to Violate Web Privacy with Hardware Performance Events
Berk Gulmezoglu, Andreas Zankl, Thomas Eisenbarth and Berk Sunar
- SePCAR: A Secure and Privacy-enhancing Protocol for Car Access
Provision
Iraklis Symeonidis, Abdelrahaman Aly, Mustafa Asan Mustafa, Bart
Mennink, Siemen Dhooghe and Bart Preneel
- Privacy Implications of Room Climate Data
Philipp Morgner, Christian Müller, Matthias Ring, Björn
Eskofier, Christian Riess, Frederik Armknecht and Zinaida Benenson
13:30 - 15:00
* Session 9: Network security
- Link-Layer Device Type Classification on Encrypted Wireless Traffic
with COTS Radios
Rajib Ranjan Maiti, Sandra Siby, Ragav Sridharan and Nils Ole
Tippenhauer
- Preventing DNS amplification attacks using the history of DNS
queries with SDN
Soyoung Kim, Sora Lee, Geumhwan Cho, Muhammad Ejaz Ahmed, Jaehoon
Paul Jeong and Hyoungshick Kim
- Zero Round-Trip Time for the Extended Access Control Protocol
Jacqueline Brendel and Marc Fischlin
* Session 10: Controlling Access
- No sugar but all the taste! Memory Encryption without Architectural
Support
Panagiotis Papadopoulos, George Christou, Giorgos Vasiliadis,
Evangelos Markatos and Sotiris Ioannidis
- Tree-based Cryptographic Access Control
James Alderman, Naomi Farley and Jason Crampton
- Securing Data Analytics on SGX With Randomization
Swarup Chandra, Vishal Karande, Zhiqiang Lin, Latifur Khan, Murat
Kantarcioglu and Bhavani Thuraisingham
15:30 - 17:00
* Session 11: Information Flow
- We are Family: Relating Information-Flow Trackers
Musard Balliu, Daniel Schoepe and Andrei Sabelfeld
- A Better Composition Operator for Quantitative Information Flow
Analyses
Kai Engelhardt
- WebPol: Fine-grained Information Flow Policies for Web Browsers
Abhishek Bichhawat, Vineet Rajani, Jinank Jain, Deepak Garg and
Christian Hammer
* Session 12: Blockchain and social networks
- A Traceability Analysis of Monero’s Blockchain
Amrit Kumar, Clément Fischer, Shruti Tople and Prateek Saxena
-RingCT 2.0: A Compact Linkable Ring Signature Based Protocol for
Blockchain Cryptocurrency Monero
Shi-Feng Sun, Man Ho Au, Joseph Liu and Tsz Hon Yuen
- Secure Computation in Online Social Networks
Foteini Baldimtsi, Dimitrios Papadopoulos, Stavros Papadopoulos,
Alessandra Scafuro and Nikos Triandopoulos
### September 13 - Day 3 ###########
09:00 - 10:00
* Keynote: Sandro Etalle
10:30 - 12:30
* Session 13: Web Security
- DeltaPhish: Detecting Phishing Webpages in Compromised Websites
Igino Corona, Battista Biggio, Matteo Contini, Luca Piras, Roberto
Corda, Mauro Mereu, Guido Mureddu, Davide Ariu and Fabio Roli
- DOMPurify: Client-Side Protection against XSS and Markup Injection
Mario Heiderich, Jörg Schwenk and Christopher Spaeth
- Quantifying Web Adblocker Privacy
Arthur Gervais, Alexandros Filios, Vincent Lenders and Srdjan
Capkun
* Session 14: Cryptographic signatures
- Reusing Nonces in Schnorr Signatures
Marc Beunardeau, Aisling Connolly, Remi Geraud, David Naccache and
Damien Vergnaud
- How to Circumvent the Structure-Preserving Signatures Lower Bounds
MEssam Ghadafi
- Server-Supported RSA Signatures for Mobile Devices
Ahto Buldas, Aivo Kalu, Peeter Laud and Mart Oruaas
13:30 - 15:00
* Session 15: Formal techniques
- Inference-Proof Updating of a Weakened View under the Modification
of Input Parameters
Marcel Preuß and Joachim Biskup
- Verifying Constant-Time Implementations by Abstract Interpretation
Sandrine Blazy, David Pichardie and Alix Trieu
- AVR Processors as a Platform for Language-Based Security
Florian Dewald, Heiko Mantel and Alexandra Weber
* Session 16: Privacy and garbled circuits
- Labeled Homomorphic Encryption: Scalable and Privacy-Preserving
Processing of Outsourced Data
Manuel Barbosa, Dario Catalano and Dario Fiore
- New Way for Privacy-Preserving Decision Tree Evaluation
Raymond K. H. Tai, Jack P. K. Ma, Yongjun Zhao and Sherman S. M.
