<html><head></head><body><div class="yahoo-style-wrap" style="font-family:Helvetica Neue, Helvetica, Arial, sans-serif;font-size:13px;"><div dir="ltr" data-setdir="false"><div>Please accept our apologies if you receive multiple copies of this UbiSec 2021 Call for Papers (CFPs) with Deadline (August 15, 2021).<br><br>============================== UbiSec 2021 ==============================<br><br>Conferences Pivoting to a Part-Virtual Platform<br>[UbiSec 2021] – Now Taking Place Part-Virtually<br>The safety and well-being of all conference participants is our priority. After evaluating the current COVID-19 situation, the decision has been made to transform the in-person component of the conference into a part-digital conference experience – the conference will now be a combination of online and offline event. Therefore, the conference will take place partly in Guangzhou, China and will also take place part-virtually. For questions, contact [UbiSec2021 AT googlegroups DOT com].<br><br>Call for Papers (CFPs) of The 17th International Conference on Ubiquitous Security (UbiSec 2021) <br>Guangzhou, China, December 28 - 31, 2021<br><br>Organizer:<br><br>Guangzhou University, China<br><br>http://ubisecurity.org/2021/<br><br>======================================================================<br><br>Keynote Speeches Section<br><br>You are welcome to attend 5+ Keynote Speeches offerred by world-renowned professors and industry leaders. The detailed information will appear soon.<br><br>======================================================================<br><br>Invited Talks Section<br><br>You are welcome to attend 10+ Invited Talks offerred by world-renowned professors and industry leaders. The detailed information will appear soon.<br><br>======================================================================<br><br>Panel Discussions Section<br><br>You are welcome to attend 2+ Panel Discussions offerred by world-renowned professors and industry leaders. The detailed information will appear soon.<br><br>======================================================================<br><br>Special Issues Section<br><br>Distinguished papers, after further revisions, will be published in 20+ SCI & EI indexed special issues. <br><br>Here is the list of Special Issues that we will recommend high-quality papers for possible publication *:<br><br>(1) Electronics (SCI & EI Indexed, Impact Factor: 2.412) <br>Special Issue on Recent Advanced Control, Applications, and Optimization for WSN and the IoT<br>https://www.mdpi.com/journal/electronics/special_issues/Control_WSN_IoT<br>Deadline for manuscript submissions: 30 April 2022.<br><br>(2) Electronics (SCI & EI Indexed, Impact Factor: 2.412)<br>Special Issue on New Advances and Challenges in Communication Networks<br>https://www.mdpi.com/journal/electronics/special_issues/new_ad_cha_communication_networks<br>Deadline for manuscript submissions: 1 January 2022.<br><br>(3) Journal of Applied Remote Sensing (JARS) (SCI & EI Indexed, Impact Factor: 1.36)<br>Special Issue on Remote Sensing for Sustainable Forest Management<br>https://www.spiedigitallibrary.org/journals/journal-of-applied-remote-sensing/call-for-papers<br>Deadline for manuscript submissions: 31 December 2021. <br><br>(4) Computer Modeling in Engineering & Sciences (SCI & EI Indexed, Impact Factor: 0.805) <br>Special Issue on Advanced Mathematical Tool-Based Internet of Things (IoT)<br>https://www.techscience.com/CMES/special_detail/mathematical-tool<br>Deadline for manuscript submissions: 31 December 2021.<br><br>(5) Electronics (SCI & EI Indexed, Impact Factor: 2.412)<br>Special Issue on Intelligent Systems and Control Application in Autonomous Vehicle<br>https://www.mdpi.com/journal/electronics/special_issues/Intelligent_System_Autonomous_Vehicle<br>Deadline for manuscript submissions: 30 December 2021.<br><br>(6) Applied Sciences (SCI & EI Indexed, Impact Factor: 2.474) <br>Special Issue on Deep Learning for Signal Processing Applications<br>https://www.mdpi.com/journal/applsci/special_issues/Signal_Processing_Applications_Signal_Processing_Applications<br>Deadline for manuscript submissions: 30 October 2021 (with possible extension later).<br><br>(7) Sensors (SCI & EI Indexed, Impact Factor: 3.275)<br>Special Issue on Smart Sensors, Big Data Analytics and Modelling in Healthcare and Personalized Medical Applications<br>https://www.mdpi.com/journal/sensors/special_issues/Smart_Sensors_Healthcare_Medical_Applications<br>Deadline for manuscript submissions: 30 September 2021 (with possible extension later).