区块链可投会议CCF C--TrustCom 2024 截止9.1 附去年录用文章

Conference:23nd IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)

CCF level:CCF C

Categories:Network and Information Security

Year:2024

Conference time:December 17-21, 2024

录用率2023年接收了区块链文章30篇,详情请点击此处查看

Track 1: Trust Track

• Trust semantics, metrics and models
• Trusted computing platform
• Trusted network computing
• Trusted operating systems
• Trusted software and applications
• Trust in social networks
• Trust in e-commerce and e-government
• Trust in mobile and wireless communications
• Risk and reputation management
• Survivable computer systems/networks
• Trust in 5G networks
• Miscellaneous trust issues in Cyber Security
• System reverse engineering
• Watermarking and security
• Cryptanalysis and security solutions
Track 2: Security Track
• Network and cyber security
• Computer security
• Database security
• Web applications security
• Security policy, model and architecture
• Security in social networks
• Security in parallel and distributed systems
• Security in mobile and wireless communications
• Security in cloud/pervasive computing
• Authentication, authorization and accounting
• Security of 5G Networks
• Miscellaneous security issues
• Steganography and steganalysis
• Security-aware facial recognition
Track3: Privacy Track
• Privacy in web-based applications and services
• Privacy in database systems
• Privacy in parallel and distributed systems
• Privacy in cloud/pervasive computing
• Privacy in mobile and wireless communications
• Privacy in e-commerce and e-government
• Privacy in network deployment and management
• Privacy and trust
• Privacy and security
• Privacy and anonymity
• Privacy preservation in 5G
• Miscellaneous privacy issues
• Privacy-preserving biometrics
Track 4: Forensics and Analytics Track
• Anti-forensics and analytics
• Big data forensics
• CCTV forensics
• Cloud forensics
• Computational forensics
• Cyber-physical system forensics
• Datamining for forensics
• Fingerprint forensics
• Image forensics
• Malware forensics
• Mobile app forensics (e.g. Skype, WeChat and Facebook)
• Mobile device forensics
• Multimedia forensics
• Network forensics
Track 5: Emerging Tech Track
• Emerging hardware security
• Emerging security problems and solutions in edge/fog computing
• Emerging paradigms of deep learning in security
• Emerging applications of reinforcement learning for securing networks
• Emerging secure mechanisms for service delivery models
• Emerging quantum safe cryptography for 5G
• Emerging techniques in intelligent transportation systems
• Emerging network attacks & anomalies detection and prevention
• Emerging approaches to cybersecurity
• Emerging techniques in identity management
• Emerging approaches of smart contract and distributed ledger
• Emerging blockchain techniques
Track 6: AI Trust Track
• Robustness and safety of machine learning
• Attacks on AI models
• Non-discrimination and fairness of AI
• Transparency and explainability of AI
• Auditability and accountability of AI
• Privacy preservation of AI
• Data truth discovery
• Trust framework for AI model generation and usage
• Trusted computing platform for big data learning
• Adversarial learning
• Trustworthy data fusion

Important Dates

July 1, 2024

Workshop Proposal


September 1, 2024

Submission Deadline


October 15, 2024

Author Notification


November 10, 2024

Final Manuscript Due


November 10, 2024

Registration Due


December 17-21, 2024

Conference Date

详情:http://ieee-aiplus.org/2024/trustcom/index.php

关注我们,持续接收区块链最新论文

洞察区块链技术发展趋势

相关推荐
Roun315 小时前
去中心化存储:Web3中的数据安全新标准
web3·去中心化·区块链
请不要叫我菜鸡19 小时前
分布式——一致性模型与共识算法
分布式·后端·区块链·raft·共识算法·zab
BlockOne1120 小时前
Meme 币生态全景图分析:如何获得超额收益?
大数据·人工智能·区块链
霸都小魔女20 小时前
MT4交易的平仓与强制平仓有哪几种情况
大数据·人工智能·区块链
dingzd951 天前
Web3对社交媒体的影响:重新定义用户互动方式
web3·去中心化·区块链·媒体
复业思维202401081 天前
2024年10月第4个交易周收盘总结(10月收盘)
区块链
倾城璧1 天前
solidity中的Error和Modifier详解
区块链
搬砖的小码农_Sky1 天前
什么是区块链中的不可能三角?
区块链
web3探路者1 天前
加密货币行业与2024年美国大选
java·大数据·web3·区块链·团队开发·开源软件
yoona10202 天前
《女巫攻击:潜伏在网络背后的隐秘威胁与防御策略》
网络·web安全·区块链·学习方法·女巫攻击