Chow
- Enforcing Input Correctness via Certification in Garbled Circuit
Evaluation
Yihua Zhang, Marina Blanton and Fattaneh Bayatbabolghani
15:30 - 17:00
* Session 17: Intrusion Detection
- Secure IDS Offloading with Nested Virtualization and Deep VM
Introspection
Shohei Miyama and Kenichi Kourai
- Network Intrusion Detection based on Semi-Supervised Variational
Auto-Encoder
Genki Osada, Kazumasa Omote and Takashi Nishide
- LeaPS: Learning-Based Proactive Security Auditing for Clouds
Suryadipta Majumdar, Yosr Jarraya, Momen Oqaily, Amir
Alimohammadifar, Makan Pourzandi, Lingyu Wang and Mourad Debbabi
* Session 18: Cryptographic Applications II
- Multiple Rate Threshold FlipThem
David Leslie, Chris Sherfield and Nigel Smart
- Stringer: Measuring the Importance of Static Data Comparisons to
Detect Backdoors and Undocumented Functionality
Sam L. Thomas, Tom Chothia and Flavio D. Garcia
- Generic Constructions for Fully Secure Revocable Attribute-Based
Encryption
Kotoko Yamada, Nuttapong Attrapadung, Keita Emura, Goichiro
Hanaoka and Keisuke Tanaka
[Apologies if you receive this more than once]
[SCAC Call for Papers]
http://static.springer.com/sgw/documents/1608722/application/pdf/scalable+a…
=======================================================================
Scalable Computing and Communications
Special Issue on
Scalable Algorithms and Behavior Analytics in Cyber-Enabled World
-----------------------------------------------------------------------------------------------------------------------------
Aims and Scope
Due to the emerging computing paradigm, the physical, social, and mental
world are increasingly integrating and merging into the cyberspace. In this
emerging but significant field, it is necessary to model the human
individual information processing along with their corresponding behaviors,
in order to build systematic knowledge about new phenomena, behaviors,
properties and practices across the broad applications in cyber-enabled
world. Specifically, studies related to scalable algorithm and behavioral
analysis are conducted in terms of the cyber entities, as well as their
relations and conjugations in physical, social and mental spaces, which
focuses more on the basic attributes, models, functions, and evolutions of
cyber entities, and all their possible relations conjugated with real
things. For this scientific and systematic study, numerous challenges are
raised as: How to establish and improve the foundational theory and
methodology for the scalable computing and data processing in the
cyber-enabled world? How to find a unified way to study and represent the
diversified cyber entities along with their behavior patterns and
communications? How to systematically extract, create, and fuse the
information, knowledge, and intelligence generated across the
physical-social systems for the sustainable utilization? How to deal with
the accompanying issues while producing numerous cyber things, such as
security, reliability, and etc.
Topics may include (but are not limited to):
• Scalable Communications in Cyber-world
• Data Centric Computing in Cyberspace
• Scalable Knowledge Modeling and Management in Cyber-world
• User Behavior Analysis and Modeling in Cyber-physical Systems
• User Influence Measure and Model in Cyberspace
• Cyber-Social Sensing and Behavior Analysis
• Scalable Cyber Hybrid Interface/System Design
• Scalable Mechanisms for Intelligent Transportation Systems
• Cyber-Based Learning Analytics with Scalable Computing
• Cyber-Empowered Sentiment Analysis and Mental Computing
• Wearable Computing and Smart Sensor
• Scalable Computing for Healthcare
• Scalability in Cyber Security, Privacy and Reliability
• Scalable algorithms for Cyber Visualization
• Scalable deep learning architectures
• Scalable Brain-inspired Computing and Soft Computing
• Scalable Agent-based Computing
• Scalable algorithms for the Internet of Things
• Scalable algorithms for Edge computing (EC) and Mobile Edge Computing
(MEC)
• Scalable Services for Pervasive Computing
Submissions
Authors should prepare their manuscript according to the Guide for Authors
of Scalable Computing and Communications available from
http://www.springer.com/41122 , and submit online at:
https://www.editorialmanager.com/scac . To ensure that the manuscript is
correctly identified for inclusion into the special issue, authors must
select "Scalable Algorithms and Behavior Analytics in Cyber-Enabled World"
when they reach the “Article Type” step in the submission process.
Tentative Schedule
Paper Submission Due: Mar. 31,
2018
Completion of first review cycle: Jul. 15,
2018
Deadline for submitting the revised papers: Oct. 15, 2018
2nd review completion: Nov.
30, 2018
Camera-ready Manuscript Due: Dec. 31, 2018
Guest editors:
Xiaokang Zhou, Shiga University, Japan
Kevin Wang, The University of Auckland, New Zealand
Flavia C. Delicato, Federal University of Rio de Janeiro, Brazil
Adnan Al-Anbuky, Auckland University of Technology, New Zealand
Contact Information
Corresponding Guest Editor, Dr. Zhou (zhou(a)biwako.shiga-u.ac.jp)
--
Xiaokang Zhou (周 暁康), Ph.D.
Faculty of Data Science
The Center for Data Science Education and Research, Shiga University
1-1-1 Banba, Hikone, Shiga 522-8522, Japan
Email: zhou(a)biwako.shiga-u.ac.jp
Phone: +81-749-27-1290
Dear Colleague,
(Apologies for multiple postings)
We would like to invite you to submit your contributions to the 1st
International Workshop on Big Data Analytic for Cyber Crime
Investigation and Prevention. It is co-located with IEEE International
Conference on Big Data 2017 that will take place in Boston, USA,
December 11-14, 2017.
Workshop webpage: https://www.ntnu.edu/iik/digital_forensics/ieeebigdata2017
*** IMPORTANT DATES ***
Sept 10, 2017: Due date for full workshop papers submission
Oct 15, 2017: Notification of paper acceptance to authors
Nov 15, 2017: Camera-ready for accepted papers
Dec 11-14, 2017: Workshop
*** INTRODUCTION ***
The big data paradigm has become inevitable in every aspect of the
digital forensics process. Increase in personal devices (such as
computers, smart phones, tablets, sensors and storage mediums) results
in an expanding volume of potential evidence found in them. The increase
in data is one of the largest challenges facing law enforcements’ timely
prosecutions; with the effect, that human analysts can no longer be the
lone actor in the loop. There is a need to create innovative and
advanced models and analysis methods to help human analysts within law
enforcements in order to automatically aid with the discovery,
correlation, examination, analysis and understanding of evidence in
criminal cases. Advanced big data analytics are important for cybercrime
investigation and require novel approaches for automation.
*** PROPOSED TOPICS ***
Note that the topics are not limited to this proposed list.
