Conferences related to Security And Privacy

Back to Top

IGARSS 2020 - 2020 IEEE International Geoscience and Remote Sensing Symposium

All fields of satellite, airborne and ground remote sensing.


2018 15th IEEE Annual Consumer Communications & Networking Conference (CCNC)

IEEE CCNC 2018 will present the latest developments and technical solutions in the areas of home networking, consumer networking, enabling technologies (such as middleware) and novel applications and services. The conference will include a peer-reviewed program of technical sessions, special sessions, business application sessions, tutorials, and demonstration sessions


2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE)

The conference aims at bringing together researchers and practitioners in the world working on trusted computing and communications, with regard to trust, security, privacy, reliability, dependability, survivability, availability, and fault tolerance aspects of computer systems and networks, and providing a forum to present and discuss emerging ideas and trends in this highly challenging research field


2018 17th International Conference on Information Technology Based Higher Education and Training (ITHET)

The convergence of current technologies provides the infrastructure for transmitting and storing information faster and cheaper. For information to be used in gaining knowledge, however, environments for collecting, storing, disseminating, sharing and constructing knowledge are needed. Such environments, knowledge media, brings together telecommunication, computer and networking technologies, learning theories and cognitive sciences to form meaningful environments that provides for a variety of learner needs. ITHET 2018 will continue with the traditional themes of previous events. However, our special theme for this year is a fundamental one. We have previously had MOOCs as our special theme, but now they are just infrastructure. Even “Blended Learning” is what we all do anyway. In a time of the unprecedented access to knowledge through IT, it is time for us to revisit the fundamental purpose of our educational system. It is certainly not about knowledge anymore.


2018 24th International Conference on Pattern Recognition (ICPR)

ICPR will be an international forum for discussions on recent advances in the fields of Pattern Recognition, Machine Learning and Computer Vision, and on applications of these technologies in various fields

  • 2016 23rd International Conference on Pattern Recognition (ICPR)

    ICPR'2016 will be an international forum for discussions on recent advances in the fields of Pattern Recognition, Machine Learning and Computer Vision, and on applications of these technologies in various fields.

  • 2014 22nd International Conference on Pattern Recognition (ICPR)

    ICPR 2014 will be an international forum for discussions on recent advances in the fields of Pattern Recognition; Machine Learning and Computer Vision; and on applications of these technologies in various fields.

  • 2012 21st International Conference on Pattern Recognition (ICPR)

    ICPR is the largest international conference which covers pattern recognition, computer vision, signal processing, and machine learning and their applications. This has been organized every two years by main sponsorship of IAPR, and has recently been with the technical sponsorship of IEEE-CS. The related research fields are also covered by many societies of IEEE including IEEE-CS, therefore the technical sponsorship of IEEE-CS will provide huge benefit to a lot of members of IEEE. Archiving into IEEE Xplore will also provide significant benefit to the all members of IEEE.

  • 2010 20th International Conference on Pattern Recognition (ICPR)

    ICPR 2010 will be an international forum for discussions on recent advances in the fields of Computer Vision; Pattern Recognition and Machine Learning; Signal, Speech, Image and Video Processing; Biometrics and Human Computer Interaction; Multimedia and Document Analysis, Processing and Retrieval; Medical Imaging and Visualization.

  • 2008 19th International Conferences on Pattern Recognition (ICPR)

    The ICPR 2008 will be an international forum for discussions on recent advances in the fields of Computer vision, Pattern recognition (theory, methods and algorithms), Image, speech and signal analysis, Multimedia and video analysis, Biometrics, Document analysis, and Bioinformatics and biomedical applications.

  • 2002 16th International Conference on Pattern Recognition


More Conferences

Periodicals related to Security And Privacy

Back to Top

Audio, Speech, and Language Processing, IEEE Transactions on

Speech analysis, synthesis, coding speech recognition, speaker recognition, language modeling, speech production and perception, speech enhancement. In audio, transducers, room acoustics, active sound control, human audition, analysis/synthesis/coding of music, and consumer audio. (8) (IEEE Guide for Authors) The scope for the proposed transactions includes SPEECH PROCESSING - Transmission and storage of Speech signals; speech coding; speech enhancement and noise reduction; ...


