ACM SIGCHI General Interest Announcements (Mailing List)


Options: Use Forum View

Use Monospaced Font
Show Text Part by Default
Show All Mail Headers

Message: [<< First] [< Prev] [Next >] [Last >>]
Topic: [<< First] [< Prev] [Next >] [Last >>]
Author: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
Conference Contact <[log in to unmask]>
Reply To:
Conference Contact <[log in to unmask]>
Tue, 7 Jul 2015 23:56:40 +1000
text/plain (254 lines)

International Symposium on Security and Privacy in Social Networks and Big
(SocialSec 2015), Hangzhou, China, 16-18 November, 2015


Important Dates


Submission: 31 July 2015 (Extended)
Author Notification: 10 August 2015
Registration and camera-ready due: 24 August 2015
Conference: 16-18 November 2015

Special Issues
Selected papers will be invited to the following journal special issues:

[1] "Social Network Security" in IEEE Transactions on Dependable and Secure
Computing (Impact Factor: 1.137)

[2] "Embedded Device Forensics and Security: State of the Art Advances" in
ACM Transactions on Embedded Computing (Impact Factor: 0.68)

[3] "Security and Privacy in Social Networks" in Concurrency and
Computation: Practice and Experience (Impact Factor: 0.784)

[4] "Advance in Secure Data Storage and Computation in Cloud" in Security
and Communication Networks (pending, Impact Factor: 0.433)

Keynote Speeches
Keynote 1: Data-Driven Privacy Analysis
Professor Keith W. Ross
Dean of Engineering and Computer Science, NYU Shanghai
& Leonard J. Shustek Professor of Computer Science, CSE Dept, NYU

Keynote 2: Identifying Propagation Sources in Social Networks
Professor Wanlei Zhou
Alfred Deakin Professor, Chair of Information Technology,
School of Information Technology,
Deakin University, Melbourne, Australia

Conference Outline


Social Networks and Big Data have pervaded all aspects of our daily lives.
With their unparalleled popularity, social networks have evolved from the
platforms for social communication and news dissemination, to indispensable
tools for professional networking, social recommendations, marketing, and
online content distribution. Social Networks, together with other
activities, produce Big Data that beyond the ability of commonly used
computer software and hardware tools to capture, manage, and process within
a tolerable elapsed time.

Due to their scale, complexity and heterogeneity, a number of technical and
social challenges in Social Networks and Big Data must be addressed. It has
been widely recognized that security and privacy are the critical issues.
On one hand, Social Networks and Big Data have been the effective platform
for the attackers to launch attacks and distribute malicious information.
On the other hand, privacy leakage through Social Networks and Big Data has
become common exercise. The aim of SocialSec 2015 is to provide a leading
edge forum to foster interactions between researchers and developers with
the security and privacy communities in Social Networks and Big Data, and
to give attendees an opportunity to interact with experts in academia,
industry, and governments.

Conference Topics


The conference seeks submissions from academia, industry, and government
presenting novel research on all theoretical and practical aspects of
security and privacy in Social Networks and Big Data. Papers describing
case studies, implementation experiences, and lessons learned are also
encouraged. Topics of interest include but are not limited to:

-Attacks in/via Social Networks
-Information control and detection
-Malicious behaviour modelling in Social Networks
-Malicious information propagation via Social Networks
-Phishing problems in Social Networks
-Privacy protection in Social Networks
-Big Data analytics for threats and attacks prediction
-Spam problems in Social Networks
-Trust and reputations in Social Networks
-Big Data outsourcing
-Big Data forensics
-Big SociaData
-Security and privacy in Big Database
-Applied Cryptography for Big Data
-Big Data system security
-Mobile Social Networks security
-Security and privacy in cloud
-Forensics in Social Networks and Big Data

Instructions for authors


Submission Website:

Submitted papers must not substantially overlap with papers that have been
published or that are simultaneously submitted to a journal or a conference
with proceedings. Papers must be clearly presented in English, must not
exceed 8 pages in A4 format, including tables, figures, references and
appendixes, in IEEE Computer Society proceedings format with Portable
Document Format (.pdf). Please refer to
for preparing the submission.