1. Algorithms
- Machine learning-aided analysis
- Graph-based detection
- Topic modeling
- Secure platforms
- Distributed storage and processing
- Secure collaborative platforms
2. Applications
- Network forensics readiness
- Cyber threats intelligence
- Malware analysis and detection
- Emails mining
- Events correlations
- Access logs analysis
- Mobile and Internet of Things forensics
- Fraud detection
- Database forensics
3. Data
- Novel datasets
- Digital forensics data simulation
- Anonymised case data
- Data storage standards
- New formats and taxonomies
*** PROGRAM CO-CHAIRS ***
Andrii Shalaginov, Norwegian University of Science and Technology
Katrin Franke, Norwegian University of Science and Technology
Jan William Johnsen, Norwegian University of Science and Technology
*** PROGRAM COMMITTEE ***
Asif Iqbal (KTH Royal Institute of Technology)
Bojan Kolosnjaji (Technical University of Munich)
Carl Leichter (Norwegian University of Science and Technology)
Dmitry Kangin (University of Exeter)
Emiliano Casalicchio (Blekinge Institute of Technology)
Ethan Rudd (University of Colorado Colorado Springs)
Hamid Ebadi (Chalmers University of Technology)
Hanno Langweg (Konstanz University of Applied Sciences)
Heri Ramampiaro (Norwegian University of Science and Technology)
Martin Boldt (Blekinge Institute of Technology)
Michael McGuire (Towson University)
Olaf M. Maennel (Tallinn University of Technology)
Pavel Gladyshev (Dublin School of Computer Science)
Pierre Lison (Norwegian Computing Centre)
*** PAPER SUBMISSION ***
Our workshop invites authors to submit: full-length papers (up to ten
pages), short papers (up to six pages) or abstract papers (up to three
pages) through the online submission system:
https://wi-lab.com/cyberchair/2017/bigdata17/scripts/submitform.php?subarea…
Papers have to follow the IEEE 2-column format and the Computer Society
Proceedings Manuscript Formatting Guidelines. See formatting
instructions here:
https://www.ntnu.edu/iik/digital_forensics/ieee-bigdata-2017-formatting-ins…
*** BEST PAPERS ***
Selected papers are nominated for submission to “Special Issue on Cyber
Threat Intelligence and Analytics”. Extended papers should have at least
60% of new material and will be sent through a review process to ensure
the quality of contributions.
*** CONTACTS***
If you have any questions, do not hesitate to contact Andrii Shalaginov
(andrii.shalaginov(a)ntnu.no) and Jan William Johnsen (jan.w.johnsen(a)ntnu.no).
Best regards,
Andrii Shalaginov, on behalf of
Katrin Franke and Jan William Johnsen
Norwegian University of Science and Technology, Gjøvik, Norway
******************************************************************
GraMSec 2017
The Fourth International Workshop on Graphical Models for Security
Co-located with CSF 2017
Santa Barbara, CA, USA - August 21, 2017
http://gramsec.uni.lu/
******************************************************************
ABOUT GraMSec
Graphical security models provide an intuitive but systematic
methodology to analyze security weaknesses of systems and to evaluate
potential protection measures. Such models have been subject of
academic research and they have also been widely accepted by the
industrial sector, as a means to support and facilitate threat
analysis and risk assessment processes. The objective of GraMSec is to
contribute to the development of well-founded graphical security
models, efficient algorithms for their analysis, as well as
methodologies and tools for their practical usage.
PROGRAM
8:45 – 10:00 INVITED TALK
Dr. Anoop Singhal, NIST
Security Metrics and Risk Analysis for Enterprise Systems
10:00 – 10:35 BREAK (eclipse + coffee)
10:35 – 12:35 SESSION 1: Security Modeling
10:35 – 11:15 (regular paper)
Dan Ionita, Margaret Ford, Alexandr Vasenev, and Roel Wieringa
Graphical Modeling of Security Arguments: Current State and Future
Directions
11:15 – 11:35 (short paper)
Brian Ruttenberg, Dave Blumstein, Jeff Druce, Michael Howard, Fred
Reed, Leslie Wilfong, Crystal Lister, Steve Gaskin, Meaghan Foley, and
Dan Scofield
Probabilistic Modeling of Insider Threat Detection Systems
11:35 – 12:15 (regular paper)
Angèle Bossuat and Barbara Kordy
Evil Twins: Handling Repetitions in Attack–Defense Trees - A
Survival Guide
12:15 – 12:35 (short paper)
Letitia Li, Florian Lugou, and Ludovic Apvrille
Security Modeling for Embedded System Design
12:40 – 14:00 LUNCH
14:00 – 15:40 SESSION 2: Risk Analysis
14:00 – 14:40 (regular paper)
Karin Bernsmed, Christian Frøystad, Per Håkon Meland, Dag Atle
Nesheim, and Ørnulf Jan Rødseth
Visualizing Cyber Security Risks with Bow-Tie Diagrams
14:40 – 15:20 (regular paper)
Aitor Couce-Vieira, Siv Hilde Houmb, and David Ríos-Insua
CSIRA: A Method for Analysing the Risk of Cybersecurity Incidents
15:20 – 15:40 (short paper)
Ryan Habibi, Jens Weber, and Morgan Price
Circle of Health Based Access Control for Personal Health
Information Systems
15:40 – 16:10 BREAK
16:10 – 17:10 SESSION 3: Attack Trees
16:10 – 16:50 (regular paper)
Peter Gjøl Jensen, Axel Legay, Kim Guldstrand Larsen, and Danny
Bøgsted Poulsen
Quantitative Evaluation of Attack Defense Trees using Stochastic
Timed Automata
16:50 – 17:10 (short paper)
Olga Gadyatskaya and Rolando Trujillo-Rasua
New Directions in Attack Tree Research: Catching up with Industrial
Needs
GraMSec REGISTRATION IS NOW OPEN
To register please follow the instructions given at
http://www.gramsec.uni.lu/registration.php
If you need a visa support letter, please check
http://csf2017.tecnico.ulisboa.pt/visa.html
GENERAL CHAIR
Sjouke Mauw, University of Luxembourg, Luxembourg
PROGRAM COMMITTEE CO-CHAIRS
Ketil Stølen, SINTEF Digital and University of Oslo, Norway
Peng Liu, Pennsylvania State University, USA
CONTACT
For inquiries please send an e-mail to gramsec17(a)easychair.org
The 5th ICDM Workshop on Data Science and Big Data Analytics (DSBDA 2017)
[http://www.bigdatalab.ac.cn/~dsbda/2017/]
In conjunction with
The IEEE International Conference on Data Mining (ICDM 2017)
[http://icdm2017.bigke.org/]
New Orleans, USA · November 18, 2017
Introduction
================
Due to the rapid development of IT technology including Internet, Cloud
Computing, Mobile Computing, and Internet of Things, as well as the
consequent decrease of cost on collecting and storing data, big data has
been generated from almost every industry and sector as well as
governmental department. The volume of big data often grows exponentially
or even in rates that overwhelm the well-known Moore’s Law. Meanwhile, big
data has been extended from traditional structured data into
semi-structured and completely unstructured data of various types, such as
text, image, audio, video, click streams, log files, etc.
