> On Jan 27, 2020, at 8:00 AM, Henry Q <[email protected]> wrote:
> 
> The 6th IEEE International Conference on Big Data Security on Cloud
> (BigDataSecurity 2020)
> May 25-27, Baltimore, USA
> http://www.cloud-conf.net/datasec/2020/
> <http://www.cloud-conf.net/datasec/2020/hpsc/>
> 
> 
> 
> *IMPORTANT DATES*Paper submission: *January 31st (extended), 2020*
> Author notification: March 15th, 2020
> Camera-Ready: April 5th, 2020
> Registration: April 5th, 2020
> Conference date: May 25th-27th, 2020
> 
> 
> *CALL FOR PAPERS*With rapid development of big data storage and computing
> techniques, we have developed novel techniques beyond big data. Many
> aspects for both scientific research and people’s daily life have been
> influenced by big data based technology such as artificial intelligence,
> cloud computing, and Internet of Things. Providing security and privacy for
> big data storage, transmission, and processing have been attracting much
> attention in all big data related areas. IEEE BigDataSecurity 2020
> addresses this domain and aims to gather recent academic achievements in
> this field.
> 
> Security and robustness on Artificial Intelligence is the second
> concentration of IEEE BigDataSecurity 2020. The emerging needs for building
> reliable and robust AI models in Big Data and Cloud environments with
> security and privacy guaranteed have attracted attention from a number of
> different perspectives. The new methods deployed in Big Data and Cloud
> environment have covered distinct dimensions, such as robust deep learning,
> secure deep learning/machine learning, multi-party computing, edge/fog
> computing, energy consumptions, high performance, and heterogeneous
> resources, cloud models, heterogeneous architecture, tele-health, resource
> allocation, load balance, multimedia, and QoS, etc.
> 
>   - Novel big data model
>      - Big data security issues in IoT
>      - Big data privacy issues in IoT
>      - Big data security issues in cloud computing
>      - Big data privacy in cloud computing
>      - Big data storage, integration, service, mining
>      - Blockchain-based security mechanism
>      - Blockchain-based big data sharing
>      - Security and privacy issues in blockchain
>      - Cyber hacking, next generation fire wall
>      - Cyber monitoring, incident response
>      - Database security, data center security
>      - Social engineering, insider threats, advance spear phishing
>      - Cyber threat intelligence
>      - Security and fault tolerance for embedded or ubiquitous systems
>      - Tele-health security in cloud computing
>      - Sensor network security in cloud computing
>      - Security policy and legal considerations
>      - Cloud and networking security
>      - Cloud computing and networking models
>      - Virtualization for big data on cloud
>      - MapReduce with cloud for big data processing
>      - Heterogeneous architecture for cloud computing
>      - Dynamic resource sharing algorithm for cloud computing
>      - Load balance for cloud computing
>      - Mobile cloud computing
>      - Mobile commerce security and privacy
>      - Green cloud computing
>      - Embedded networks and sensor network optimizations
>      - Cyber Security in emergent technologies
> _______________________________________________
> AISWorld mailing list
> [email protected]


_______________________________________________
uai mailing list
[email protected]
https://secure.engr.oregonstate.edu/mailman/listinfo/uai

Reply via email to