<br><br>(8) Sensors (SCI & EI Indexed, Impact Factor: 3.275)<br>Special Issue on AI and Big Data Analytics in Sensors and Applications<br>https://www.mdpi.com/journal/sensors/special_issues/ABDASA<br>Deadline for manuscript submissions: 31 December 2021.<br><br>(9) Electronics (SCI & EI Indexed, Impact Factor: 2.412)<br>Special Issue on Artificial Intelligence of Things (AIoT) for 5G Communication Networks<br>https://www.mdpi.com/journal/electronics/special_issues/AIoT_electronics<br>Deadline for manuscript submissions: 30 September 2021 (with possible extension later).<br><br>(10) Connection Science (SCI & EI Indexed, Impact Factor: 1.042) <br>https://www.tandfonline.com/ccos20<br>Some selected conference papers will be recommended for possible publication in regular issues of this journal, with a sufficient amount of new materials added into the journal version.<br><br>(11) Network Modeling Analysis in Health Informatics and Bioinformatics (EI Indexed)<br>Call for Papers: Explainable Artificial Intelligence for Medical Applications based on Internet of Health Things (IoHT)<br>https://www.springer.com/journal/13721/updates/19242586<br>Deadline for manuscript submissions: 31 December 2021.<br><br>(12) International Journal of Computational Science and Engineering (IJCSE)(EI Indexed)<br>http://www.inderscience.com/browse/index.php?journalCODE=ijcse<br>Some selected conference papers will be recommended for possible publication in regular issues of this journal, with a sufficient amount of new materials added into the journal version.<br><br>(13) International Journal of Embedded Systems (IJES) (EI Indexed)<br>http://www.inderscience.com/browse/index.php?journalCODE=ijes<br>Some selected conference papers will be recommended for possible publication in regular issues of this journal, with a sufficient amount of new materials added into the journal version.<br><br>* More special issues will be available soon.<br><br>======================================================================<br><br>Welcome to participate in UbiSec 2021, Guangzhou, China, December 28 - 31, 2021! Guangzhou, a city in spring forever, is the capital city of Guangdong Province. Guangzhou is also the third largest city in China, located in the north of the Pearl River Delta, close to Hong Kong and Macau. With evergreen plants and flowers blooming all year round, the city has an alias of "City of Flowers". Guangzhou is one of the first batch of 24 historical and cultural cities released by the State Council, with more than 2200 years of history and profound cultural heritage, and also a major terminus of the maritime Silk Road. Guangzhou is one of the most famous tourist resorts in China, with a lot of tourist sites, such as Baiyun Mountain, Guangzhou Tower, and Yuexiu Park.<br><br>The 17th International Conference on Ubiquitous Security (UbiSec 2021) stems from three conference/symposium/workshop series:<br><br>(1) The well-established SpaCCS conference series with Springer LNCS (http://www.spaccs2020.com/): UbiSec is inspired by the SpaCCS style of three tracks (Security, Privacy, and Anonymity, “Spa” for short), which covers “Big Security” leveraging computation, communication and storage (“CCS” for short) systems and networks. UbiSec extends this style with three new tracks: Cyberspace Security, Cyberspace Privacy, and Cyberspace Anonymity.<br><br>(2) The UbiSafe symposium series (http://www.spaccs.org/UbiSafe2020/): UbiSec follows the UbiSafe vision on “Ubiquitous Safety”, also meaning that “YOU (will) BE SAFE” (pronounced “UbiSafe”). UbiSec extends this vision to “Ubiquitous Security”, using “Big Security” to embrace NOT ONLY security, privacy and anonymity, BUT ALSO safety, reliability, dependability, trustworthiness and more, also meaning that “YOU (will) BE SEC(ure)” (pronounced “UbiSec”).<br><br>(3) The IWCSS workshop series (http://ieee-trustcom.org/IWCSS2020/): UbiSec follows the IWCSS theme on “Cyberspace Security”, with “Cyberspace” as the 5th national sovereign space besides the traditional four domains of land, sea, air, and aerospace. UbiSec extends this theme to “Ubiquitous Security”, meaning that cyberspace will be secure, physical world will be secure, social networking systems will be secure, and thus “YOU (will) BE SECure”!