At least one author is required to register at author registration rate. ACNS'22 is now open for registration. The registration information is available at https://sites.google.com/di.uniroma1.it/acns2022/registration . The workshop authors (one for each paper) need to register by 30 April.
- Paper Submission Deadline:
March 4, 2022March 22, 2022 AOE [Extended]
- Notification of Acceptance/Rejection:
April 22, 2022April 20, 2022
- Submission of camera-ready papers for pre-proceedings:
May 8, 2022May 1, 2022
- Workshop date: one day between June 20 and June 23, 2022
- Registration Deadline: April 30, 2022
In recent years, Artificial Intelligence (AI) has got a lot of attention, especially, for the success of deep learning to address problems that were considered hard before. Big players such as Google, Amazon and Baidu are exploring the application of AI in different markets like healthcare, FinTech and autonomous vehicles. Along with AI, other technologies such Internet-of-Things (IoT) have boosted other areas like the case of Industry 4.0, where through the adoption of Industrial-IoT (IIoT) into the production chain companies want to have a smarter manufacture that can be adapted to their customers’ needs.
The accelerating adoption of new technologies brings new challenges especially associated with the cybersecurity of the applications, where confidentiality, integrity and availability of data are important. Security incident in IIoT impacts the safety properties since applications interact physically with people or other assets. The intersection of AI and cybersecurity can be seen as a two-fold relationship. On the one hand, AI techniques can be adopted to improve the state-of-the-art of security solutions, while on the other hand, cybersecurity can contribute to improving the study of the security of AI algorithms through the exploration of adversarial machine learning.
This workshop aims to open a space where new research ideas from different areas converge into the intersection of AI, IIoT, Cyber-Physical Systems (CPS) and cybersecurity. We encourage researchers and experts in the fields of AI, embedded systems, CPS and cybersecurity to take the opportunity to use this workshop for sharing their work and open the discussion of new ideas in this always-evolving topic.
Topics of Interest
AIoTS aims to cover various fields of application in the area of security and privacy within the fields of artificial intelligence and industrial IoT. Thus, suggested topics include, but are not limited to, the following points:
- Formal security and resilience analysis on AI and IIoT/CPS
- Risk management and governancefor AI and IIoT-based Application
- AI-Assisted Critical Infrastructure Security
- (Federated) Adversarial Machine Learning
- AI for Detection,Prevention, Response and Recovery against PotentialThreats
- AI for Wide-Area Situational Awareness and Traceability
- Applied Cryptography for AI and IIoT
- Security and Privacy of Cyber-Physical Systems and/or IIoT
- Applications of Formal Methods to IIoT Security
- Blockchain for TrustworthyIIoT/CPS-based applications
- Embedded Systems Security
- Cyber Threat Intelligence for AI and IIoT/CPS
- Privacy-Preserving Machine Learning
*** ANNOUNCEMENT: Two awards have been announced: 1) Best paper award for the AIoTS 2022 workshop papers, and 2) Best paper award from all the workshops, in which AIOTS workshop best paper shall compete with other workshop's best paper. Moreover, the selected papers will be invited to submit an extended version to the Frontiers in Communications and Networks journal.
Instructions for authors:
Papers can be submitted at the Easy Chair link here.
Submissions must be original and must not duplicate work that any of the authors has published elsewhere or has submitted in parallel to any other venue with formally published proceedings.
Submissions must be anonymous, with no author names, affiliations, acknowledgement or obvious references. Each submission must begin with a title, short abstract, and a list of keywords. The introduction should summarise the contributions of the paper at a level appropriate for a non-specialist reader. Likewise, all submissions must follow the original LNCS format (see http://www.springeronline.com/lncs ) with a page limit of 18 pages (including references) for the main part (reviewers are not required to read beyond this limit) and 30 pages in total. It is strongly encouraged that submissions be processed in LaTeX.
Authors of accepted papers must guarantee that their paper will be presented at the conference and must make a full version of their paper available online. Therefore, each accepted paper must be presented by at least a registered author. Submissions not meeting the submission guidelines risk rejection without consideration of their merits.
Workshop PC Chairs
- Sridhar Adepu, University of Bristol, UK
- Cristina Alcaraz, University of Malaga, Spain
- Sergio Gonzalez, University of Malaga, Spain
- Chuadhry Mujeeb Ahmed, University of Strathclyde, UK
Technical Program Committee
- Magnus Almgren, Chalmers University
- John Castellanos, CISPA Helmholtz Center for Information Security
- Luca Davoli, University of Parma
- Sriharsha Etigowni, Purdue University
- Amrita Ghosal, University of Limerick
- Jairo Giraldo, University of Utah
- Joseph Gardiner, University of Bristol
- Luis Garcia, University of Southern California
- Shiyan Hu, University of Southampton
- Nandha Kumar KANDASAMY, Singapore Institute of Technology
- Marina Krotofil, Maersk
- Qin Lin, Carnegie Mellon University
- Subhash Lakshminarayana, University of Warwick
- Rajib Ranjan Maiti, Birla Institute of Technology
- Daisuke Mashima, Advanced Digital Sciences Center
- Weizhi Meng, Technical Universtiy of Denmark
- Christopher M. Poskitt, Singapore Management University
- Federica Pascucci, Università degli Studi Roma Tre
- Neetesh Saxena, Cardiff University, UK
- Alma Oracevic, University of Bristol
- Zheng Yang, Southwest University
- Urko Zurutuza, Mondragon University