Call for papers

 
The conference focuses on all aspects of cloud computing and security. The topics of interests include, but not limited to:
1. Cloud Computing
Cloud Computing Architecture and Systems 
Cloud Computing Models, Simulations, Designs, and Paradigms 
Cloud Management and Operations 
Dynamic Resource Provision and Consuming 
Cloud Computing Technologies, Services and Applications 
2. Cloud Security
Security Evaluation and Benchmarks Based on Cloud 
Security Policy, Security Theory and Models Based on Big Data 
Authentication, Authorization and Reliability Issues in Cloud 
Security and Privacy in Cloud Computing 
Information Security and Risks Management 
Machine Learning for Security 
3. Information Hiding
Coverless Information Hiding 
Steganography and Steganalysis 
Digital Watermarking, Fingerprinting and Forensics 
Multimedia Authentication and Encryption 
Covert/Subliminal Channels 
4. IoT Security
Data Security and Privacy in the IoT 
Attacks and Countermeasures on IoT Systems 
Trust Model, Data Aggregation and Information Sharing 
Secure Hardware and Software for IoT 
Application Security for IoT 
5. Multimedia Forensics
Active and Passive Forensics 
Big Data Forensics 
Portable electronic device forensics 
Network Forensics 
Anti-forensics 
6. Encryption
Measurements for Cybersecurity 
Post Quantum Cybersecurity 
Visualization for Security 
Applied Cryptography 
Language-based Security 

Publication

Outstanding papers will be invited for possible publication in the following SCI-indexed journals:
Ad hoc networks 
Computers, Materials & Continua 
Computer Modeling in Engineering & Sciences 
EURASIP Journal on Wireless Communications and Networking 
IEEE Access 
IETE Technical Review 
International Journal of Sensor Networks 
Journal of Internet Technology 
Journal of network and computer applications 
Multimedia Tools and Applications 
Neurocomputing 
Neural Computing and Applications 
Sensors 
Soft Computing 
Wireless Communications and Mobile Computing 
World Wide Web 
All the accepted papers will be published as a post-proceedings in Springer-Verlag's Lecture Notes in Computer Science (LNCS) series and indexed by EI.
 

SCI Indexed Journals

 
5. IEEE Access 
ISSN: 2169-3536 
6. IETE Technical Review
ISSN: 0256-4602 
 
11. Neurocomputing 
ISSN: 0925-2312 
 
13. Sensors 
ISSN: 1424-8220 
14. Soft Computing 
ISSN: 1432-7643 
16. World Wide Web 
ISSN: 1386-145X 
 

 

CALL FOR WORKSHOP/SESSION PROPOSALS

 

The fourth International Conference on Cloud Computing and Security (ICCCS 2018), will be held in June 8-10, 2018 at Haikou, China. The conference serves as a highly selective and premier international forum on computer science research. In addition to the main sessions, the conference will include workshops, panels, demonstrations, and exhibits. The organizing committee is excited to invite you to take part in the ICCCS 2018, to discuss the frontier issues in today's society as well as the interdisciplinary development trends together.

We invite proposals for workshops that will provide forums for researchers, engineers and scientists from all communities (academia, industry, standards organizations) to present their latest research findings, novel ideas, and valuable comments in specific areas of interests.

Topics

Workshop topics are encouraged, but not limited, to cover some emerging focused areas related to the overall conference scope: cloud computing, IoT, big data, information hiding, watermarking, digital forensics, cryptography, ciphertext retrieval, computational materials, and so on.

Benefits of Accepted Workshop Proposal

 
Provide same benefits with the main conference;
Recommend 5 accepted papers with extension for each workshop to SCI indexed journals (The workshop should accept at least 20 papers; only one quota for each institutions, and at least one paper with its first author comes from oversea). The other accepted papers will be published on LNCS, or EI indexed journals.

Submission Guidelines

All submissions should be submitted in English containing the following sections:

 
Title;
Abstract: 200 word summary of the workshop purpose;
Topics: What topics of interest will be covered by the workshop;
Chair(s): Name, affiliation, email address, homepage and short (one paragraph) biography of each chair (at least one member of chairs comes from oversea);
Program Committee: Names and affiliations of potential PC members.

Review Criteria

The decision on acceptance or rejection of a workshop proposals will be made on the basis of the overall quality of the proposal and its appeal to a reasonable fraction of the cloud computing community. Other factors, such as overlap with other workshop proposals, or the number of attendances, will also be taken into account when making the final decision.