<br><br>The UbiSec 2021 Conference (“The Conference” for short) is the 17th event in the series of conferences/symposia/workshops which are devoted to security, privacy and anonymity in cyberspace, physical world, and social networks. The Conference covers many dimensions including security algorithms and architectures, privacy-aware policies, regulations and techniques, anonymous computation and communication, encompassing fundamental theoretical approaches, practical experimental projects, and commercial application systems for cyberspace, physical world, and social networking systems. As applications of computer and information technology have permeated in every aspect of our daily life, the issues of security, privacy, and anonymity have become increasingly critical. The Conference will provide a forum for world-class researchers to gather and share their research achievements, emerging ideas and trends in the highly challenging research fields.<br><br>UbiSec 2021 topics include, but are not limited to the following:<br><br>Track 1: Cyberspace Security<br><br> --Security Model and Architecture<br> --Software and System Security<br> --Trustworthy Computing<br> --Security in Cloud/Fog/Edge Computing and Pervasive/Ubiquitous Computing<br> --Machine Learning and AI Security<br> --Network Security<br> --Attacks and Defenses<br> --Intrusion Detection and Prevention<br> --Security in Web Services<br> --Security in Mobile Social Networks<br> --Security in Internet of Things<br> --Fraud and Cyber Crime<br> --Accounting and Auditing<br> --Applied Cryptography<br> --Database Security<br> --Authentication<br> --Forensics and Diagnostics for Security<br> --Information Hiding<br> --Security in Big Data and its Applications<br> --Blockchain and Distributed System Security<br> --Security in Hardware, Side Channels, and CyberPhysical Systems<br> --Security in Formal Methods and Programming Languages<br> <br><br>Track 2: Cyberspace Privacy<br><br> --Economics, Policies, Metrics, and Mechanisms of Privacy<br> --Privacy Modeling and Analysis<br> --Privacy-Preserving Computing<br> --Privacy-Preserving Data Mining<br> --Privacy-enhancing Technologies and Anonymity<br> --Privacy for the Internet of Things<br> --Privacy in Big Data and its Applications<br> --Privacy-Preserving in Blockchain<br> --Privacy-Preserving in Mobile Social Networks<br> --Privacy-Preserving Crowdsensing<br> --Privacy-Preserving Deep Learning<br> <br><br>Track 3: Cyberspace Anonymity<br><br> --Anonymous Data Mining and Data Sharing<br> --Anonymous Management in Trust Relationships<br> --Anonymous Video Analytics Technology<br> --Anonymity Metrics, Measures and Evaluations<br> --Anonymity Models, Hardware/Device of Anonymity<br> --Anonymity in Wireless Communication Systems<br> --Anonymous Communication Protocols<br> --Anonymity in Mobile, Ad Hoc, and Wireless Sensor Networks<br> --Anonymous Communication and Internet<br> --Anonymous Social Networks, Structural k-Anonymity in Social Networks<br> --Authentication Protocol Providing User Anonymity<br> --Anonymous Information Storage and Management<br> --Private and Anonymous Data Storage<br> --Anonymity, Pseudonymity & Identity Management<br> --Anonymity in Big Data and Cloud Scenarios<br> --Anonymity in Health and Medical Databases<br> --Anonymity in Sensor-Cloud Systems<br> --Anonymity in Edge Computing<br><br><br>IMPORTANT DATES<br>Paper Submission Deadline: August 15, 2021<br>Author Notification: October 15, 2021<br>Author Registration Due: October 15, 2021<br>Camera-Ready Paper Due: October 28, 2021<br>Conference Dates: December 28 - 31, 2021<br><br>SUBMISSION and PUBLICATION INFORMATION<br>All presented papers in the conference will be published in the proceedings of the conference and submitted to the Xplore Digital Library. Papers must be clearly presented in English, must not exceed 14 pages in Springer LNCS format (or up to 20 pages with the pages over length charge), including tables, figures, references and appendices. Papers should be submitted through the paper submission system at the symposium website. Distinguished papers, after further revisions, will be considered for possible publication in SCI & EI indexed special issues of prestigious international journals. The program committee will select and give two or three "Best Paper Awards" for the conference. By submitting a paper to the conference, authors assure that if the paper is accepted, at least one author will attend the conference and present the paper.