General Chairs:
Prof. Xiaoliang Wang
School of computer science and engineering, Hunan University of Science and Technology, China
Email: fengwxl@hnust.edu.cn
Prof. Frank Jiang
School of Info Technology, Deakin University, Geelong, VIC 3220, Australia
Email: Frank.Jiang@deakin.edu.au
Prof. Robin Doss
School of Info Technology, Deakin University, Geelong, VIC 3220, Australia
Email: robin.doss@deakin.edu.au
TPC Chairs:
Dr. Yuzhen Liu
School of computer science and engineering, Hunan University of Science and Technology, China
Email: yzhenliu@126.com
Prof. Neal N. Xiong
Department of Mathematics and Computer Science Northeastern State University
Address: 611 N. Grand Ave, #323, Webb center, Tahlequah, OK 74464
Email: xiongnaixue@gmail.com,
Xiaoliang Wang (Member, IEEE) received the B.E. degree in computer engineering from Xiangtan University, China, and the master's degree of computer science from the joint education of Xiangtan University and the Institute of Computing Technology of the Chinese Academy of Sciences, China. He received the Ph.D. degree from Hunan University, China. He has worked at Xiangtan University and the Nanjing Government of China, and has also worked as a postdoctoral researcher at the University of Alabama, USA. Currently, he is a professor of information technology and the director of the Department of Internet of Things Engineering, Hunan University of Science and Technology, China. He leads a team of researchers and students in the areas of Information Security and Internet of Things, such as VANET security, Anonymous Authentication in Ad Hoc Networks. His has published more than 60 highly reputed SCI/EI indexed journals/ conferences articles and his research has been funded by Natural Science Foundation Committee and Ministry of Education of China.
Frank Jiang (Member, IEEE) is a mature and active mid-career researcher with over 15 years teaching experiences within Australia, holding a senior lectureship in cyber security at School of IT at Deakin University, Australia. He completed his PhD degree in communication engineering and cyber security at University of Technology, Sydney (UTS). In 2011, he was awarded a highly prestigious UNSW Vice-Chancellor's Postdoctoral Fellowship (successful rate less than 4.5%) by University of New South Wales at Australian Defence Force Academy for four years (2011-2014). Frank received the research impact award from the School of IT at Deakin in 2019. Frank has been successful in securing a number of commercialised funds, he also has a deep understanding of business requirements and pressures, governance and risk management and worked with a number of organisations in Sydney area including government agencies and business corporations. His broad research expertise and interests span across IoT security and privacy, Bio-inspired context-awareness, Quantum Cryptography, Embedded hardware FPGA and motes, Human factorised next generation authentication for the Critical Infrastructure, Active defence systems in V2X, Social behaviour-based personalised anomaly detection, Blockchain-based supply chain/logistics, Medical image segmentation for 3D electron microscopy-based (EM) images, High frequency modulation/demodulation for Underwater Communications. He holds one Australian invention patent in computer IDS security industry as the 1st inventor, published so far over 120 highly reputed journal and conference articles (H-index 18), which includes 78 papers in venues ranked A*/A by the 2020 CORE ranking, primarily published in IEEE Trustcom, AAAI, ICDM, BIBM, ICSOC, WCCI, ACM Computing Surveys, KBS, IEEE TNSM, IEEE TSMCS, EA of AI, PLA.
ROBIN DOSS (Senior Member, IEEE) received the B.E. degree in electronics and communication engineering from the University of Madras, India, and the master's and Ph.D. degrees from the Royal Melbourne Institute of Technology (RMIT), Australia. He was a part of the Technical Services Group, Ericsson Australia, and a Research Engineer at RMIT University. He is currently a Professor of information technology and the Deputy Head of the School of Information Technology, Deakin University, Australia. He leads a team of researchers and Ph.D. students in the broad areas of communication systems and cybersecurity with a focus on emerging domains, such as IoT, pervasive computing, applied machine learning, and ambient intelligence. His research has been funded by the National Security Science and Technology Branch of the Office of National Security in collaboration with the Defence Signals Directorate, the Australian Research Council, and industry partners. He is the Founding Chair of the Future Network Systems and Security Conference series and an Associate Editor of the journal of Cyber-Physical Systems.
Kuan-Ching Li (Senior Member, IEEE) is currently a Distinguished Professor with Providence University, where he is also the Director of the High-Performance Computingand Networking Center. He published more than 450 scientific papers and articles. Heis the coauthor or coeditor of more than 50 books published by well-known publishers. His research interests include parallel and distributed computing, big data, and emerging technologies. He is a fellow of the IET. He is the Editor-in-Chief of IJCSE and IJES. He also serves as an associate editor for several leading journals.