It is no doubt that big data can offer us unprecedented opportunities.
However, it also poses many grand challenges. Due to the massive volume and
inherent complexity, it is extremely difficult to store, aggregate, manage,
and analyze big data and finally mine valuable information/knowledge from
the complex data/information networks. Therefore, in the presence of big
data, the theories, models, algorithms and methods of traditional data
related fields, such as, data mining, data engineering, machine learning,
statistical learning, computer programming, pattern recognition and
learning, visualization, uncertainty modeling, and high performance
computing etc., become no longer effective and efficient. On the other
hand, some data is generated exponentially or super-exponentially in a
streaming manner. Therefore, how to delicately analyze and deeply
understand big data so as to obtain dynamical and incremental information /
knowledge, is a grand challenge. In general, at the era of big data, it is
expected to develop new theories, models, algorithms, methods, and
paradigms for mining, analyzing, and understanding big data, and even a new
inter-discipline, Data Science, for studying the perception, acquisition,
transportation, storage, management, analysis, visualization, and
applications of big data, and finally implement the transformation from
data to knowledge.
DSBDA 2017 aims to provide a networking venue that will bring together
scientists, researchers, professionals, and practitioners from both
industry and academia and from different disciplines (including computer
science, social science, network science, etc.) to exchange ideas, discuss
solutions, share experiences, promote collaborations, and report
state-of-the-art research work on various aspects of data science and big
data analytics.
Topics
================
The topics of interest include, but are not limited to:
* Data science and data analytics
* Acquisition, representation, indexing, storage, and management of big data
* Processing, pre-processing, and post-processing of big data
* Models, algorithms, and methods for big data mining and understanding
* Knowledge discovery and acquisition from big data
* Visualizing analytics and organization for big data
* Streaming data processing
* Context data mining from big Web data
* Social computing over big Web data
* Industrial and scientific applications of big data
* Tools for big data analytics
Submissions
================
The page limit of workshop papers is 8 pages in the standard IEEE 2-column
format (http://www.ieee.org/conferences_events/conferences/publishing/
templates.html), including the bibliography and any possible appendices.
All papers must be formatted according to the IEEE Computer Society
proceedings manuscript style, following IEEE ICDM 2017 submission
guidelines available at http://icdm2017.bigke.org/. Papers should be
submitted in PDF format, electronically, using the CyberChair submission
system: https://wi-lab.com/cyberchair/2017/icdm17/scripts/submit.
php?subarea=SP04&undisplay_detail=1&wh=/cyberchair/2017/
icdm17/scripts/ws_submit.php.
Note that all accepted papers will be included in the IEEE ICDM 2017
Workshops Proceedings volume published by IEEE Computer Society Press, and
will also be included in the IEEE Xplore Digital Library. The workshop
proceedings will be in a CD separated from the CD of the main conference.
The CD is produced by IEEE Conference Publishing Services (CPS). Therefore,
papers must not have been accepted for publication elsewhere or be under
review for another workshop, conferences or journals.
Important Dates
================
Submissions Due Date: August 7, 2017
Notifications of Acceptance: September 7, 2017
Camera-Ready Deadline: September 15, 2017
Workshop Date: November 18, 2017
Steering Committee
===================
Prof. Benjamin W. Wah, Chinese University of Hong Kong, China
Prof. Jinpeng Huai, Beihang University, China
Prof. Xueqi Cheng, Institute of Computing Technology, Chinese Academy of
Sciences, China
Workshop Chairs
================
Dr. Xiaolong Jin
Institute of Computing Technology, Chinese Academy of Sciences (CAS), China
Email: jinxiaolong(a)ict.ac.cn
Dr. Jiafeng Guo
Institute of Computing Technology, Chinese Academy of Sciences (CAS), China
Email: guojiafeng(a)ict.ac.cn
Dr. Huewei Shen
Institute of Computing Technology, Chinese Academy of Sciences (CAS), China
Email: shenhuawei(a)ict.ac.cn
[Apologies if you receive this more than once]
CALL FOR ABSTRACTS
The 2017 International Conference on Brain Informatics (BI'17)
"Investigating the Brain and Mind from Informatics Perspective"
November 16-18, 2017, Beijing, China
Homepage: http://bii.ia.ac.cn/bi-2017/
---------------------------------------
SUBMISSION DEADLINE: August 30, 2017
One-line submission:
https://wi-lab.com/cyberchair/2017/bi17/scripts/submit.php?subarea=B
---------------------------------------
*** INVITED SPEECHES ***
1. "Multimodal Modelling of Network Propagation of Neuropathology in Dementia"
Alan Evans (McGill University, Canada)
2. "Neural Correlates of Word, Sentence and Story Comprehension"
Tom Mitchell (Carnegie Mellon University, US)
3. "The Cognitive Neural Basis of Object Knowledge"
Yanchao Bi (Beijing Normal University, China)
4. "Harnessing Large-Scale Data-Sharing to Drive Discovery and Bench-to-Bedside
Translation in Traumatic Brain Injury and Spinal Cord Injury"
Adam Ferguson (University of California San Francisco, US)
5. "Computational Psychophysiology Based Research Methodology for Mental Health"
Bin Hu (Lanzhou University, China)
6. "Multiscale Gene Expression Signatures in the Mammalian Brain in Health and Disease"
Michael Hawrylycz (Allen Institute for Brain Science, US)
7. "Machine Learning in Medical Imaging Analysis"
Dinggang Shen (University of North Carolina at Chapel Hill, US)
*** WORKSHOPS AND SPECIAL SESSIONS ***
++++++++++++++++++++++++++++++++++++++++++++
Abstract submission (TYPE II) is still open!