<br><br>Local Organizing Chair<br>Hanpin Wang, Guangzhou University, China<br><br>General Chairs<br>Guojun Wang, Guangzhou University, China<br>Kouichi Sakurai, Kyushu University, Japan<br>Ravi Sandhu, University of Texas at San Antonio, USA<br> <br>Program Chairs<br>Ryan Ko, University of Queensland, Australia<br>Yang Xu, Hunan University, China<br>Bruno Crispo, University of Trento, Italy<br><br>Program Vice Chairs/Track Chairs<br>(1) Cyberspace Security Track<br>Qin Liu, Hunan University, China<br>Simon Parkinson, University of Huddersfield, United Kingdom<br>Shajulin Benedict, Indian Institute of Information Technology Kottayam (IIIT-Kottayam), Germany<br>Wei Chang, Saint Joseph's University, USA<br>Wenjia Li, New York Institute of Technology, USA<br><br>(2) Cyberspace Privacy Track<br>Wenjun Jiang, Hunan University, China<br>Radu Prodan, Klagenfurt University, Austria<br>Saqib Ali, University of Agriculture Faisalabad, Pakistan<br>Anish Shrestha, Sejong University, Korea<br>Quazi Mamun, Charles Sturt University, Australia<br><br>(3) Cyberspace Anonymity Track<br>Tian Wang, Beijing Normal University & UIC, China<br>Sergio Duarte Correia, Instituto Politecnico de Portalegre, Portugal<br>Dragan Perakovic, University of Zagreb, Croatia<br>Avinash Srinivasan, TDI Technologies, USA<br>A. S. M. Kayes, La Trobe University, Australia<br><br>Publicity Chairs<br>Carlos Becker Westphall, Federal University of Santa Catarina, Brazil<br>Wenbin Jiang, Huazhong University of Science and Technology, China<br>Scott Fowler, Linkoping University, Sweden<br>Arcangelo Castiglione, University of Salerno, Italy<br>Peter Mueller, IBM Zurich Research Laboratory, Switzerland<br>Shuhong Chen, Guangzhou University, China<br><br>Publication Chairs<br>Tao Peng, Guangzhou University, China<br>Fang Qi, Central South University, China<br><br>Registration Chairs<br>Xiaofei Xing, Guangzhou University, China<br>Pin Liu, Central South University, China<br><br>Conference Secretariat<br>Wenyin Yang, Foshan University, China<br><br>Web Chairs<br>Jiemin Huang, Foshan University, China<br>Yuming Xia, Foshan University, China<br><br>Steering Committee<br>Guojun Wang, Guangzhou University, China (Chair)<br>Kim-Kwang Raymond Choo, University of Texas at San Antonio, USA (Chair)<br>Saqib Ali, University of Agriculture Faisalabad, Pakistan<br>Valentina E. Balas, Aurel Vlaicu University of Arad, Romania<br>Md Zakirul Alam Bhuiyan, Fordham University, USA<br>Jiannong Cao, The Hong Kong Polytechnic University, Hong Kong<br>Aniello Castiglione, University of Naples Parthenope, Italy<br>Scott Fowler, Linkoping University, Sweden<br>Oana Geman, University of Suceava, Romania<br>Richard Hill, University of Huddersfield, United Kingdom<br>Ryan Ko, University of Queensland, Australia<br>Kuan-Ching Li, Providence University, Taiwan<br>Jianhua Ma, Hosei University, Japan<br>Gregorio Martinez, University of Murcia, Spain<br>Kouichi Sakurai, Kyushu University, Japan<br>Sabu M. Thampi, Indian Institute of Information Technology and Management - Kerala, India<br>Jie Wu, Temple University, USA<br>Yang Xu, Hunan University, China<br>Wenyin Yang, Foshan University, China<br>Haojin Zhu, Shanghai Jiao Tong University, China<br><br>Program Committee<br>Please check the "Program Committee" web page at the conference website for detail:<br>http://ubisecurity.org/2021/<br><br>Contact<br><br>Please email inquiries concerning UbiSec 2021 to Prof. Guojun Wang: csgjwang AT gmail DOT com and Conference Organizers: UbiSec2021@googlegroups.com.<br><br>Prof. Guojun Wang, General Chair of UbiSec 2021<br>http://trust.gzhu.edu.cn/faculty/~csgjwang/<br><br>--<br>***********************************************************************<br>Dr. Guojun Wang, Pearl River Scholarship Distinguished Professor<br>Director of Institute of Computer Networks,<br>School of Computer Science,<br>Guangzhou University, Guangzhou, Guangdong Province,<br>P. R. China, 510006<br>Tel/Fax: +86-20-39366920, Mobile: +86-13360581866<br>Email: csgjwang@gzhu.edu.cn<br>http://ieee-trustcom.org/faculty/~csgjwang/publications.html<br>***********************************************************************<br><br></div><div><br></div></div></div></body></html>