<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=gb2312">
<style type="text/css" style="display:none;"> P {margin-top:0;margin-bottom:0;} </style>
</head>
<body dir="ltr">
<div style="font-family: Calibri, Arial, Helvetica, sans-serif; font-size: 12pt; color: rgb(0, 0, 0);">
<p style="font-size:12pt;font-weight:normal;color:rgb(49, 53, 59);font-family:"Times New Roman", serif;background-color:white;margin:0px">
<b><i><span lang="en-US" style="margin:0px">IEEE Network Magazine</span></i></b><span lang="en-US" style="margin:0px"> Special Issue Call for Paper:</span></p>
<p style="font-size:12pt;font-weight:normal;color:rgb(49, 53, 59);font-family:"Times New Roman", serif;background-color:white;margin:0px">
<span lang="en-US" style="margin:0px"> </span></p>
<p align="center" style="font-size:12pt;font-weight:normal;color:rgb(49, 53, 59);font-family:"Times New Roman", serif;text-align:center;background-color:white;margin:0px">
<b><span lang="en-US" style="margin:0px;font-size:14pt">Trust, Security and Privacy of 6G</span></b></p>
<p align="center" style="font-size:12pt;font-weight:normal;color:rgb(49, 53, 59);font-family:"Times New Roman", serif;text-align:center;background-color:white;margin:0px">
<a data-linkindex="0" style="margin:0px"></a><a href="https://www.comsoc.org/publications/magazines/ieee-network/cfp/trust-security-and-privacy-6g" target="_blank" rel="noopener noreferrer" data-auth="NotApplicable" title="https://www.comsoc.org/publications/magazines/ieee-network/cfp/trust-security-and-privacy-6g" data-linkindex="1" style="margin:0px;color:blue"><span style="margin:0px;font-family:-webkit-standard, serif">https://www.comsoc.org/publications/magazines/ieee-network/cfp/trust-security-and-privacy-6g</span></a></p>
<p style="font-size:12pt;font-weight:normal;color:rgb(49, 53, 59);font-family:"Times New Roman", serif;text-align:justify;background-color:white;margin:0px">
<span lang="en-GB" style="margin:0px;color:black"> </span></p>
<p style="font-size:12pt;font-weight:normal;color:rgb(49, 53, 59);font-family:"Times New Roman", serif;text-align:justify;background-color:white;margin:0px">
<span lang="en-US" style="margin:0px">6G follows the footsteps of 5G and pursues the integration of communications and sensing. Through sensing the physical world and human-beings, 6G should be capable of programming to offer automation systems that span a
rich variety of devices, several types of network and communication technologies and humans. 6G should timely offer user expected and satisfied networking services. It will embrace emerging technologies, such as quantum communication, molecular communication,
real-time intelligent edge, Internet of everything, etc. As a consequence, personal and national safety will highly depend on network and information security. But sensing human-beings and physical world brings serious concern on privacy preservation, which
however, conflicts with trust. Another view of 6G is it is a large-scale heterogeneous network (LS-HetNet) by integrating terrestrial networks, space satellite networks, marine networks. Such an integrated network can seamlessly support anywhere and anytime
networking. But high Quality-of-Trust should be offered by LS-HetNet to meet mobile user expectations. By integrating with cloud computing, edge computing, network resources can be economically arranged with high flexibility across multiple domains according
to user demands. But this requests virtual collaboration among multiple network operators in a trustworthy way with privacy preservation at both operator level and user level. Anticipating future development, ITU-T specifies that Trustworthy Networking should