Papers will be selected based on their originality, timeliness,
significance, relevance, and clarity of presentation. Submission of a paper
should be regarded as a commitment that, should the paper be accepted, at
least one of the authors will register and attend the conference to present
the work.

Conference Organisation


General Chairs


Jifeng He, East China Normal University, China
Yang Xiang, Deakin University, Australia

Program Chairs


Wenzhi Chen, Zhejiang University, China
Elisa Bertino, Purdue University, USA
Xinyi Huang, Fujian Normal University, China

Publicity Chairs


Yingjie Xia, Zhejiang University, China
Yu Wang, Deakin University, Australia

Program Committee


Gail-Joon Ahn, Arizona State University, USA
Cristina Alcaraz, University of Malaga, Spain
Man Ho Au, Hong Kong Polytechnic University
Joonsang Baek, KUSTAR, UAE
Filipe Beato, University of Leuven, Belgium
Ero Balsa, University of Leuven, Belgium
Barbara Carminati, University of Insubria, Italy
David Chadwick, University of Kent, UK
Richard Chbeir, CNRS, France
Xiaofeng Chen, Xidian University, China
Reza Curtmola, New Jersey Institute of Technology, USA
Yong Ding, Guilin University of Electronic Technology, China
Steven Furnell, Plymouth University, UK
Alban Gabillon, University of Polynésie Française, French Polynesia
Joaquin Garcia-Alfaro, TELECOM Bretagne, France
Gabriel Ghinita, University of Massachusetts at Boston, USA
Jin Han, Twitter, US
Murat Kantarcioglu, University of Texas at Dallas, US
Sokratis Katsikas, University of Piraeus, Greece
Stefan Katzenbeisser, TU Darmstadt, Germany
Muhammad Khurram Khan , King Saud University, Kingdom of Saudi Arabia
Shinsaku Kiyomoto , KDDI R&D Laboratories Inc., Japan
Ashish Kundu, IBM Thomas J. Watson Research Center
Jinguang Han, Nanjing University of Finance & Economics , China
Alejandro Hevia, Universidad de Chile, Chile
Costas Lambrinoudakis, University of Piraeus, Greece
Adam J. Lee, University of Pittsburgh, USA
Joseph K. Liu, Institute for Infocomm Research, Singapore
William Liu, Auckland University of Technology, New Zealand
Rongxing Lu, Nanyang Technological University, Singapore
Carlos Maziero, Federal Technological University, Brazil
Wojciech Mazurczyk, Warsaw University of Technology, Poland
Surya Nepal, CSIRO, Australia
Jaehong Park , Eastern Michigan University, USA
Gerardo Pelosi, Politecnico di Milano, Italy
Günther Pernul, University of Regensburg, Germany
Thorsten Strufe, , Dresden University of Technology, Germany
Chunhua Su, JAIST, Japan
Hung-Min Sun, National Tsing Hua University, Taiwan
Pedro García-Teodoro, University of Granada, Spain
Lingyu Wang, Concordia University, Canada
Qian Wang, Wuhan University, China
Yu Wang, Deakin University, Australia
Sheng Wen, Deakin University, Australia
Qianhong Wu, Beihang Univerisity, China
Guomin Yang, University of Wollongong, Australia
Tsz Hon Yuen, Huawei, Singapore
Yong Yu, University of Electronic Science and Technology of China, China
Zhenfeng Zhang, Institute of Software, Chinese Academy of Sciences
Mingwu Zhang, Hubei University of Technology, China

Contact Information


For further information regarding to the conference, please send email to
[log in to unmask]

    For news of CHI books, courses & software, join CHI-RESOURCES
     mailto: [log in to unmask]

    To unsubscribe from CHI-ANNOUNCEMENTS send an email to
     mailto:[log in to unmask]

    For further details of CHI lists see