> On Jan 27, 2020, at 8:00 AM, Henry Q <[email protected]> wrote: > > The 6th IEEE International Conference on Big Data Security on Cloud > (BigDataSecurity 2020) > May 25-27, Baltimore, USA > http://www.cloud-conf.net/datasec/2020/ > <http://www.cloud-conf.net/datasec/2020/hpsc/> > > > > *IMPORTANT DATES*Paper submission: *January 31st (extended), 2020* > Author notification: March 15th, 2020 > Camera-Ready: April 5th, 2020 > Registration: April 5th, 2020 > Conference date: May 25th-27th, 2020 > > > *CALL FOR PAPERS*With rapid development of big data storage and computing > techniques, we have developed novel techniques beyond big data. Many > aspects for both scientific research and people’s daily life have been > influenced by big data based technology such as artificial intelligence, > cloud computing, and Internet of Things. Providing security and privacy for > big data storage, transmission, and processing have been attracting much > attention in all big data related areas. IEEE BigDataSecurity 2020 > addresses this domain and aims to gather recent academic achievements in > this field. > > Security and robustness on Artificial Intelligence is the second > concentration of IEEE BigDataSecurity 2020. The emerging needs for building > reliable and robust AI models in Big Data and Cloud environments with > security and privacy guaranteed have attracted attention from a number of > different perspectives. The new methods deployed in Big Data and Cloud > environment have covered distinct dimensions, such as robust deep learning, > secure deep learning/machine learning, multi-party computing, edge/fog > computing, energy consumptions, high performance, and heterogeneous > resources, cloud models, heterogeneous architecture, tele-health, resource > allocation, load balance, multimedia, and QoS, etc. > > - Novel big data model > - Big data security issues in IoT > - Big data privacy issues in IoT > - Big data security issues in cloud computing > - Big data privacy in cloud computing > - Big data storage, integration, service, mining > - Blockchain-based security mechanism > - Blockchain-based big data sharing > - Security and privacy issues in blockchain > - Cyber hacking, next generation fire wall > - Cyber monitoring, incident response > - Database security, data center security > - Social engineering, insider threats, advance spear phishing > - Cyber threat intelligence > - Security and fault tolerance for embedded or ubiquitous systems > - Tele-health security in cloud computing > - Sensor network security in cloud computing > - Security policy and legal considerations > - Cloud and networking security > - Cloud computing and networking models > - Virtualization for big data on cloud > - MapReduce with cloud for big data processing > - Heterogeneous architecture for cloud computing > - Dynamic resource sharing algorithm for cloud computing > - Load balance for cloud computing > - Mobile cloud computing > - Mobile commerce security and privacy > - Green cloud computing > - Embedded networks and sensor network optimizations > - Cyber Security in emergent technologies > _______________________________________________ > AISWorld mailing list > [email protected]
_______________________________________________ uai mailing list [email protected] https://secure.engr.oregonstate.edu/mailman/listinfo/uai