be provided. Trustworthy networking in 6G should ensure security and overcome privacy leakage in an integrated way. In short, 6G is expected to hold such attractive features as <i>trustworthy and autonomous networking based on effective sensing to automatically
satisfy user demands through integration of heterogeneous communication and networking technologies</i>. However, such promising features introduce new challenges on trust, security and privacy, which motivate research and practice.</span></p>
<p style="font-size:12pt;font-weight:normal;color:rgb(49, 53, 59);font-family:"Times New Roman", serif;text-align:justify;background-color:white;margin:0px">
<span lang="en-US" style="margin:0px"> </span></p>
<p style="font-size:12pt;font-weight:normal;color:rgb(49, 53, 59);font-family:"Times New Roman", serif;text-align:justify;background-color:white;margin:0px">
<span style="margin:0px;color:rgb(13, 13, 13)">This </span><span lang="en-US" style="margin:0px;color:rgb(13, 13, 13)">s</span><span style="margin:0px;color:rgb(13, 13, 13)">pecial </span><span lang="en-US" style="margin:0px;color:rgb(13, 13, 13)">i</span><span style="margin:0px;color:rgb(13, 13, 13)">ssue </span><span lang="en-US" style="margin:0px;color:rgb(13, 13, 13)">aims
to</span><span style="margin:0px;color:rgb(13, 13, 13)"> bring together recent advances on </span><span lang="en-US" style="margin:0px;color:rgb(13, 13, 13)">trust, security and privacy</span><span style="margin:0px;color:rgb(13, 13, 13)"> in </span><span lang="en-US" style="margin:0px;color:rgb(13, 13, 13)">the</span><span style="margin:0px;color:rgb(13, 13, 13)"> 6G
networks. It welcomes original and innovative </span><span lang="en-US" style="margin:0px;color:rgb(13, 13, 13)">perspectives</span><span style="margin:0px;color:rgb(13, 13, 13)"> on theories, methodologies, schemes, algorithms, and systems related to </span><span lang="en-US" style="margin:0px;color:rgb(13, 13, 13)">6G
trust, security</span><span lang="en-US" style="margin:0px;color:rgb(13, 13, 13)"> </span><span lang="en-US" style="margin:0px;color:rgb(13, 13, 13)">and privacy</span><span style="margin:0px;color:rgb(13, 13, 13)">, from academia, industry, and government.
We invite survey </span><span lang="en-US" style="margin:0px;color:rgb(13, 13, 13)">and tutorial </span><span style="margin:0px;color:rgb(13, 13, 13)">articles directed to the </span><span lang="en-US" style="margin:0px;color:rgb(13, 13, 13)">s</span><span style="margin:0px;color:rgb(13, 13, 13)">pecial </span><span lang="en-US" style="margin:0px;color:rgb(13, 13, 13)">i</span><span style="margin:0px;color:rgb(13, 13, 13)">ssue.
Potential topics include but are not limited to the following:</span></p>
<p style="font-size:12pt;font-weight:normal;color:rgb(49, 53, 59);font-family:"Times New Roman", serif;background-color:white;margin:0px">
<span style="margin:0px;color:rgb(13, 13, 13)"> </span></p>
<p style="font-size:12pt;font-weight:normal;color:rgb(49, 53, 59);font-family:Calibri, sans-serif;text-indent:-18pt;background-color:white;margin:0px 0px 0px 36pt">
<span style="margin:0px;font-family:Symbol;color:rgb(13, 13, 13)">,<span style="margin:0px;font-size:7pt;font-family:"Times New Roman""> </span></span><span style="margin:0px;font-family:"Times New Roman", serif;color:rgb(13, 13, 13)">Theories, architectures
and applications of 6G trustworthy networking</span></p>
<p style="font-size:12pt;font-weight:normal;color:rgb(49, 53, 59);font-family:Calibri, sans-serif;text-indent:-18pt;background-color:white;margin:0px 0px 0px 36pt">