Communications Magazine, IEEE

IEEE Communications Magazine was the number three most-cited journal in telecommunications and the number eighteen cited journal in electrical and electronics engineering in 2004, according to the annual Journal Citation Report (2004 edition) published by the Institute for Scientific Information. Read more at http://www.ieee.org/products/citations.html. This magazine covers all areas of communications such as lightwave telecommunications, high-speed data communications, personal communications ...


Communications Surveys & Tutorials, IEEE

Each tutorial reviews currents communications topics in network management and computer and wireless communications. Available tutorials, which are 2.5 to 5 hours in length contains the original visuals and voice-over by the presenter. IEEE Communications Surveys & Tutorials features two distinct types of articles: original articles and reprints. The original articles are exclusively written for IEEE Communications Surveys & Tutorials ...


Computer

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed technical content that covers all aspects of computer science, computer engineering, technology, and applications. Computer is a resource that practitioners, researchers, and managers can rely on to provide timely information about current research developments, trends, best practices, and changes in the profession.


Computer Architecture Letters

Rigorously peer-reviewed forum for publishing early, high-impact results in the areas of uni- and multiprocessors computer systems, computer architecture workload characterization, performance evaluation and simulation techniques, and power-aware computing


More Periodicals

Most published Xplore authors for Security And Privacy

Back to Top

Xplore Articles related to Security And Privacy

Back to Top

Proceedings 2003 Symposium on Security and Privacy

2003 Symposium on Security and Privacy, 2003., 2003

The following topics are dealt with: anonymity; intrusion detection systems (IDS); operating systems (OS) and denial-of-service (DoS) attacks; formal methods; hardware and cryptography; and distributed systems.


Proceedings of the third international conference on security and privacy in communication networks

2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops - SecureComm 2007, 2007

None


Deep Manifold Learning Combined With Convolutional Neural Networks for Action Recognition

IEEE Transactions on Neural Networks and Learning Systems, 2018

Learning deep representations have been applied in action recognition widely. However, there have been a few investigations on how to utilize the structural manifold information among different action videos to enhance the recognition accuracy and efficiency. In this paper, we propose to incorporate the manifold of training samples into deep learning, which is defined as deep manifold learning (DML). The ...


Introduction to Security and Privacy on the Blockchain

2017 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), 2017

The blockchain has fueled one of the most enthusiastic bursts of activity in applied cryptography in years, but outstanding problems in security and privacy research must be solved for blockchain technologies to go beyond the hype and reach their full potential. At the first IEEE Privacy and Security on the Blockchain Workshop (IEEE S&B), we presented peer-reviewed papers bringing together ...


Computer Security and Privacy for Refugees in the United States

2018 IEEE Symposium on Security and Privacy (SP), 2018

In this work, we consider the computer security and privacy practices and needs of recently resettled refugees in the United States. We ask: How do refugees use and rely on technology as they settle in the US? What computer security and privacy practices do they have, and what barriers do they face that may put them at risk? And how ...