The workshop organizer(s) will be responsible for inviting speakers, promoting the workshops in communities, and moderating the workshop.

Important Dates

Paper submission deadline

March 25, 2018

Author notification

April 20, 2018

Final manuscript and Registration due

April 30, 2018

Conference date

June 8-10, 2018

  

Contact Information

Dr. Baowei Wang, ICCCS 2018 Workshop Chair. Email: wang@nuist.edu.cn

 

 

ICCCS2018 Workshops/Sessions

Cloud Computing and Security

1.Title:Secure Cloud Computing: Technologies and Applications(See details)
Chairs: Yong Ding, Guilin University of Electronic Technology, China
Chairs: Zhangjie Fu, Nanjing University of Information Science and Technology, China
              Sheng Wen, Swinburne University of Technology, Australia

2.Title:Multimedia Security and Forensics in Cloud Computing(See details)
Chairs:Yun Q. Shi, New Jersey Institute of Technology, USA
Chairs:Jiaohua Qin, Central South University of Forestry & Technology, China
              Jiliang Zhang, Hunan University, China
              Zhihua Xia, Nanjing University of Information Science and Technology, China

3.Title:Cloud Data Security Auditing(See details)
Chairs:Yongfeng Huang, Tsinghua University, China
              Shanyu Tang, University of West London, UK
              Chin-chen Chang, Feng Chia University, Taiwan

4.Title: Cryptography and Cloud Security(See details)
Chairs:Qiong Huang, South China Agricultural University, China
              Guomin Yang, University of Wollongong, Australia

5.Title:Cloud-based Big Data Analytics and Applications(See details)
Chairs:Haihang You, Chinese Academy of Sciences, China
              Xiaodong Liu, Edinburgh Napier University, UK

6.Title:Applications of Blockchain and Cloud Manufacturing Security(See details)
Chairs:Mingzhe Liu, Chengdu University of Technology, China
              Wei Qi Yan, Auckland University of Technology, New Zealand
              Yining Liu, Guilin University of Electronic Technology, China
              Ruili Wang, Massey University, New Zealand

7.Title:Abnormal Traffic Analysis in Cloud Computing(See details)
Chairs:Guangjie Liu, Nanjing University of Science and Technology, China
              Victor Govindaswamy, Concordia University, USA
              Jinwei Wang, Nanjing University of Information Science & Technology, China
              Krzysztof Szczypiorski, Warsaw University of Technology, Poland

8.Title:Holistic Technologies for Managing Internet-of-Things and Cloud Services(See details)
Chairs:Kun-Ming Yu, Chung Hua University, Taiwan
              Robert Hsu, Chung Hua University, Taiwan

IoT and Security

9.Title:Internet of Things, Crowdsourcing and Mobile Computing(See details)
Chairs:Guiling Wang, New Jersey Institute of Technology, USA
Chairs: Baowei Wang, Nanjing University of Information Science and Technology, China
              Li Lu, University of Electronic Science and Technology of China, China
              Hanhua Chen, Huazhong University of Science and Technology, China

10.Title: IoT Research through the Lens of Security and Privacy(See details)
Chairs:Chen Qian, University of California Santa Cruz, USA
Chairs: Wenyuan Xu, Zhejiang University, China
              Jinsong Han, Xi’an Jiaotong University, China

11.Title:Green and Low Power Consumption Internet of Things(See details)
Chairs:Zheng-guo Sheng, University of Sussex, UK
              Hai-jun Zhang, University of Science & Technology Beijing, China
              Jian Su, Nanjing University of Information Science and Technology, China

12.Title:Mobile Computing and Vehicle Communications(See details)
Chairs:Guangchi Liu, Stratifyd Inc., USA
              Qing Yang, University of North Texas, USA
              Chengshan Qian, Nanjing University of Information Science & Technology, China

13.Title:IoT and Future Communication Technologies(See details)
Chairs:Ning Cao, Qingdao Binhai University, China
              Guofu Li, University of Shanghai for Science and Technology, China
              Russell Higgs, University College Dublin, Ireland

14.Title:Bringing Intelligence into Internet of Things(See details)
Chairs:Bing Chen, Nanjing University of Aeronautics and Astronautics, China
              Kun Zhu, Nanjing University of Aeronautics and Astronautics, China
              Xiangping Zhai, Nanjing University of Aeronautics and Astronautics, China
              Dinh Thai Hoang, University Technology Sydney, Australia