<span style="margin:0px;font-family:Symbol;color:rgb(13, 13, 13)">,<span style="margin:0px;font-size:7pt;font-family:"Times New Roman""> </span></span><span style="margin:0px;font-family:"Times New Roman", serif;color:rgb(13, 13, 13)">Trustworthy and intelligent
routing</span></p>
<p style="font-size:12pt;font-weight:normal;color:rgb(49, 53, 59);font-family:Calibri, sans-serif;text-indent:-18pt;background-color:white;margin:0px 0px 0px 36pt">
<span style="margin:0px;font-family:Symbol;color:rgb(13, 13, 13)">,<span style="margin:0px;font-size:7pt;font-family:"Times New Roman""> </span></span><span style="margin:0px;font-family:"Times New Roman", serif;color:rgb(13, 13, 13)">Trust modeling, trust
policies and trust mechanisms</span></p>
<p style="font-size:12pt;font-weight:normal;color:rgb(49, 53, 59);font-family:Calibri, sans-serif;text-indent:-18pt;background-color:white;margin:0px 0px 0px 36pt">
<span style="margin:0px;font-family:Symbol;color:rgb(13, 13, 13)">,<span style="margin:0px;font-size:7pt;font-family:"Times New Roman""> </span></span><span style="margin:0px;font-family:"Times New Roman", serif;color:rgb(13, 13, 13)">Network trust evaluation
and measurement</span></p>
<p style="font-size:12pt;font-weight:normal;color:rgb(49, 53, 59);font-family:Calibri, sans-serif;text-indent:-18pt;background-color:white;margin:0px 0px 0px 36pt">
<span style="margin:0px;font-family:Symbol;color:rgb(13, 13, 13)">,<span style="margin:0px;font-size:7pt;font-family:"Times New Roman""> </span></span><span style="margin:0px;font-family:"Times New Roman", serif;color:rgb(13, 13, 13)">6G network security
architecture</span></p>
<p style="font-size:12pt;font-weight:normal;color:rgb(49, 53, 59);font-family:Calibri, sans-serif;text-indent:-18pt;background-color:white;margin:0px 0px 0px 36pt">
<span style="margin:0px;font-family:Symbol;color:rgb(13, 13, 13)">,<span style="margin:0px;font-size:7pt;font-family:"Times New Roman""> </span></span><span style="margin:0px;font-family:"Times New Roman", serif;color:rgb(13, 13, 13)">Machine learning
for network trust, security and privacy</span></p>
<p style="font-size:12pt;font-weight:normal;color:rgb(49, 53, 59);font-family:Calibri, sans-serif;text-indent:-18pt;background-color:white;margin:0px 0px 0px 36pt">
<span style="margin:0px;font-family:Symbol;color:rgb(13, 13, 13)">,<span style="margin:0px;font-size:7pt;font-family:"Times New Roman""> </span></span><span style="margin:0px;font-family:"Times New Roman", serif;color:rgb(13, 13, 13)">Blockchain and 6G
trustworthy networking</span></p>
<p style="font-size:12pt;font-weight:normal;color:rgb(49, 53, 59);font-family:Calibri, sans-serif;text-indent:-18pt;background-color:white;margin:0px 0px 0px 36pt">
<span style="margin:0px;font-family:Symbol;color:rgb(13, 13, 13)">,<span style="margin:0px;font-size:7pt;font-family:"Times New Roman""> </span></span><span style="margin:0px;font-family:"Times New Roman", serif;color:rgb(13, 13, 13)">End-to-end communication
security, privacy and trust</span></p>
<p style="font-size:12pt;font-weight:normal;color:rgb(49, 53, 59);font-family:Calibri, sans-serif;text-indent:-18pt;background-color:white;margin:0px 0px 0px 36pt">
<span style="margin:0px;font-family:Symbol;color:rgb(13, 13, 13)">,<span style="margin:0px;font-size:7pt;font-family:"Times New Roman""> </span></span><span style="margin:0px;font-family:"Times New Roman", serif;color:rgb(13, 13, 13)">Cryptography and
trustworthy networking</span></p>
<p style="font-size:12pt;font-weight:normal;color:rgb(49, 53, 59);font-family:Calibri, sans-serif;text-indent:-18pt;background-color:white;margin:0px 0px 0px 36pt">
