Conference Information
TPS 2021: IEEE International Conference on Trust, Privacy and Security in Intelligent Systems, and Applications
http://www.sis.pitt.edu/lersais/conference/tps/2021/Submission Date: |
2021-10-14 Extended |
Notification Date: |
2021-11-15 |
Conference Date: |
2021-12-13 |
Location: |
Online |
Years: |
3 |
Viewed: 9701 Tracked: 2 Attend: 0
Call For Papers
Scope Recent advances in computing and information technologies such as IoT, mobile Edge/Cloud computing, cyber- physical-social systems, Artificial Intelligence/Machine Learning/ Deep Learning, etc., have paved way for creating next generation smart and intelligent systems and applications that can have transformative impact in our society while accelerating rapid scientific discoveries and innovations. Such newer technologies and paradigms are getting increasingly embedded in the computing platforms and networked information systems/infrastructures that form the digital foundation for our personal, organizational and social processes and activities. It is increasingly becoming critical that the trust, privacy and security issues in such digital environments are holistically addressed to ensure the safety and well-being of individuals as well as our society. IEEE TPS-ISA is an international multidisciplinary forum for presentation of state-of-the art innovations, and discussion among academic, industrial researchers, and practitioners on issues related to trust, privacy and security in emerging smart and intelligent systems and applications. Topics Topics of interest include, but are not limited to: Foundational, theoretical models for trust, privacy and security in emerging applications Trusted AI, Machine Learning and Deep Learning Privacy preserving Machine Learning and Deep Learning Trustworthy, safe and resilient intelligent systems Trusted, privacy-conscious and secure systems, applications and networks/infrastructures Security and privacy in IoT and Cyber-physical-human systems Trustworthy and secure Human-Machine collaboration Access and trust management/negotiation, and secure information flow/sharing Bio-inspired approaches to trust, privacy and security Game theoretical approaches to trust, privacy, and security Adversarial machine learning Trust, privacy and security for big data systems, applications and platforms Trust, privacy and security for smart cities and urban computing Machine Learning / Deep learning over encrypted data Usability and human factors for trust, privacy and security Tools, techniques and metrics for trust, privacy and security Anonymization techniques and differential privacy for emerging intelligent applications Trust, privacy and security approaches for services computing: microservices, service-oriented architectures, service composition and orchestration Blockchain and Distributed-ledger technologies Blockchain/Distributed ledger for e-commerce, mobile commerce and intelligent applications Bias, fairness and integrity/robustness of algorithmic machine / AI algorithms Trusted, privacy-aware and secure interoperation of interacting/collaborative systems Threat models and attack modeling for AI/ML and applications Identification/Detection of spam, phishing, malware and APTs Cryptographic approaches and secure multiparty computation Privacy-preserving data mining and big data analytics Application of AI/ML and Deep learning for trust, privacy and security Trust, privacy and security in edge/cloud computing, social computing Safe and trusted autonomous vehicles/UAVs, robotics Trust, security and safety in supply-chain environments and critical infrastructures Data quality/credence, privacy and provenance Trust in social media – disinformation/misinformation Risk metrics and measurements, assessment/analysis and mitigation Insider threat modeling, analysis and mitigation; behavioral modeling for security and trust Digital payments and cryptocurrencies; Secure and trustworthy e-commerce and mobile commerce Trust negotiation and/or propagation in interacting systems of systems, multi-agent systems, social networks.
Last updated by Dou Sun in 2021-10-03
Related Conferences
CCF | CORE | QUALIS | Short | Full Name | Submission | Notification | Conference |
---|---|---|---|---|---|---|---|
ICDE' | International Conference on Desalination and Environment | 2020-07-30 | 2020-08-28 | 2020-11-20 | |||
ISA | International Workshop on Intelligent Systems and Applications | 2012-12-18 | 2013-03-09 | ||||
b3 | ICSNC | International Conference on Systems and Networks Communications | 2023-08-10 | 2023-09-18 | 2023-11-13 | ||
ACS'' | International Conference on Advanced Computing and Services | 2014-01-05 | 2014-01-15 | 2014-02-19 | |||
NMCI | International Conference on New Material and Chemical Industry | 2022-01-25 | 2022-11-16 | ||||
b | DCOSS | International Conference on Distributed Computing in Sensor Systems | 2025-01-20 | 2025-03-28 | 2025-06-09 | ||
ICSC''' | Intelligent Cybersecurity Conference | 2025-01-15 | 2025-04-01 | 2025-05-19 | |||
c | c | APNOMS | Asia-Pacific Network Operations and Management Symposium | 2023-05-26 | 2023-07-14 | 2023-09-06 | |
ICIPT | International Conference on Information Processing, Management and Intelligent Information Technology | 2013-02-03 | 2013-02-20 | 2013-04-01 |
Short | Full Name | Submission | Conference |
---|---|---|---|
ICDE' | International Conference on Desalination and Environment | 2020-07-30 | 2020-11-20 |
ISA | International Workshop on Intelligent Systems and Applications | 2013-03-09 | |
ICSNC | International Conference on Systems and Networks Communications | 2023-08-10 | 2023-11-13 |
ACS'' | International Conference on Advanced Computing and Services | 2014-01-05 | 2014-02-19 |
NMCI | International Conference on New Material and Chemical Industry | 2022-01-25 | 2022-11-16 |
DCOSS | International Conference on Distributed Computing in Sensor Systems | 2025-01-20 | 2025-06-09 |
ICSC''' | Intelligent Cybersecurity Conference | 2025-01-15 | 2025-05-19 |
APNOMS | Asia-Pacific Network Operations and Management Symposium | 2023-05-26 | 2023-09-06 |
ICIPT | International Conference on Information Processing, Management and Intelligent Information Technology | 2013-02-03 | 2013-04-01 |
Related Journals
CCF | Full Name | Impact Factor | Publisher | ISSN |
---|---|---|---|---|
IET Electric Power Applications | IET | 1751-8660 | ||
c | Intelligent Data Analysis | 0.900 | IOS Press | 1088-467X |
c | ACM Transactions on Computing Education | 3.200 | ACM | 1946-6226 |
c | Distributed Computing | 1.300 | Springer | 0178-2770 |
Computers & Operations Research | 4.100 | Elsevier | 0305-0548 | |
c | Journal of Cybersecurity | 2.900 | Oxford University Press | 2057-2093 |
IEEE Wireless Communications | 10.90 | IEEE | 1536-1284 | |
Journal of Construction Engineering | Hindawi | 2356-7295 | ||
Journal of Electrical and Computer Engineering | 1.200 | Hindawi | 2090-0147 | |
Journal of Complex Analysis | Hindawi | 2314-4963 |
Full Name | Impact Factor | Publisher |
---|---|---|
IET Electric Power Applications | IET | |
Intelligent Data Analysis | 0.900 | IOS Press |
ACM Transactions on Computing Education | 3.200 | ACM |
Distributed Computing | 1.300 | Springer |
Computers & Operations Research | 4.100 | Elsevier |
Journal of Cybersecurity | 2.900 | Oxford University Press |
IEEE Wireless Communications | 10.90 | IEEE |
Journal of Construction Engineering | Hindawi | |
Journal of Electrical and Computer Engineering | 1.200 | Hindawi |
Journal of Complex Analysis | Hindawi |
Recommendation