Big data and Security

15.Title:Visual Privacy and Forensics in Big Data(See details)
Chairs:Wei Lu, Sun Yat-sen University, China
              Jiangqun Ni, Sun Yat-sen University, China
              Rangding Wang, Ningbo University, China
              Rongrong Ni, Beijing Jiao Tong University, China
              Yongjian Hu, South China University of Technology, China
              Bin Li, Shenzhen University, China
              James C.N. Yang, National Dong Hwa University, Taiwan

16.Title:Big Data Managing, Processing and Analysis(See details)
Chairs:Xiaoping Fan, Hunan University of Finance and Economics, China
              Yang Xiao, University of Alabama, USA
              Guang Sun, Hunan University of Finance and Economics, China

17.Title:Big Data and Data Analysis(See details)
Chairs:Pingzeng Liu, Shandong Agricultural University, China
              Lijuan Zheng, Shijiazhuang Tiedao University, China
              Cezhong Tong, Washington University in St. Louis, USA

18.Title:High Performance Big Data Management, Analysis, and Mining(See details)
Chairs:Guohua Liu, Donghua University, China
              Feifei Li, Utah State University, USA

19.Title:Big Data security and Applications(See details)
Chairs:Xinwen Fu, University of Central Florida, USA
              Kim-Kwang Raymond Choo, University of Texas at San Antonio, USA
              Zhangjie Fu, Nanjing University of Information Science and Technology, China
              Xiaokang Wang, St. Francis Xavier University, Canada

20.Title:Cyber Security with Big Data(See details)
Chairs:Jieren Cheng, Hainan University, China
              Qiang Liu, National University of Defense Technology, China
              Alex X.Liu, Michigan State University

Multimedia and Security

21.Title:Multimedia Content Security and Privacy Protection(See details)
Chairs:Zhenxing Qian, Fudan University, China
              Chuan Qin, University of Shanghai for Science and Technology, China
              Jinwei Wang, Nanjing University of Information Science and Technology, China
              Frank Shih, New Jersey Institute of Technology, USA

22.Title:Content Protection, Analysis, and Forensics for Big Text Data(See details)
Chairs:Yuling Liu, Hunan University, China
              Jie Wang, University of Massachusetts Lowell, USA
              Lingyun Xiang, Changsha University of Science and Technology, China

23.Title:Security and Privacy in Multimedia(See details)
Chairs:Shijun Xiang, Jinan University, China
              Ruili Wang, Massey University, New Zealand
              Weiming Zhang, University of Science and Technology of China, China
              Xiaolong Li , Beijing Jiaotong University, China

24.Title:Forensics of Multimedia Covert Communication(See details)
Chairs:Xiangyang Luo, Zhengzhou Science and Technology Institute, China
              Yun Q. Shi, New Jersey Institute of Technology, USA
              Jinwei Wang, Nanjing University of Information Science and Technology, China

25.Title:Social Media Security and Privacy(See details)
Chairs:Fei Peng, Hunan University, China
              Robert H. Deng, Singapore Management University, Singapore
              Zhi-yong Zhang, Henan University of Science and Technology, China

26.Title:Object analysis and Recognition(See details)
Chairs:Shaodi You, Australian National University, Australia
              Yuchao Dai, Northwestern Polytechnical University, China
              Guoqing Zhang, Nanjing University of Information Science and Technology, China

Artificial Intelligence and Machine Learning

27.Title:Artificial Intelligence and Its Applications(See details)
Chairs:Yanchun Zhang, Victoria University, Australia
              Farookh Hussain, University of Technology Sydney, Australia
              Qing Tian, Nanjing University of Information Science and Technology, China

28.Title:Applications of Machine Learning in Cyber Security(See details)
Chairs:Zhiping Cai, National University of Defense Technology
              Daniel Xiapu Luo, The Hong Kong Polytechnic University

29.Title:Intelligent Multimedia Computing(See details)
Chairs:Xin Xu, Wuhan University of Science and Technology, China
              Jing Tian, National University of Singapore, Singapore

30.Title:Weak Label Learning and Applications(See details)
Chairs:Victor S. Sheng, University of Central Arkansas, USA
              Bin Gu, Nanjing University of Information Science and Technology, China
              Leiming Yan, Nanjing University of Information Science and Technology, China
              Jing Zhang, Nanjing University of Science and Technology, China

31.Title:Machine Learning and Quantum Computation(See details)
Chairs:Wenjie Liu, Nanjing University of Information Science and Technology, China
              Gonglin Yuan, Guangxi University, China
              Lianhua Chi, IBM Research Center, Australia