<span style="margin:0px;font-family:Symbol;color:rgb(13, 13, 13)">,<span style="margin:0px;font-size:7pt;font-family:"Times New Roman""> </span></span><span style="margin:0px;font-family:"Times New Roman", serif;color:rgb(13, 13, 13)">Smart handover with
security and privacy</span></p>
<p style="font-size:12pt;font-weight:normal;color:rgb(49, 53, 59);font-family:Calibri, sans-serif;text-indent:-18pt;background-color:white;margin:0px 0px 0px 36pt">
<span style="margin:0px;font-family:Symbol;color:rgb(13, 13, 13)">,<span style="margin:0px;font-size:7pt;font-family:"Times New Roman""> </span></span><span style="margin:0px;font-family:"Times New Roman", serif;color:rgb(13, 13, 13)">Network resource
arrangement for trustworthy networking</span></p>
<p style="font-size:12pt;font-weight:normal;color:rgb(49, 53, 59);font-family:Calibri, sans-serif;text-indent:-18pt;background-color:white;margin:0px 0px 0px 36pt">
<span style="margin:0px;font-family:Symbol;color:rgb(13, 13, 13)">,<span style="margin:0px;font-size:7pt;font-family:"Times New Roman""> </span></span><span style="margin:0px;font-family:"Times New Roman", serif;color:rgb(13, 13, 13)">Intrusion detection
in integrated HetNets</span></p>
<p style="font-size:12pt;font-weight:normal;color:rgb(49, 53, 59);font-family:Calibri, sans-serif;text-indent:-18pt;background-color:white;margin:0px 0px 0px 36pt">
<span style="margin:0px;font-family:Symbol;color:rgb(13, 13, 13)">,<span style="margin:0px;font-size:7pt;font-family:"Times New Roman""> </span></span><span style="margin:0px;font-family:"Times New Roman", serif;color:rgb(13, 13, 13)">Security and privacy
protection in 6G</span></p>
<p style="font-size:12pt;font-weight:normal;color:rgb(49, 53, 59);font-family:Calibri, sans-serif;text-indent:-18pt;background-color:white;margin:0px 0px 0px 36pt">
<span style="margin:0px;font-family:Symbol;color:rgb(13, 13, 13)">,<span style="margin:0px;font-size:7pt;font-family:"Times New Roman""> </span></span><span style="margin:0px;font-family:"Times New Roman", serif;color:rgb(13, 13, 13)">Trust management
of 6G</span></p>
<p style="font-size:12pt;font-weight:normal;color:rgb(49, 53, 59);font-family:Calibri, sans-serif;text-indent:-18pt;background-color:white;margin:0px 0px 0px 36pt">
<span style="margin:0px;font-family:Symbol;color:rgb(13, 13, 13)">,<span style="margin:0px;font-size:7pt;font-family:"Times New Roman""> </span></span><span style="margin:0px;font-family:"Times New Roman", serif;color:rgb(13, 13, 13)">Network data collection,
classification and trust analytics</span></p>
<p style="font-size:12pt;font-weight:normal;color:rgb(49, 53, 59);font-family:Calibri, sans-serif;text-indent:-18pt;background-color:white;margin:0px 0px 0px 36pt">
<span style="margin:0px;font-family:Symbol;color:rgb(13, 13, 13)">,<span style="margin:0px;font-size:7pt;font-family:"Times New Roman""> </span></span><span style="margin:0px;font-family:"Times New Roman", serif;color:rgb(13, 13, 13)">Incentive mechanisms
of trust management</span></p>
<p style="font-size:12pt;font-weight:normal;color:rgb(49, 53, 59);font-family:Calibri, sans-serif;text-indent:-18pt;background-color:white;margin:0px 0px 0px 36pt">
<span style="margin:0px;font-family:Symbol;color:rgb(13, 13, 13)">,<span style="margin:0px;font-size:7pt;font-family:"Times New Roman""> </span></span><span style="margin:0px;font-family:"Times New Roman", serif;color:rgb(13, 13, 13)">Physical security
and trust of 6G</span></p>
<p style="font-size:12pt;font-weight:normal;color:rgb(49, 53, 59);font-family:Calibri, sans-serif;text-indent:-18pt;background-color:white;margin:0px 0px 0px 36pt">