++++++++++++++++++++++++++++++++++++++++++++
To submit abstracts to workshops/special sessions,
please visit http://bii.ia.ac.cn/bi-2017/workshops.htm
# Workshop on Brain and Artificial Intelligence (BAI 2017)
Organizers:
Yi Zeng, Chinese Academy of Sciences, China
Shuliang Wang, Beijing Institute of Technology, China
# Workshop on Knowledge Representation: Brain and Machine (KRBM 2017)
Organizers:
Yanchao Bi, Beijing Normal University, China
Yi Zeng, Chinese Academy of Sciences, China
# Workshop on Affective, Psychological and Physiological Computing
(APPC 2017)
Organizers:
Bin Hu, Lanzhou University, China
Zhijun Yao, Lanzhou University, China
Mi Li, Beijing University of Technology, China
# Workshop on Big Data and Visualization for Brainsmatics (BDVB 2017)
Organizers:
Qingming Luo, Huazhong University of Science and Technology, China
Anan LI, Huazhong University of Science and Technology, China
# Workshop on Brain Big Data Based Wisdom Service (BBDBWS 2017)
Organizer:
Jiajin Huang, Beijing University of Technology, China
# Workshop on Semantic Technology for eHealth (STeH 2017)
Organizers:
Jiao Li, Chinese Academy of Medical Sciences, China
Zhisheng Huang, Vrije University Amsterdam, The Netherlands
# Workshop on Big Data Neuroimaging Analytics for Brain and Mental
Health (BDNABMH 2017)
Organizer:
Shouyi Wang, University of Texas at Arlington, USA
# Workshop on Novel Methods of the Brain Imaging in the Clinical and
Preclinical Neuroscience (NMBICPN 2017)
Organizers:
Vassiliy Tsytsarev, University of Maryland School of Medicine, USA
Vicky Yamamoto, Keck School of Medicine of USC, USA
Yan Li, University of Southern Queensland, Australia
# The 1st International Workshop on Deep Learning in Brain MRI and
Pathology Images (DLBMPI 2017)
Organizers:
Yan Xu, School of Biological Science and Medical Engineering, BUAA
Eric Chang, Microsoft Research Asia
# Workshop on Mesoscopic Brainformatics (MBAI 2017)
Organizers:
Dezhong Yao, University of Electronic Science and Technology of China, China
Pedro A. Valdes-Sosa, University of Electronic Science and Technology of China, China
Yong He, Beijing Normal University, China
Li Dong, University of Electronic Science and Technology of China, China
# Special Session on Brain Informatics in Neurogenetics (BIN 2017)
Organizers:
Hong Liang, Harbin Engineering University, China
Lei Du, Northwestern Polytechnical University, China
Li Shen, Indiana University School of Medicine, USA
# Special Session on BigNeuron Project (BP 2017)
Organizers:
Zhi Zhou, Allen Institute for Brain Sciences, USA
Min Liu, Hunan University, China
==================================================
Brain Informatics (BI) conference series provides a premier forum to
bring together researchers and practitioners in the fields of
neuroscience, cognitive science, computer science, data science,
artificial intelligence, information communication technologies, and
neuroimaging technologies.
BI'17 addresses the computational, cognitive, physiological,
biological, physical, ecological and social perspectives of brain
informatics, as well as topics relating to mental health and
well-being. It also welcomes emerging information technologies,
including but not limited to Internet/Web of Things (IoT/WoT), cloud
computing, big data analytics and interactive knowledge discovery
related to brain research. BI'17 also encourages submissions that
explore how advanced computing technologies are applied to and make a
difference in various large-scale brain studies and their
applications.
BI'17 welcomes paper submissions (full paper and abstract
submissions). Both research and application papers are solicited. All
submitted papers will be reviewed on the basis of technical quality,
relevance, significance and clarity. Accepted full papers will be
included in the proceedings by Springer LNCS/LNAI.
Workshop, Special-Session and Tutorial proposals, and
Industry/Demo-Track papers are also welcome. The organizers of
Workshops and Special-Sessions are invited to prepare a book proposal
based on the topics of the workshop/special session for possible book
publication in the Springer-Nature Brain Informatics & Health book
series (http://www.springer.com/series/15148).
*** Topics and Areas ***
Track 1: Cognitive and Computational Foundations of Brain Science
Track 2: Investigations of Human Information Processing Systems
Track 3: Brain Big Data Analytics, Curation and Management
Track 4: Informatics Paradigms for Brain and Mental Health
Track 5: Brain-Inspired Intelligence and Computing
IMPORTANT DATES :
===========================
May 1, 2017: Submission deadline for full papers
June 20, 2017: Notification of full paper acceptance
July 20, 2017: Submission deadline for workshop/special-session papers
August 30, 2017: Submission deadline for abstracts (TYPE-II)
(for both main conference and workshops/special sessions)
November 16, 2017: Tutorials, workshops and special-sessions
November 17-18, 2017: Main conference
ABSTRACT (TYPE-II) SUBMISSIONS :
=================================
(Submission Deadline: August 30, 2017):
Abstracts have a word limit of 500 words. Experimental research is
particularly welcome. Accepted abstract submissions will be included
in the conference program, and will be published as a single,
collective proceedings volume.
Title: Include in the title of the abstract all words critical for a
subject index. Write your title in sentence case (first letter is
capitalized; remaining letters are lower case). Do not bold or
italicize your full title.
