Technical Tracks

Track 8: Security, Privacy, and Trust
Track Co-Chairs:

Description:
The widespread network connectivity and the rapid proliferation of Internet applications—such as broadband mobile networks, Cloud/Edge computing, and the Internet of Things that underpin numerous smart-world systems—have increasingly intertwined our society with connected networks and applications. However, ensuring security, privacy, and trust within these systems has emerged as one of the most pressing challenges we face today. Despite the availability of numerous solutions, there is a growing need for new methods and algorithms to enhance security and trust, safeguard user and system privacy, and foster stronger practices through compelling incentives. The Security, Privacy, and Trust track invites submissions of original research papers from both academia and industry practitioners that present novel contributions in algorithms, system designs, implementations, and evaluations. We welcome papers in these and related areas.

Track Topics:
• Anonymous Communication and Applications
• Blockchain and Decentralized Trust Management
• Confidential Computing and Next Frontiers in Security
• Cloud/Edge Security and Privacy
• Computer Network Security and Privacy
• Computer and Network Forensics
• Cyber Threat Intelligence
• Cyber-physical System Security
• Data Security and Multiparty Access Control
• Intelligent Forensics Tools, Techniques and Procedures
• Optimization of Utility-Privacy Tradeoffs
• Security Driven Configuration Management
• Security, Privacy, and Trust for Machine Learning and Artificial Intelligence
• Security, Privacy, and Trust for Big Data
• Security, Privacy, and Trust for Cyber-Physical Systems
• Security, Privacy, and Trust for Networked Control Systems
• Security, Privacy, and Trust for Resource-Constrained Devices
• Security, Privacy, and Trust for Software Defined Networking
• Security, Privacy, and Trust for Wireless Networks
• Machine Learning and Artificial Intelligence for Security, Privacy, and Trust
• Smart Cards and Secure Hardware
• Penetration Testing and Network Security
• Private Information Retrieval
• Privacy-Preserving Data Aggregation
• Privacy-Preserving Trust Management
• Trust and Reputation Models
• Usable Security and Privacy
• Vulnerability, Exploitation Tools, and Virus/Worm Analysis
• Quantum and Post-Quantum Network Security
• LLM for Network Security

TPC list:
• Guoxing Chen, Shanghai Jiao Tong University, China
• Yingfei Dong, University of Hawaii, USA
• Song Fang, University of Oklahoma, USA
• Xing Gao, University of Delaware, USA
• Linke Guo, Clemson University, USA
• Xiaonan Guo, George Mason University, USA
• Hongxin Hu, University at Buffalo, USA
• Yidan Hu, Rochester Institute of Technology, USA
• Ming Li, University of Texas at Arlington, USA
• Qinghua Li, University of Arkansas, USA
• Shaofeng Li, Southeast University, China
• Tao Li, Purdue University, USA
• Hongbo Liu, Electronic Science and Technology of China
• Yao Liu, University of South Florida, USA
• Zhuo Lu, South Florida University, USA
• Lichuan Ma, Xidian University, China
• Yan Meng,Shanghai Jiao Tong University, China
• Wenhai Sun, Purdue University, USA
• Boyang Wang, University of Cincinnati, USA
• Wei Wang, Saint Louis University, USA
• Yan Wang, Temple University, USA
• Yucheng Xie, Yeshiva University, USA
• Xiangyu Xu, Southeast University, China
• Xu Yuan, University of Delaware, USA
• Xiaochan Xue, University of Hawaii at Manoa, USA
• Qiben Yan, Michigan State University, USA
• Zheng Yan, Xidian University, China
• Jie Yang, University of Electronic Science and Technology of China
• Chenhao Ying, Shanghai Jiao Tong University, China
• Jiadi Yu, Shanghai Jiao Tong University, China
• Le Yu, Shanghai Maritime University, China
• Wei Yu, Towson University, USA
• Jiawei Yuan, University of Massachusetts Dartmouth, USA
• Kai Zeng, George Mason University, USA
• Ning Zhang, Washington University in St. Louis, USA
• Ziming Zhao, University at Buffalo, USA
• Lu Zhou, Xidian University, China