<span style="margin:0px;font-family:Symbol;color:rgb(13, 13, 13)">,<span style="margin:0px;font-size:7pt;font-family:"Times New Roman""> </span></span><span style="margin:0px;font-family:"Times New Roman", serif;color:rgb(13, 13, 13)">6G positioning and
its trust, security and privacy</span></p>
<p style="font-size:12pt;font-weight:normal;color:rgb(49, 53, 59);font-family:Calibri, sans-serif;text-indent:-18pt;background-color:white;margin:0px 0px 0px 36pt">
<span style="margin:0px;font-family:Symbol;color:rgb(13, 13, 13)">,<span style="margin:0px;font-size:7pt;font-family:"Times New Roman""> </span></span><span style="margin:0px;font-family:"Times New Roman", serif;color:rgb(13, 13, 13)">6G service trust,
security and privacy</span></p>
<p style="font-size:12pt;font-weight:normal;color:rgb(49, 53, 59);font-family:Calibri, sans-serif;text-indent:-18pt;background-color:white;margin:0px 0px 0px 36pt">
<span style="margin:0px;font-family:Symbol;color:rgb(13, 13, 13)">,<span style="margin:0px;font-size:7pt;font-family:"Times New Roman""> </span></span><span style="margin:0px;font-family:"Times New Roman", serif;color:rgb(13, 13, 13)">Post-quantum cryptography
for 6G </span></p>
<p style="font-size:12pt;font-weight:normal;color:rgb(49, 53, 59);font-family:Calibri, sans-serif;text-indent:-18pt;background-color:white;margin:0px 0px 0px 36pt">
<span style="margin:0px;font-family:Symbol;color:rgb(13, 13, 13)">,<span style="margin:0px;font-size:7pt;font-family:"Times New Roman""> </span></span><span style="margin:0px;font-family:"Times New Roman", serif;color:rgb(13, 13, 13)">Embedded trust and
distributed trust </span></p>
<p style="font-size:12pt;font-weight:normal;color:rgb(49, 53, 59);font-family:Calibri, sans-serif;text-indent:-18pt;background-color:white;margin:0px 0px 0px 36pt">
<span style="margin:0px;font-family:Symbol;color:rgb(13, 13, 13)">,<span style="margin:0px;font-size:7pt;font-family:"Times New Roman""> </span></span><span style="margin:0px;font-family:"Times New Roman", serif;color:rgb(13, 13, 13)">Distributed ledger
technologies and differential privacy approaches </span></p>
<p style="font-size:12pt;font-weight:normal;color:rgb(49, 53, 59);font-family:Calibri, sans-serif;text-indent:-18pt;background-color:white;margin:0px 0px 0px 36pt">
<span style="margin:0px;font-family:Symbol;color:rgb(13, 13, 13)">,<span style="margin:0px;font-size:7pt;font-family:"Times New Roman""> </span></span><span style="margin:0px;font-family:"Times New Roman", serif;color:rgb(13, 13, 13)">Regulation and standardization
about 6G security, privacy and trust </span></p>
<p style="font-size:12pt;font-weight:normal;color:rgb(49, 53, 59);font-family:Calibri, sans-serif;text-indent:-18pt;background-color:white;margin:0px 0px 0px 36pt">
<span style="margin:0px;font-family:Symbol;color:rgb(13, 13, 13)">,<span style="margin:0px;font-size:7pt;font-family:"Times New Roman""> </span></span><span style="margin:0px;font-family:"Times New Roman", serif;color:rgb(13, 13, 13)">Credibility authentication
in 6G</span></p>
<p style="font-size:12pt;font-weight:normal;color:rgb(49, 53, 59);font-family:Calibri, sans-serif;text-indent:-18pt;background-color:white;margin:0px 0px 0px 36pt">
<span style="margin:0px;font-family:Symbol;color:rgb(13, 13, 13)">,<span style="margin:0px;font-size:7pt;font-family:"Times New Roman""> </span></span><span style="margin:0px;font-family:"Times New Roman", serif;color:rgb(13, 13, 13)">Edge intelligence/IoT
security</span></p>
<p style="font-size:12pt;font-weight:normal;color:rgb(49, 53, 59);font-family:Calibri, sans-serif;text-indent:-18pt;background-color:white;margin:0px 0px 0px 36pt">