More Xplore Articles

Educational Resources on Security And Privacy

Back to Top

IEEE.tv Videos

Luca Bolognini: Internet of Things: Privacy and Security Challenges - WF-IoT 2015
Antonio Skarmeta: Security and Privacy in the Internet of Things - WF-IoT 2015
Designing Privacy Into Internet Protocols - Juan Carlos Zuniga keynote
Security and Privacy in a World of Connected Devices
Adventures in Usable Privacy and Security: From Empirical Studies to Public Policy - IEEE SecDev 2016
Glenn Fink on Priorities for IoT Security and Privacy From Here to 2020: End to End Trust and Security Workshop for the Internet of Things 2016
Panelist: Chaim Cohen - ETAP Delhi 2016
IEEE Summit on Internet Governance 2014: Panel II - Security vs. Privacy
Big Data & the Cloud: Privacy and Security issues
Privacy, security, and innovation challenges in different aspects of IoT - Panel from ETAP Forum, February 2016
IEEE World Forum on Internet of Things - Milan, Italy - Sara Foresti - Data Security and Privacy in the Internet of Things - Part 3
IEEE World Forum on Internet of Things - Milan, Italy - Sara Foresti - Data Security and Privacy in the Internet of Things - Part 1
Antonio Skarmeta: IoT Security and Privacy - Industry Forum Panel Introduction: WF IoT 2016
IEEE World Forum on Internet of Things - Milan, Italy - Sara Foresti - Data Security and Privacy in the Internet of Things - Part 2
Q&A: IoT Security and Privacy - Industry Forum Panel: WF-IoT 2016
The Internet of Things, An Overview: Karen O'Donoghue Addresses Issues and Challenges of a More Connected World -- 2016 End to End Trust and Security Workshop for the Internet of Things
Introductions: Experts in Technology and Policy (ETAP) Forum on Internet Governance, Cybersecurity and Privacy - February 2016
Juan Carlos Zuniga on Wi-Fi Privacy at IEEE 802 & IETF: 2016 End to End Trust and Security Workshop for the Internet of Things
Taher Elgamal: Keynote Presentation: WF IoT 2016
Achieving a Secure and Resilient Cyber Ecosystem - Homeland Security's Tom Ruoff

IEEE-USA E-Books

  • Proceedings 2003 Symposium on Security and Privacy

    The following topics are dealt with: anonymity; intrusion detection systems (IDS); operating systems (OS) and denial-of-service (DoS) attacks; formal methods; hardware and cryptography; and distributed systems.

  • Proceedings of the third international conference on security and privacy in communication networks

    None

  • Deep Manifold Learning Combined With Convolutional Neural Networks for Action Recognition

    Learning deep representations have been applied in action recognition widely. However, there have been a few investigations on how to utilize the structural manifold information among different action videos to enhance the recognition accuracy and efficiency. In this paper, we propose to incorporate the manifold of training samples into deep learning, which is defined as deep manifold learning (DML). The proposed DML framework can be adapted to most existing deep networks to learn more discriminative features for action recognition. When applied to a convolutional neural network, DML embeds the previous convolutional layer’s manifold into the next convolutional layer; thus, the discriminative capacity of the next layer can be promoted. We also apply the DML on a restricted Boltzmann machine, which can alleviate the overfitting problem. Experimental results on four standard action databases (i.e., UCF101, HMDB51, KTH, and UCF sports) show that the proposed method outperforms the state-of-the-art methods.

  • Introduction to Security and Privacy on the Blockchain

    The blockchain has fueled one of the most enthusiastic bursts of activity in applied cryptography in years, but outstanding problems in security and privacy research must be solved for blockchain technologies to go beyond the hype and reach their full potential. At the first IEEE Privacy and Security on the Blockchain Workshop (IEEE S&B), we presented peer-reviewed papers bringing together academia and industry to analyze problems ranging from deploying newer cryptographic primitives on Bitcoin to enabling usecases like privacy-preserving file storage. We overview not only the larger problems the workshop has set out to tackle, but also outstanding unsolved issues that will require further cooperation between academia and the blockchain community.

  • Computer Security and Privacy for Refugees in the United States

    In this work, we consider the computer security and privacy practices and needs of recently resettled refugees in the United States. We ask: How do refugees use and rely on technology as they settle in the US? What computer security and privacy practices do they have, and what barriers do they face that may put them at risk? And how are their computer security mental models and practices shaped by the advice they receive? We study these questions through in-depth qualitative interviews with case managers and teachers who work with refugees at a local NGO, as well as through focus groups with refugees themselves. We find that refugees must rely heavily on technology (e.g., email) as they attempt to establish their lives and find jobs; that they also rely heavily on their case managers and teachers for help with those technologies; and that these pressures can push security practices into the background or make common security "best practices" infeasible. At the same time, we identify fundamental challenges to computer security and privacy for refugees, including barriers due to limited technical expertise, language skills, and cultural knowledge-for example, we find that scams as a threat are a new concept for many of the refugees we studied, and that many common security practices (e.g., password creation techniques and security questions) rely on US cultural knowledge. From these and other findings, we distill recommendations for the computer security community to better serve the computer security and privacy needs and constraints of refugees, a potentially vulnerable population that has not been previously studied in this context.