32.Title:Analysis of Data in Social Network(See details)
Chairs:Jiande Sun, Shandong Normal University, China
              Chengcheng Li, University of Cincinnati, USA
              Chunfang Yang, Zhengzhou Science and Technology Institute, China

33.Title:Advanced Data Analytics and Applications(See details)
Chairs:Sunil Kr. Jha, Nanjing University of Information Science and Technology, China
              Rafal Niemiec, University of Information Technology and Management, Poland
              Srikant Ojha, Sharda University, India

Computational Materials

34.Title:Advanced Functional Materials and Multi-scale Intelligent Computation(See details)
Chairs: Jing Li, Rutgers University, USA
              Manrong Li, Sun Yat-sen University, China

35.Title:Computational Physical and Chemical Properties of Materials(See details)
Chairs:Zemin Ning, Wellcome Trust Sanger Institute, UK
              Yuzhu Liu, Nanjing University of Information Science and Technology, China
              Yuanyuan Zhao, Nanjing University of Information Science and Technology, China

36.Title:Computational Materials and Modeling(See details)
Chairs:Shiwei Lin, Professor in Hainan University, China
              Cai-Zhuang Wang, Scientist at Ames Laboratory, USA

Other Hot Topics

37.Title:Mobile Edge Computing and Future Networking(See details)
Chairs:Deze Zeng, China University of Geosciences, China
              Zhangjie Fu, Nanjing University of Information Science and Technology, China
              Peng Li, University of Aizu, Japan

38.Title:Cyber Security Technologies and Privacy(See details)
Chairs:Ning Cao, Qingdao Binhai University, China
              Yongbin Zhao, Shijiazhuang Tiedao University, China
              Fan Yang, University of Maryland, USA

39.Title:Quantum Information and Information Security(See details)
Chairs:Xiaojun Wang, Dublin City University, Ireland
              Xiubo Chen, Beijing University of Posts and Telecommunications, China
              Min Lei, Beijing University of Posts and Telecommunications, China
              Zhiguo Qu, Nanjing University of Information Science and Technology, China

40.Title:Advances in Software-Defined Networking and Security(See details)
Chairs:Jiangyuan Yao, Hainan University, China
              Zhiliang Wang, Tsinghua University, China
              Arun Kumar Sangaiah, VIT University, India

41.Title:Software Reliability and Security using Big Data Technologies(See details)
Chairs:Lei Chen, Georgia Southern University, USA
              Jianguo Sun, Harbin Engineering University, China
              Tao Zhang, Harbin Engineering University, China
              Yun Lin, Harbin Engineering University, China

 

 

Sponsors

 

 
Association for Computing Machinery 

 
Institute of Electrical and Electronics Engineers 

 
Nanjing University of Information Science & Technology 

 
Michigan State University 

 
Taiwan Cheng Kung University 

 
Taiwan Dong Hwa University 

 
Providence University 

 
Nanjing University of Aeronautics and Astronautics 

 
State Key Laboratory of Integrated Services Networks 

 
Tech Science Press 

 
National Nature Science Foundation of China 


Co-sponsors

 


Hainan University

 
Chinese Institute of Electronics


Jiangsu Computer Society

 
National 111 Project For Mobile Internet Security



Supporter

 
 
 
 

Paper Submission Guidelines 

1. All manuscripts should be submitted in PDF file format by this system.

2. All submissions must be in English. Each paper is limited to 12 pages (or 14 pages with over length charge) but not less than 10 pages including figures and references. Authors can refer to the standard LNCS(Lecture Notes in Computer Science) format to prepare their papers. 

3. The submitted papers must not be previously published anywhere, and must not be submitted to any other conferences before and during the ICCCS2017 review process. Submitting a paper to the conference means that if the paper were accepted, at least one author will register and attend the conference to present the paper. 

4. For any difficulties and other issues regarding submission, please contact: ICCCSconf@yeah.net .

Acceptance

Manuscripts should present the current research in the areas identified in the call for papers. All submitted manuscripts will be reviewed by experts in the fields and will be judged from the aspects of problem significance, contributions, originality, correctness, technical strength, quality of presentation, and relevance to the conference attendees.

 

Conference History

 


ICCCS2017: http://www.icccsconf.org/icccs2017/index.html
June 16-18,2017,Nanjing,China 

ICCCS2016: http://www.icccsconf.org/icccs2016/index.html
July 29-31,2016,Nanjing,China

ICCCS2015: http://www.icccsconf.org/icccs2015/index.html
August 13-15,2015,Nanjing,China