<span style="margin:0px;font-family:Symbol;color:rgb(13, 13, 13)">,<span style="margin:0px;font-size:7pt;font-family:"Times New Roman""> </span></span><span style="margin:0px;font-family:"Times New Roman", serif;color:rgb(13, 13, 13)">Trust, security and
privacy of promising communication technologies in 6G </span></p>
<p style="font-size:12pt;font-weight:normal;color:rgb(49, 53, 59);font-family:Calibri, sans-serif;text-indent:-18pt;background-color:white;margin:0px 0px 0px 36pt">
<span style="margin:0px;font-family:Symbol;color:rgb(13, 13, 13)">,<span style="margin:0px;font-size:7pt;font-family:"Times New Roman""> </span></span><span style="margin:0px;font-family:"Times New Roman", serif;color:rgb(13, 13, 13)">Sensing with privacy
preservation</span></p>
<p style="font-size:12pt;font-weight:normal;color:rgb(49, 53, 59);font-family:Calibri, sans-serif;text-indent:-18pt;background-color:white;margin:0px 0px 0px 36pt">
<span style="margin:0px;font-family:Symbol;color:rgb(13, 13, 13)">,<span style="margin:0px;font-size:7pt;font-family:"Times New Roman""> </span></span><span style="margin:0px;font-family:"Times New Roman", serif;color:rgb(13, 13, 13)">Analysis and design
of 6G protocol security</span></p>
<p style="font-size:12pt;font-weight:normal;color:rgb(49, 53, 59);font-family:Calibri, sans-serif;text-indent:-18pt;background-color:white;margin:0px 0px 0px 36pt">
<span style="margin:0px;font-family:Symbol;color:rgb(13, 13, 13)">,<span style="margin:0px;font-size:7pt;font-family:"Times New Roman""> </span></span><span style="margin:0px;font-family:"Times New Roman", serif;color:rgb(13, 13, 13)">Domain specific security,
privacy and trust in 6G</span></p>
<p style="font-size:12pt;font-weight:normal;color:rgb(49, 53, 59);font-family:Calibri, sans-serif;text-indent:-18pt;background-color:white;margin:0px 0px 0px 36pt">
<span style="margin:0px;font-family:Symbol;color:rgb(13, 13, 13)">,<span style="margin:0px;font-size:7pt;font-family:"Times New Roman""> </span></span><span lang="en-US" style="margin:0px;font-family:"Times New Roman", serif;color:rgb(13, 13, 13)">T</span><span style="margin:0px;font-family:"Times New Roman", serif;color:rgb(13, 13, 13)">rust,
security and privacy of digital twin in 6G</span></p>
<p style="font-size:12pt;font-weight:normal;color:rgb(49, 53, 59);font-family:"Times New Roman", serif;background-color:white;margin:0px">
<span lang="en-US" style="margin:0px"> </span></p>
<p style="font-size:12pt;font-weight:normal;color:rgb(49, 53, 59);font-family:"Times New Roman", serif;background-color:white;margin:0px">
<b><span lang="en-GB" style="margin:0px">Important Dates: </span></b></p>
<p style="font-size:12pt;font-weight:normal;color:rgb(49, 53, 59);font-family:"Times New Roman", serif;background-color:white;margin:0px">
<span lang="en-GB" style="margin:0px">Manuscript Submission Deadline: 15 December 2021</span></p>
<p style="font-size:12pt;font-weight:normal;color:rgb(49, 53, 59);font-family:"Times New Roman", serif;background-color:white;margin:0px">
<span lang="en-GB" style="margin:0px">Initial Decision Notification: 1 February 2022</span></p>
<p style="font-size:12pt;font-weight:normal;color:rgb(49, 53, 59);font-family:"Times New Roman", serif;background-color:white;margin:0px">
<span lang="en-GB" style="margin:0px">Revised Manuscript Due: 1 March 2022</span></p>
<p style="font-size:12pt;font-weight:normal;color:rgb(49, 53, 59);font-family:"Times New Roman", serif;background-color:white;margin:0px">
<span lang="en-GB" style="margin:0px">Final Decision Notification: 1 April 2022</span></p>
<p style="font-size:12pt;font-weight:normal;color:rgb(49, 53, 59);font-family:"Times New Roman", serif;background-color:white;margin:0px">