Author: List all authors who contributed to the work discussed in the
abstract. The presenting author must be listed in the first author
slot of the list. Be prepared to submit contact information as well as
conflict of interest information for each author listed.
Abstract: Enter the body of the abstract and attach any applicable
graphic files or tables here. Do not re-enter the title, author,
support, or other information that is collected in other steps of the
submission form.
Presentation Preference: Authors may select from three presentation
formats when submitting an abstract: "poster only", "talk preferred"
or "no preference." The "talk preferred" selection indicates that you
would like to give a talk, but will accept a poster format if
necessary. Marking "poster only" indicates that you would not like to
be considered for an oral-presentation session. Selecting "no
preference" indicates the author's willingness to be placed in the
best format for the program.
Each paper or abstract requires one sponsoring attendee (i.e. someone
who registered and is attending the conference). A single attendee
can not sponsor more than two abstracts or papers.
Oral presentations will be selected from both full length papers and
abstracts.
-----------------------------------------------
One-line submission:
https://wi-lab.com/cyberchair/2017/bi17/scripts/submit.php?subarea=B
-----------------------------------------------
*** Post-Conference Journal Publication ***
The Brain Informatics conferences have the formal ties with Brain
Informatics journal (Springer-Nature,
http://www.springer.com/40708). Accepted abstracts from the conference
will be expanded and revised for possible inclusion in the
Brain Informatics journal each year. It is fully sponsored and no any
article-processing fee charged for authors of Brain Informatics conference.
ORGANIZERS
==========
General Chairs
Bo Xu (Chinese Academy of Sciences, China)
Hanchuan Peng (Allen Institute for Brain Sciences, USA)
Qingming Luo (Huazhong University of Science and Technology, China)
Program Committee Chairs
Yi Zeng (Chinese Academy of Sciences, China)
Yong He (Beijing Normal University, China)
Jeanette Kotaleski (Karolinska Institute, Sweden)
Maryann Martone (University of California, San Diego, USA)
Organizing Chairs
Ning Zhong (Maebashi Institute of Technology, Japan, and
Beijing Advanced Innovation Center for Future Internet Technology,
Beijing University of Technology, China
Jianzhou Yan (Beijing Advanced Innovation Center for Future Internet Technology,
Beijing University of Technology, China)
Shengfu Lu (Beijing Advanced Innovation Center for Future Internet Technology,
Beijing University of Technology, China)
Workshop/Special-Session Chairs
An'an Li (Huazhong University of Science and Technology, China)
Sen Song (Tsinghua University, China)
Tutorial Chair
Wenming Zheng (South East University, China)
Publicity Chairs
Tielin Zhang (Chinese Academy of Sciences, China)
Shouyi Wang (University of Texas at Arlington, USA)
Yang Yang (Maebashi Institute of Technology, Japan, and
Beijing Advanced Innovation Center for Future Internet Technology,
Beijing University of Technology, China)
Steering Committee Chairs
Ning Zhong (Maebashi Institute of Technology, Japan)
Hanchuan Peng (Allen Institute for Brain Science, USA)
*** Contact Information ***
tielin.zhang(a)ia.ac.cn
shouyiw(a)uta.edu
yang(a)maebashi-it.org
A Research Fellow position is immediately available at the Nanyang Technological University (NTU). This position is part of a corporate lab initiative involving NTU and Delta Electronics, a leading electronics manufacturing company. Successful candidate will conduct research to improve the resilience of industrial Cyber-Physical Systems and Internet of Things against dynamic environment conditions and cyber-attacks. The candidate should have obtained a PhD degree in computer science or computer engineering (or relevant disciplines) and demonstrated strong research ability by publications on prestigious venues in the areas of sensor networks, cyber-physical systems, and/or security. The candidate is expected to have good hands-on and programming skills. Knowledge and experiences with industrial systems are strong pluses.
The candidate will work with a team of five researchers, multiple NTU faculty members and Delta engineers. The position will provide an excellent opportunity to perform both basic and translational research in close collaboration with industry. Other advantages of the position include: (1) stable multi-year fund subject to satisfactory performance, (2) various opportunities in Singapore's strategic cyber resilience research cluster, e.g., Temasek Fellowship (http://www3.ntu.edu.sg/trf/index_trf.html), (3) high-quality living and low tax rates in Singapore.
Interested candidates can send CV with full publication list to Dr. Rui Tan at tanrui(a)ntu.edu.sg
Project Overview: Computer systems that control physical environments like manufacturing processes, known as Cyber-Physical Systems (CPS), have transformed significantly. Due to device proliferation and large-scale connectivity, a variety of functionalities are now feasible in CPS. However, connectivity also means that these systems operate in unreliable open environments, and hence resiliency to faults (reliability), malfunctions (safety) and attacks (security) become important. This resiliency is fundamentally dependent on the resiliency of the cyber-infrastructure of CPS (communication network and computation nodes), which plays a central role of data delivery and execution of control. The objective of this project is to design a resilient cyber-infrastructure for such emerging CPS. The project will design and prototype a resilient cyber-infrastructure including hardware platforms, middleware solutions and communication protocols. The developed solutions are expected to be used in real industrial systems.
________________________________
CONFIDENTIALITY: This email is intended solely for the person(s) named and may be confidential and/or privileged. If you are not the intended recipient, please delete it, notify us and do not copy, use, or disclose its contents.
Towards a sustainable earth: Print only when necessary. Thank you.
===============================================================================
Final Call for Papers for the
15th IEEE International Symposium on
Parallel and Distributed Processing with Applications
(IEEE ISPA 2017)
===============================================================================
Paper Submission Deadline extended to August 15, 2017 (Firm Deadline)
***One of China Computer Federation (CCF) Class "C" Conferences***
Organizers:
Guangzhou University, China
Central South University, China
Sponsors:
IEEE, IEEE Computer Society and IEEE TCSC.
