区块链可投会议CCF C--TrustCom 2024 截止9.1 附去年录用文章

图片

Conference:23nd IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)

CCF level:CCF C

Categories:Network and Information Security

Year:2024

Conference time:December 17-21, 2024

录用率2023年接收了区块链文章30篇,详情请点击此处查看

Track 1: Trust Track
• Trust semantics, metrics and models
• Trusted computing platform
• Trusted network computing
• Trusted operating systems
• Trusted software and applications
• Trust in social networks
• Trust in e-commerce and e-government
• Trust in mobile and wireless communications
• Risk and reputation management
• Survivable computer systems/networks
• Trust in 5G networks
• Miscellaneous trust issues in Cyber Security
• System reverse engineering
• Watermarking and security
• Cryptanalysis and security solutions

Track 2: Security Track
• Network and cyber security
• Computer security
• Database security
• Web applications security
• Security policy, model and architecture
• Security in social networks
• Security in parallel and distributed systems
• Security in mobile and wireless communications
• Security in cloud/pervasive computing
• Authentication, authorization and accounting
• Security of 5G Networks
• Miscellaneous security issues
• Steganography and steganalysis
• Security-aware facial recognition

Track3: Privacy Track
• Privacy in web-based applications and services
• Privacy in database systems
• Privacy in parallel and distributed systems
• Privacy in cloud/pervasive computing
• Privacy in mobile and wireless communications
• Privacy in e-commerce and e-government
• Privacy in network deployment and management
• Privacy and trust
• Privacy and security
• Privacy and anonymity
• Privacy preservation in 5G
• Miscellaneous privacy issues
• Privacy-preserving biometrics

Track 4: Forensics and Analytics Track
• Anti-forensics and analytics
• Big data forensics
• CCTV forensics
• Cloud forensics
• Computational forensics
• Cyber-physical system forensics
• Datamining for forensics
• Fingerprint forensics
• Image forensics
• Malware forensics
• Mobile app forensics (e.g. Skype, WeChat and Facebook)
• Mobile device forensics
• Multimedia forensics
• Network forensics

Track 5: Emerging Tech Track
• Emerging hardware security
• Emerging security problems and solutions in edge/fog computing
• Emerging paradigms of deep learning in security
• Emerging applications of reinforcement learning for securing networks
• Emerging secure mechanisms for service delivery models
• Emerging quantum safe cryptography for 5G
• Emerging techniques in intelligent transportation systems
• Emerging network attacks & anomalies detection and prevention
• Emerging approaches to cybersecurity
• Emerging techniques in identity management
• Emerging approaches of smart contract and distributed ledger
• Emerging blockchain techniques

Track 6: AI Trust Track
• Robustness and safety of machine learning
• Attacks on AI models
• Non-discrimination and fairness of AI
• Transparency and explainability of AI
• Auditability and accountability of AI
• Privacy preservation of AI
• Data truth discovery
• Trust framework for AI model generation and usage
• Trusted computing platform for big data learning
• Adversarial learning
• Trustworthy data fusion

Important Dates

July 1, 2024

Workshop Proposal


September 1, 2024

Submission Deadline


October 15, 2024

Author Notification


November 10, 2024

Final Manuscript Due


November 10, 2024

Registration Due


December 17-21, 2024

Conference Date

详情:http://ieee-aiplus.org/2024/trustcom/index.php

图片

关注我们,持续接收区块链最新论文

洞察区块链技术发展趋势

最近更新

  1. docker php8.1+nginx base 镜像 dockerfile 配置

    2024-07-10 23:00:01       52 阅读
  2. Could not load dynamic library ‘cudart64_100.dll‘

    2024-07-10 23:00:01       54 阅读
  3. 在Django里面运行非项目文件

    2024-07-10 23:00:01       45 阅读
  4. Python语言-面向对象

    2024-07-10 23:00:01       55 阅读

热门阅读

  1. Scala 数据类型

    2024-07-10 23:00:01       21 阅读
  2. DP学习——简单工厂模式

    2024-07-10 23:00:01       14 阅读
  3. 从 Spark 离线数仓到 Flink 实时数仓:实战指南

    2024-07-10 23:00:01       19 阅读
  4. 浅析DDoS高防数据中心网络

    2024-07-10 23:00:01       22 阅读
  5. 奇幻的Python

    2024-07-10 23:00:01       21 阅读
  6. 记录一些简单的linux运维命令

    2024-07-10 23:00:01       20 阅读
  7. python--del

    2024-07-10 23:00:01       18 阅读
  8. BiLSTM模型实现

    2024-07-10 23:00:01       22 阅读
  9. Vue2.0和Vue3.0的区别?

    2024-07-10 23:00:01       24 阅读
  10. 网络安全应急处理流程

    2024-07-10 23:00:01       18 阅读