[Message Prev][Message Next][Thread Prev][Thread Next][Message Index][Thread Index]

[CFP] 4th International workshop in Artificial Intelligence and Industrial Internet-of-Things Security (AIoTS)



=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
CALL FOR PAPERS
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D

4th International workshop in Artificial Intelligence and Industrial Intern=
et-of-Things Security (AIoTS)

Co-located with ACNS2022 (June 20-23), Rome, Italy.
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
Workshop description:
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D

In recent years, Artificial Intelligence (AI) has got a lot of attention, e=
specially, for the success of deep learning to address problems that were c=
onsidered hard before. Big players such as Google, Amazon and Baidu are exp=
loring the application of AI in different markets like healthcare, FinTech =
and autonomous vehicles. Along with AI, other technologies such as Internet=
-of-Things (IoT) have boosted other areas like the case of Industry 4.0, wh=
ere through the adoption of Industrial-IoT (IIoT) into the production chain=
 companies want to have a smarter manufacture that can be adapted to their =
customers=E2=80=99 needs. The accelerating adoption of new technologies bri=
ngs new challenges especially associated with the cybersecurity of the appl=
ications, where confidentiality, integrity and availability of data are imp=
ortant. Security incident in IIoT impacts the safety properties since appli=
cations interact physically with people or other assets. The intersection o=
f AI and cybersecurity can be seen as a two-fold relationship. On the one h=
and, AI techniques can be adopted to improve the state-of-the-art of securi=
ty solutions, while on the other hand, cybersecurity can contribute to impr=
ove the study of the security of AI algorithms through the exploration of a=
dversarial machine learning. This workshop aims to open a space where new r=
esearch ideas from different areas converge into the intersection of AI, II=
oT, Cyber-Physical Systems (CPS) and cybersecurity. We encourage researcher=
s and experts in the fields of AI, embedded systems, CPS and cybersecurity =
to take the opportunity to use this workshop for sharing their work and ope=
n the discussion of new ideas in this always-evolving topic.

=3D=3D=3D=3D=3D=3D=3D
Topics:
=3D=3D=3D=3D=3D=3D=3D

AIoTS aims to cover various fields of application in the area of security a=
nd privacy within the fields of artificial intelligence and industrial IoT.=
 Thus, suggested topics include, but are not limited to, the following poin=
ts:

- Formal security and resilience analysis on AI and IIoT/CPS
- Risk management and governance for AI and IIoT-based Application
- AI-Assisted Critical Infrastructure Security
- (Federated) Adversarial Machine Learning
- AI for Detection, Prevention, Response and Recovery against Potential Thr=
eats
- AI for Wide-Area Situational Awareness and Traceability
- Applied Cryptography for AI and IIoT
- Security and Privacy of Cyber-Physical Systems and/or IIoT
- Applications of Formal Methods to IIoT Security
- Blockchain for Trustworthy IIoT/CPS-based applications
- Embedded Systems Security
- Cyber Threat Intelligence for AI and IIoT/CPS
- Privacy-Preserving Machine Learning

For more details on submission, please have a look at the AIoTS2022 website=
: https://mujeebch.github.io/aiots2022/

=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
IMPORTANT DATES:
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D

Paper Submission Deadline: March 4, 2022

Notification of Acceptance/Rejection: April 15, 2022

Submission of camera-ready papers for pre-proceedings: May 1, 2022

Workshop date: one day between June 20 and June 23, 2022

=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
Workshop PC Chairs:
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D

- Sridhar Adepu, University of Bristol, UK
- Cristina Alcaraz, University of Malaga, Spain

=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
Publicity Chair:
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D

- Sergio Gonzalez, University of Malaga, Spain

=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
Web Chair:
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D

- Chuadhry Mujeeb Ahmed, University of Strathclyde, UK

=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D
Technical Program Committee:
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D

- Magnus Almgren, Chalmers University, Sweden
- Luis Garcia, University of Southern California, USA
- Nandha Kumar KANDASAMY, SUTD, Singapore
- Qin Lin, CMU, USA
- Subhash Lakshminarayana, University of Warwick, UK
- Eleonora Losiouk, University of Padua, Italy
- Rajib Ranjan Maiti, BITS, India
- Daisuke Mashima, ADSC, Singapore
- Weizhi Meng, Technical Universtiy of Denmark, Denmark
- Chris Poskitt, SMU, USA
- Federica Pascucci, Roma Tre University, Italy
- Zheng Yang, Southwest University, China


alt.security.alarms Main Index | alt.security.alarms Thread Index | alt.security.alarms Home | Archives Home