Venue & Dates:
Guangzhou, China, December 12-15, 2017
http://trust.gzhu.edu.cn/conference/ISPA2017/
Co-Located Conferences:
(1) The 16th IEEE International Conference on Ubiquitous Computing and
Communications (IEEE IUCC 2017)
http://trust.gzhu.edu.cn/conference/IUCC2017/
(2) The 10th International Conference on Security, Privacy and Anonymity
in
Computation, Communication and Storage (SpaCCS 2017)
http://trust.gzhu.edu.cn/conference/SpaCCS2017/
-------------------------------------------------------------------------------
Keynote Speeches Section
You are welcome to attend 11+ Keynote Speeches Shared by Co-Located
IEEE ISPA 2017 & IEEE IUCC 2017 & SpaCCS 2017 Conferences:
http://trust.gzhu.edu.cn/conference/ISPA2017/KeynoteSpeeches.htm
Keynote Speaker 1: Prof. Geoffrey Fox, Indiana University, USA (Fellow of
APS
(Physics) and Fellow of ACM (Computing))
https://www.soic.indiana.edu/all-people/profile.html?profile_id=203
Title: Next Generation Grid: Integrating Parallel and Distributed
Computing
Runtimes from Cloud to Edge Applications
Keynote Speaker 2: Prof. Lajos Hanzo, University of Southampton, UK
(Fellow of
the Royal Academy of Engineering of UK, Fellow of the IEEE, Fellow of the
IEE/IET)
http://www-mobile.ecs.soton.ac.uk/newcomms/?q=people/lh
Title: Quantum-Search Algorithms, Quantum Codes and All That...
Keynote Speaker 3: Prof. Azzedine Boukerche, University of Ottawa, Canada
(Fellow of the IEEE, Fellow of the Canadian Academy of Engineering, Fellow
of the Engineering Institute of Canada, Fellow of the American Association
for the Advancement of Science)
http://www.site.uottawa.ca/~boukerch/
Title: Autonomous and Connected Vehicles: A New Challenge for Smart Cities
Keynote Speaker 4: Prof. Jie Wu, Temple University, USA (IEEE Fellow)
https://cis.temple.edu/~wu/
Title: Optimizing MapReduce Framework through Joint Scheduling of
Overlapping
Phases
Keynote Speaker 5: Prof. Robert Deng, Singapore Management University,
Singapore (IEEE Fellow)
http://www.mysmu.edu/faculty/robertdeng/
Title: Privacy-Preserving Access Control and Computations of Encrypted
Data
in the Cloud
Keynote Speaker 6: Prof. Ljiljana Trajkovic, Simon Fraser University,
Canada
(IEEE Fellow)
http://www.ensc.sfu.ca/~ljilja
Title: Data Mining and Machine Learning for Analysis of Network Traffic
Keynote Speaker 7: Professor Kin K. Leung, Imperial College London, UK
(IEEE Fellow)
http://www.commsp.ee.ic.ac.uk/~kkleung/
Title: TBD.
Keynote Speaker 8: Prof. Vijay Varadharajan, The University of Newcastle,
Australia (FIEE, FBCS, FACS, FIEAust, FIMA)
https://www.newcastle.edu.au/profile/vijay-varadharajan
Title: Security Challenges in Software Defined Networks Policy based
Security
Architecture for Software Defined Networks
Keynote Speaker 9: Prof. Hai Jin, Huazhong University of Science and
Technology, China (Cheung Kung Scholars Chair Professor, Fellow of the
CCF)
http://www.linkedin.com/in/jinhust
Title: Towards Dataflow-based Graph Accelerator
Keynote Speaker 10: Prof. Jianhua Ma, Hosei University, Japan
http://cis.k.hosei.ac.jp/~jianhua/mahome/
Title: TBD.
Keynote Speaker 11: Prof. Jinjun Chen, Swinburne University of Technology,
Australia
http://www.swinflow.org/~jchen/
Title: Big Data - Big Application
* More keynote speakers will be added later.
-------------------------------------------------------------------------------
Special Issues Section
Distinguished papers, after further revisions, will be published in 14+
SCI&EI
indexed special issues (confirmed):
(1) IEEE Transactions on Industrial Informatics (SCI&EI Indexed, Impact
Factor: 4.79)
http://tii.ieee-ies.org/
(2) IEEE Transactions on Emerging Topics in Computing (SCI&EI Indexed,
Impact
Factor: to appear soon)
https://www.computer.org/web/tetc
(3) IEEE Access (SCI&EI Indexed, Impact Factor: 1.270)
http://ieeeaccess.ieee.org/
(4) Information Sciences - Elsevier (SCI&EI Indexed, Impact Factor: 3.364)
http://www.journals.elsevier.com/information-sciences/
(5) Future Generation Computer Systems - Elsevier (SCI&EI Indexed, Impact
Factor: 2.430)
http://www.journals.elsevier.com/future-generation-computer-systems/
(6) Cluster Computing - Springer (SCI&EI Indexed, Impact Factor: 1.514)
http://link.springer.com/journal/10586
(7) Multimedia Tools and Applications - Springer (SCI&EI Indexed, Impact
Factor: 1.331)
https://link.springer.com/journal/11042
(8) Journal of Parallel and Distributed Computing - Elsevier (SCI&EI
Indexed,
Impact Factor: 1.320)
http://www.journals.elsevier.com/journal-of-parallel-and-distributed-comput…
(9) Concurrency and Computation: Practice and Experience - Wiley (SCI&EI
Indexed, Impact Factor: 0.94)
http://www.cc-pe.net/journalinfo/
(10) Security and Communication Networks - Hindawi (SCI&EI Indexed, Impact
Factor: 0.806)
https://www.hindawi.com/journals/scn/
(11) Future Internet - MDPI (ESCI & EI Indexed)
http://www.mdpi.com/journal/futureinternet
(12) International Journal of Computational Science and Engineering
(IJCSE) -
INDERSCIENCE (ESCI & EI Indexed)
http://www.inderscience.com/jhome.php?jcode=IJCSE
(13) International Journal of Embedded Systems (IJES) - INDERSCIENCE (EI
Indexed)
http://www.inderscience.com/jhome.php?jcode=IJES
(14) International Journal of High Performance Computing and Networking
(IJHPCN) - INDERSCIENCE (EI Indexed)
http://www.inderscience.com/jhome.php?jcode=ijhpcn
* More special issues will be added later.