<span lang="en-GB" style="margin:0px">Final Manuscript Due: 15 April 2022</span></p>
<p style="font-size:12pt;font-weight:normal;color:rgb(49, 53, 59);font-family:"Times New Roman", serif;background-color:white;margin:0px">
<span lang="en-GB" style="margin:0px">Publication Date: July 2022</span></p>
<p style="font-size:12pt;font-weight:normal;color:rgb(49, 53, 59);font-family:"Times New Roman", serif;background-color:white;margin:0px">
<span lang="en-GB" style="margin:0px"> </span></p>
<p style="font-size:12pt;font-weight:normal;color:rgb(49, 53, 59);font-family:"Times New Roman", serif;background-color:white;margin:0px">
<b><span lang="en-GB" style="margin:0px">Guest Editors</span></b></p>
<p style="font-size:12pt;font-weight:normal;color:rgb(49, 53, 59);font-family:"Times New Roman", serif;background-color:white;margin:0px">
<span style="margin:0px;color:black;text-align:justify;text-indent:-17.85pt">Zheng Yan, Xidian University, China, Aalto University, Finland (</span><a href="mailto:zyan@xidian.edu.cn" target="_blank" rel="noopener noreferrer" data-auth="NotApplicable" data-linkindex="2" style="margin:0px;color:blue;text-align:justify;text-indent:-17.85pt"><span style="margin:0px;color:black">zyan@xidian.edu.cn</span></a><span style="margin:0px;color:black;text-align:justify;text-indent:-17.85pt">; </span><a href="mailto:zheng.yan@aalto.fi" target="_blank" rel="noopener noreferrer" data-auth="NotApplicable" data-linkindex="3" style="margin:0px;color:blue;text-align:justify;text-indent:-17.85pt"><span style="margin:0px;color:black">zheng.yan@aalto.fi</span></a><span style="margin:0px;color:black;text-align:justify;text-indent:-17.85pt">)</span></p>
<p style="font-size:12pt;font-weight:normal;color:rgb(49, 53, 59);font-family:"Times New Roman", serif;background-color:white;margin:0px">
<span lang="en-GB" style="margin:0px;color:black;text-align:justify;text-indent:-18pt">Laurence T. Yang, St Francis Xavier University, Canada (</span><a href="mailto:ltyang@gmail.com" target="_blank" rel="noopener noreferrer" data-auth="NotApplicable" data-linkindex="4" style="margin:0px;font-family:Calibri, sans-serif;color:blue;text-align:justify;text-indent:-18pt"><span lang="en-GB" style="margin:0px;font-family:"Times New Roman", serif;color:black">ltyang@gmail.com</span></a><span lang="en-GB" style="margin:0px;color:black;text-align:justify;text-indent:-18pt">)</span></p>
<p style="font-size:12pt;font-weight:normal;color:rgb(49, 53, 59);font-family:"Times New Roman", serif;background-color:white;margin:0px">
<span style="margin:0px;color:black;text-align:justify;text-indent:-18pt">Tieyan Li, Huawei, Singapore (Li.Tieyan@huawei.com)</span></p>
<p style="font-size:12pt;font-weight:normal;color:rgb(49, 53, 59);font-family:"Times New Roman", serif;background-color:white;margin:0px">
<span style="margin:0px;color:black;text-align:justify;text-indent:-18pt">Yoan Miche, Nokia, Finland (yoan.miche@nokia-bell-labs.com)</span></p>
<p style="font-size:12pt;font-weight:normal;color:rgb(49, 53, 59);font-family:"Times New Roman", serif;background-color:white;margin:0px">
<span style="margin:0px;color:black;text-align:justify;text-indent:-18pt">Shui Yu, University of Technology Sydney, Australia (Shui.Yu@uts.edu.au)</span></p>
<p style="font-size:12pt;font-weight:normal;color:rgb(49, 53, 59);font-family:"Times New Roman", serif;background-color:white;margin:0px">
<span style="margin:0px;color:black;text-align:justify;text-indent:-18pt">Stephen Yau, Arizona State University, USA (yau@asu.edu)</span></p>
<br>
</div>
</body>
</html>