- From: Kemafor Ogan <kogan@ncsu.edu>
- Date: Wed, 12 Apr 2023 11:56:10 -0400
- To: semantic-web@w3.org
- Message-ID: <CALRn8s4NbY8305Zzsj0S9t6Dtcnv4q4Re8dSWjH79F5S3YAdqg@mail.gmail.com>
International Conference on Secure Knowledge Management (SKM) 2023 https://www.secure-km.org/ Tempe, AZ USA September 22-23, 2023 ========Important Dates======== *+ Deadline for paper submission: April 30, 2023* + Notification to authors: June 10, 2023 + Author registration: July 15, 2023 + Deadline for final papers: July 15, 2023 + Early registration: July 15, 2023 + Regular registration: August 15, 2023 + Conference dates: September 22-23, 2023 + Note: As a result of *NSF funding*, selected US-based students whose papers are accepted will be provided support to attend the conference. ========Call For Papers======== Knowledge Management (KM) deals with issues relating to gathering, organizing, sharing, processing, analyzing and storing knowledge sourced from the data and human assets of an organization. Recent trends suggest an ever-evolving vulnerability surface in KM which poses significant challenges with securing the entire KM lifecycle: first, there is the increased availability and diversity of high performance devices producing and processing large amounts data; second, advancements in AI/ML techniques is driving increased adoption of AI/ML in a wide range of domains raising different challenges in different contexts; emerging platforms and environments such as Blockchains, Web3, Metaverse, etc., are contributing additional complexities to the SKM challenge. Consequently, the issue of how to ensure the security of the entire KM cycle is a growing and important concern. Knowledge Management (KM) deals with issues relating to gathering, organizing, sharing, processing, analyzing and storing knowledge sourced from the data and human assets of an organization. Recent trends suggest an ever-evolving vulnerability surface in KM which poses significant challenges with securing the entire KM lifecycle: first, there is the increased availability and diversity of high performance devices producing and processing large amounts data; second, advancements in AI/ML techniques is driving increased adoption of AI/ML in a wide range of domains raising different challenges in different contexts; emerging platforms and environments such as Blockchains, Web3, Metaverse, etc., are contributing additional complexities to the SKM challenge. Consequently, the issue of how to ensure the security of the entire KM cycle is a growing and important concern. SKM is a biannual conference that brings together researchers & practitioners from academia, industry, and government on a global scale to focus on relevant issues at the intersection of security and knowledge management. The aim of the SKM-2023 conference is to present, discuss and disseminate the most recent innovations, trends, concerns, and solutions to practical challenges relevant to the mitigation and detection of threats across the multiple software layers that support AI and KM. SKM-2021 was originally scheduled to be held in San Antonio, TX was eventually held virtually due to the COVID pandemic. SKM 2019 was held in BITS Pilani, Goa Campus, Goa, India and past iterations of SKM were held at SUNY at Buffalo, SUNY Albany, NYU, SUNY Stony Brook, UT Dallas, Rutgers University, BITS Dubai, University of South Florida, University of Texas, San Antonio. Following the biennial tradition of the Secure Knowledge Management Workshop that began in 2004, SKM-2023 will be held on September 22-23, 2023, at Arizona State University, Tempe, AZ USA. Papers offering novel research contributions in all aspects of SKM are solicited for submission. Topics of interest include, but are not limited to: + Advanced Software Techniques for SKM - Security, Quality & Confidentiality of ML Labeling and Training - Privacy Preserving AI/ML - Security in Distributed Trust and Decentralized Applications - Explainability and Traceability of AI/ML - Security Testing and Risk Assessment of AI/ML - Online Social Networks - Security in Blockchains and Smart Contracts - Bias in AI + Secure Knowledge Management Computing Frameworks - Security in Cyber Physical Systems - Security in Collaborative Environments - Security in Middleware Environments - Security in Cloud and Edge Computing - Security in Virtual Environments - Security in Specialized Computing Platforms e.g. Blockchains + Advanced Techniques for Domain-specific SKM - Healthcare - Social Networks and Media - Fake News, Conversation, Voice, Video, Deep Fakes - Online Advertising - Industry 4.0 - Finance - Internet of Things - Current & Future Web, including Web3 & Metaverse - Smart Manufacturing - Insider Threat ========Submission Guidelines======== Only original papers should be submitted. Submissions should not substantially overlap work which has been published elsewhere or simultaneously submitted to a journal or another conference with proceedings. Papers that contain any form of plagiarism will be rejected without a review. Paper Format All submissions must be in English and should adhere to the LNCS/CCIS format guidelines. All papers will be published in Springer CCIS (as full papers and short papers). Guidelines for proceedings authors (pdf): ftp://ftp.springernature.com/cs-proceeding/svproc/guidelines/Springer_Guidelines_for_Authors_of_Proceedings_CS.pdf LaTeX2e Proceedings Templates (zip): ftp://ftp.springernature.com/cs-proceeding/llncs/llncs2e.zip CCIS Consent form for the publication: https://www.secure-km.org/files/Consent_Form.pdf Including references and appendices, full paper should be 10-20 pages in the LNCS / CCIS one-column page format. To facilitate the double-blind paper evaluation, authors are kindly requested to submit the paper WITHOUT any self-reference to any of the authors anywhere in the paper, including the acknowledgments section of the paper and any other reference that may disclose the authors’ identity. Papers should be uploaded to Microsoft CMT ( https://cmt3.research.microsoft.com/SKM2023/Submission/Index) in PDF format only. After the paper submission has been successfully completed, authors will receive an automatic confirmation e-mail. Each paper should clearly indicate the nature of its technical/scientific contribution and the problems, domains or environments to which it is applicable. It is planned to publish the peer-reviewed and selected papers of conference as proceedings with Springer in their prestigious Communications in Computer and Information Science series (Scopus and DBLP indexed). Some selected papers presented at the conference will be invited for extension and further review for a fast-tracked special issue of Information Systems Frontiers (SCIE, Scopus and DBLP indexed) a Springer journal. Authors of registered papers (including posters) must guarantee that their papers will be presented at the conference. At least one FULL registration is mandatory for each accepted paper. Papers which are not presented will be excluded from the conference proceedings. -- Kemafor Anyanwu (Ogan), Ph.D. Associate Professor Department of Computer Science Rm 2270, EBII North Carolina State University Raleigh, NC 27695 http://research.csc.ncsu.edu/coul/
Received on Wednesday, 12 April 2023 15:56:29 UTC