-------------------------------------------------------------------------------
Introduction:
The IEEE ISPA 2017 (15th IEEE International Symposium on Parallel and
Distributed Processing with Applications) is a forum for presenting
leading
work on parallel and distributed computing and networking, including
architecture, compilers, runtime systems, applications, reliability,
security,
parallel programming models and much more. During the symposium,
scientists
and engineers in both academia and industry are invited to present their
work
on concurrent and parallel systems (multicore, multithreaded,
heterogeneous,
clustered systems, distributed systems, grids, clouds, and large scale
machines).
The 15th IEEE ISPA follows the tradition of previous successful IEEE ISPA
conferences in the years from 2003 to 2016 in Asia, Europe, Australia and
North America. It will feature sessions of regular presentations,
workshops,
tutorials and keynote speeches. IEEE ISPA 2017 is sponsored by the IEEE
Technical Committee on Scalable Computing (TCSC) and the IEEE Computer
Society. IEEE ISPA 2017 is particularly interested in research addressing
heterogeneous computing with the use of accelerators, mobile computing,
approximate computing, tools and methodologies to improve the quality of
parallel programming and applying generic computing approaches to
networks,
in particular Software Defined networking and its applications.
Scope and Interests
(1) Systems and Architectures Track
Cloud computing and data center technology
Migration of computations
Multi-clouds environments, cloud federation, interoperability
Energy management and Green Computing
Wireless and mobile networks
Internet of Things (IoT)
Social Networks, crowdsourcing, and P2P systems
(2) Technologies and Tools Track
Building block processors: FPGA, multicore, GPU, NoC, SoC
Parallel and distributed algorithms
Tools/environments for parallel/distributed software development
Novel parallel programming paradigms
Programming models for cloud services and applications
Code generation and optimization
Compilers for parallel computers
Middleware and tools
Scheduling and resource management
Performance simulations, measurement, and evaluations
Reliability, fault tolerance, dependability, and security
(3) Applications Track
High-performance scientific and engineering computing
Grid and cluster computing
Pervasive and ubiquitous computing
Databases, data mining, and data management
Big data and business analytics
Scientific cloud systems and services
Internet computing and web services
Application scenarios of IoT and ubiquitous computing
Experience with computational, workflow and data-intensive
applications
Software Defined Networks and its applications
Submission and Publication Information:
All papers need to be submitted electronically through the conference
website
(https://easychair.org/conferences/?conf=ispa2017) with PDF format.
Submitted
papers must not substantially overlap with papers that have been published
or
that are simultaneously submitted to a journal or a conference with
proceedings. Papers must be clearly presented in English, must not exceed
8
pages (or up to 12 pages with the pages over length charge), including
tables,
figures, references and appendixes, in IEEE Computer Society proceedings
Format
(
http://www.ieee.org/conferences_events/conferences/publishing/templates.html
)
with Portable Document Format (.pdf).
Papers will be selected based on their originality, timeliness,
significance,
relevance, and clarity of presentation. Submission of a paper should be
regarded as a commitment that, should the paper be accepted, at least one
of
the authors will register and attend the conference to present the work.
Accepted and presented papers will be included in the IEEE CPS
Proceedings.
Distinguished papers presented at the conference, after further revision,
will be recommended to high quality international journals.
Important Dates:
Paper Submission Deadline: August 15, 2017 (Extended Firm Deadline)
Author Notification: September 15, 2017
Camera-Ready Paper Due: October 15, 2017
Conference Dates: December 12-15, 2017
General Chairs:
Qinghua Zheng, Xi'an Jiaotong University, China
Albert Zomaya, University of Sydney, Australia
Azzedine Boukerche, University of Ottawa, Canada
Program Chairs:
Geoffrey Fox, Indiana University, USA
Gregorio Martinez, University of Murcia, Spain
Guojun Wang, Guangzhou University, China
Program Vice Chairs:
(1) Systems and Architectures Track
Jinjun Chen, University of Technology Sydney (UTS), Australia
Qing Yang, Montana State University, USA
(2) Technologies and Tools Track
Julien Bourgeois, Universit¨¦ de Franche-Comt¨¦, France
Gang Pan, Zhejiang University, China
(3) Applications Track
Javid Taheri, Karlstad University, Sweden
Weigang Li, University of Brasilia, Brazil
Steering Chairs:
Minyi Guo, Shanghai Jiao Tong University, China
Laurence T. Yang, St. Francis Xavier University, Canada
Program Committee Members
Please check the conference website for detail.
Workshop Chairs
Karl Andersson, Lulea University of Technology, Sweden
Habib M. Ammari, Norfolk State University, USA
Shui Yu, Deakin University, Australia
Andy Li, University of Florida, USA
Publicity Chairs:
Peter Mueller, IBM Zurich Research Laboratory, Switzerland
Mianxiong Dong, Muroran Institute of Technology, Japan
Wenbin Jiang, Huazhong University of Science and Technology, China
Publication Chair:
Fang Qi, Central South University, China
Registration Chair:
Pin Liu, Central South University, China
Organizing Chairs:
Dongqing Xie, Guangzhou University, China
Shuhong Chen, Guangzhou University, China
Xiaofei Xing, Guangzhou University, China
Webmaster:
Dacheng Meng, Central South University, China
Contact:
Please email inquiries concerning IEEE ISPA 2017 to:
Prof. Guojun Wang: csgjwang AT gmail DOT com and the conference organizers
(ISPA2017Guangzhou AT gmail DOT com).
Prof. Guojun Wang's Homepage: http://trust.gzhu.edu.cn/faculty/~csgjwang/
-------------------------------------------------------------------------------