Neal N. Xiong (Senior Member, IEEE) is current an Associate Professor (6rd year) at Department of Mathematics and Computer Science, Northeastern State University, OK, USA. He received his both PhD degrees in Wuhan University (2007, about sensor system engineering), and Japan Advanced Institute of Science and Technology (2008, about dependable communication networks), respectively. Before he attended Northeastern State University, he worked in Georgia State University, Wentworth Technology Institution, and Colorado Technical University (full professor about 5 years) about 10 years. His research interests include Cloud Computing, Security and Dependability, Parallel and Distributed Computing, Networks, and Optimization Theory.
This Special Collection aims at seeking original articles with novel perspectives and solutions to address the cryptographic security and information hiding technology for Cloud or Fog-based IoT system. We expect this Special Collection can provide scientists, researchers, and industrial practitioners with a chance to publish original manuscripts that demonstrate and explore current advances in all aspects of security, privacy, trust and covert communication issue for Cloud or Fog computing/architecture IoT system.
Duration of the workshop: Half-Day
Tentative Schedule:
08:00-09:00 am: CSIHTIS - Keynote;
09:00-10:00 am: CSIHTIS - Cryptographic Security Technology for IoT System;
10:00-10:10 pm: Networking Break;
10:10-11:30 pm: CSIHTIS -Information Hiding Technology for IoT System;
11:30-12:00 am: Panel Discussion;
Number of referred papers: 10-15
Hot Topic Sessions:
CSIHTIS - Keynote;
CSIHTIS - Cryptographic Security Technology for IoT System;
CSIHTIS -Information Hiding Technology for IoT System;
Keynotes: TBA
JingyuWang, Jilin University, China
Baowei Wang, Nanjing University of Information Science andTechnology, China
Yuling Liu, Hunan University, China
Zhewei Liang,University of Western Ontario, Canada
Mao Tan, Technische Universität Berlin,Gemany
Zhangjie Fu, Nanjing University of Information Science andTechnology, China
Zhetao Li, Jinan University, China
Honglong Chen, China Unviersity of Petroleum, China
Xiong Li, University of Electronic Science and Technology of China, China
Haibo Zeng, Virginia Polytechnic Institute and State University, USA
Jiaohua Qin, Central South University of Forestry and Technology, China
Hengfu Yang, Hunan First Normal University, China
Guang Sun, Hunan University of Finance and Economics, China
This Special Collection aims at seeking original articles with novel perspectives and solutions to address the cryptographic security and information hiding technology for Cloud or Fog-based IoT system. We expect this Special Collection can provide scientists, researchers, and industrial practitioners with a chance to publish original manuscripts that demonstrate and explore current advances in all aspects of security, privacy, trust and covert communication issue for Cloud or Fog computing/architecture IoT system.
Topics of interest for this workshop, include, but are not limited to:
• Data Security and Privacy-preserving.
• Attacks and Countermeasures
• Trust Model, Data Aggregation and Information Sharing
• Secure Hardware and Software for IoT
• Coverless Information Hiding
• Steganography and Steganalysis
• Digital Watermarking, Fingerprinting and Forensics
• Multimedia Authentication and Encryption
• Covert/Subliminal Channels
Papers submitted to the workshop should be written in English conforming to the IEEE 2-column US-letter style IEEE Conference Template and submitted in pdf format. The paper should be submitted through EasyChair. Prospective authors are invited to submit full papers up to 6 pages (Long Papers, including tables, figure and references) in length. Accepted and presented papers will be included into the IEEE explore. Authors of accepted papers, or at least one of them, are requested to register and present their work at the conference, otherwise their papers will be removed from the digital libraries of IEEE after the conference.
Paper Submission Deadline
Paper Acceptance Notification
Camera-Ready Paper submission Deadline
Conference Date
Web site is up.
Submission Due
Submission Due(extended)
Notification
Notification
Camera-Ready Due
Conference Date
Paper Submission
Author Notification
Camera-ready
Conference Date
Paper Submission Deadline
Paper Acceptance Notification
Camera-Ready Paper submission Deadline
Conference Date
Paper Submission Deadline
Paper Submission Deadline
Paper Acceptance Notification
Camera-Ready Paper submission Deadline
Conference Date
Paper Submission Deadline
Paper Acceptance Notification
Camera-Ready Paper submission Deadline
Conference Date
Paper Submission Deadline
Paper Acceptance Notification
Camera-Ready Due
Conference Date
Paper Submission Deadline
Paper Acceptance Notification
Camera-Ready Paper submission Deadline
Conference Date
Copyright © 2024 International Conference on Mobility, Sensing and Networking