Conference Information
TPS 2021: IEEE International Conference on Trust, Privacy and Security in Intelligent Systems, and Applications
http://www.sis.pitt.edu/lersais/conference/tps/2021/
Submission Date:
2021-10-14 Extended
Notification Date:
2021-11-15
Conference Date:
2021-12-13
Location:
Online
Years:
3
Viewed: 9701   Tracked: 2   Attend: 0

Call For Papers
Scope

Recent advances in computing and information technologies such as IoT, mobile Edge/Cloud computing, cyber- physical-social systems, Artificial Intelligence/Machine Learning/ Deep Learning, etc., have paved way for creating next generation smart and intelligent systems and applications that can have transformative impact in our society while accelerating rapid scientific discoveries and innovations. Such newer technologies and paradigms are getting increasingly embedded in the computing platforms and networked information systems/infrastructures that form the digital foundation for our personal, organizational and social processes and activities. It is increasingly becoming critical that the trust, privacy and security issues in such digital environments are holistically addressed to ensure the safety and well-being of individuals as well as our society.

IEEE TPS-ISA is an international multidisciplinary forum for presentation of state-of-the art innovations, and discussion among academic, industrial researchers, and practitioners on issues related to trust, privacy and security in emerging smart and intelligent systems and applications.

Topics

Topics of interest include, but are not limited to:

    Foundational, theoretical models for trust, privacy and security in emerging applications
    Trusted AI, Machine Learning and Deep Learning
    Privacy preserving Machine Learning and Deep Learning
    Trustworthy, safe and resilient intelligent systems
    Trusted, privacy-conscious and secure systems, applications and networks/infrastructures
    Security and privacy in IoT and Cyber-physical-human systems
    Trustworthy and secure Human-Machine collaboration
    Access and trust management/negotiation, and secure information flow/sharing
    Bio-inspired approaches to trust, privacy and security
    Game theoretical approaches to trust, privacy, and security
    Adversarial machine learning
    Trust, privacy and security for big data systems, applications and platforms
    Trust, privacy and security for smart cities and urban computing
    Machine Learning / Deep learning over encrypted data
    Usability and human factors for trust, privacy and security
    Tools, techniques and metrics for trust, privacy and security
    Anonymization techniques and differential privacy for emerging intelligent applications
    Trust, privacy and security approaches for services computing: microservices, service-oriented architectures, service composition and orchestration
    Blockchain and Distributed-ledger technologies
    Blockchain/Distributed ledger for e-commerce, mobile commerce and intelligent applications
    Bias, fairness and integrity/robustness of algorithmic machine / AI algorithms
    Trusted, privacy-aware and secure interoperation of interacting/collaborative systems
    Threat models and attack modeling for AI/ML and applications
    Identification/Detection of spam, phishing, malware and APTs
    Cryptographic approaches and secure multiparty computation
    Privacy-preserving data mining and big data analytics
    Application of AI/ML and Deep learning for trust, privacy and security
    Trust, privacy and security in edge/cloud computing, social computing
    Safe and trusted autonomous vehicles/UAVs, robotics
    Trust, security and safety in supply-chain environments and critical infrastructures
    Data quality/credence, privacy and provenance
    Trust in social media – disinformation/misinformation
    Risk metrics and measurements, assessment/analysis and mitigation
    Insider threat modeling, analysis and mitigation; behavioral modeling for security and trust
    Digital payments and cryptocurrencies; Secure and trustworthy e-commerce and mobile commerce
    Trust negotiation and/or propagation in interacting systems of systems, multi-agent systems, social networks.
Last updated by Dou Sun in 2021-10-03
Related Conferences
CCFCOREQUALISShortFull NameSubmissionNotificationConference
ICDE'International Conference on Desalination and Environment2020-07-302020-08-282020-11-20
ISAInternational Workshop on Intelligent Systems and Applications 2012-12-182013-03-09
b3ICSNCInternational Conference on Systems and Networks Communications2023-08-102023-09-182023-11-13
ACS''International Conference on Advanced Computing and Services2014-01-052014-01-152014-02-19
NMCIInternational Conference on New Material and Chemical Industry2022-01-25 2022-11-16
bDCOSSInternational Conference on Distributed Computing in Sensor Systems2025-01-202025-03-282025-06-09
ICSC'''Intelligent Cybersecurity Conference2025-01-152025-04-012025-05-19
ccAPNOMSAsia-Pacific Network Operations and Management Symposium2023-05-262023-07-142023-09-06
ICIPTInternational Conference on Information Processing, Management and Intelligent Information Technology2013-02-032013-02-202013-04-01
Related Journals
CCFFull NameImpact FactorPublisherISSN
IET Electric Power ApplicationsIET1751-8660
cIntelligent Data Analysis0.900IOS Press1088-467X
cACM Transactions on Computing Education3.200ACM1946-6226
cDistributed Computing1.300Springer0178-2770
Computers & Operations Research4.100Elsevier0305-0548
cJournal of Cybersecurity2.900Oxford University Press2057-2093
IEEE Wireless Communications10.90IEEE1536-1284
Journal of Construction EngineeringHindawi2356-7295
Journal of Electrical and Computer Engineering1.200Hindawi2090-0147
Journal of Complex AnalysisHindawi2314-4963
Recommendation