  • An Improved Authentication Approach to Enhance Security and Privacy in RFID System

    Radio Frequency Identification (RFID) systems is increasingly rife in a variety of applications during recent years, such as inventory management, automobile immobilizers, animal tracking, supply chain management (SCM) and payment system. However, due to its wireless communication and demand for invisibility, security and privacy in RFID system becomes a serious challenge. In this paper, our main attention is constructing an efficient privacy preserving proposal. After reviewing the past work, we propose an improved method to enhance the security and privacy in RFID system. Based on random hash lock approach, we use random list stored in tag instead random value generator, and this novel method can achieve both mutual authentication with lower tag design cost. Meanwhile, the proposed solution satisfies security requirements, for instance, no information leaking, forward security and is resistant to replay attacks. In addition, it is suitable for distribute environment. Analysis of this approach shows it effective and efficiency. Compared with some existing schemes, this solution is superior.

  • Portable devices of security and privacy preservation for e-learning

    This paper systematically addresses the security and privacy concerns for e-learning systems. An effective architecture of e-learning system is proposed for a thorough overview on security and privacy issues related to current e-learning systems. This paper further examines the relationship among security & privacy policy, available security & privacy technolongy, and the degree of e-learning privacy & security. This paper significantly contributes to the knowledge of e-learning security & privacy research communities and will generate more research interests in this regard.

  • Security and privacy challenges in open and dynamic environments

    Information system security and privacy, once narrow topics primarily of interest to IS designers, have become critically important to society at large. The scope of associated challenges and applications is broadening accordingly, leading to new requirements and approaches. Information networks are evolving into more open and dynamic systems. Security and privacy enforcement is problematic in these systems due to the lack of a common understanding of requirements and information as well as user unpredictability. Shared ontologies, declarative policies, and trust models offer the most promising approaches to meet these challenges

  • Considerations towards security and privacy in Internet of Things based eHealth applications

    The present paper describes a design of Multi-agent architecture which handles the security and privacy of sensitive medical data. It is based on the Internet of Things technology, in with a plethora of sensors/things can collect a large amount of data about the users, environment, activities and store that data on the cloud for further processing, security and privacy issues may arise. Sensitive data like the patient's name, address or pathologies can be stored and accessed by third-parties. The patient's privacy must be ensured, and sensitive medical data must be visible only to the assigned physician, as part of the patient-doctor relationship. The proposed architecture will use the Remote Patient Monitoring context for validation.

  • Cloud security and privacy model for providing secure cloud services

    Cloud computing is becoming increasingly a magical solution and a widely adopted technology for delivering services over the Internet thanks to its diverse benefits, including services on demand, reducing costs, sharing and configuring computing resources, and high services scalability and flexibility. However, with the emergence of this technology, the concept of security and privacy has become a major barrier to cloud services adoption. Indeed, many research works have been done to identify cloud security and privacy issues. It is in this context that in this paper, we will provide a new cloud security and privacy model (CSPM) into layers which can be taken into account by cloud providers during all the stages of cloud services building and monitoring. This model will permit to overcome this cloud services barrier adoption and thus, to build confidence in cloud services and also to provide secure services. Finally, we will present some security threats and attacks, and propose, according to CSPM, some countermeasures.



Standards related to Security And Privacy

Back to Top

IEEE Standard for Message Sets for Vehicle/Roadside Communications

Research, compile, and consolidate information leading to the publication of a standard for exchanging DSRC information, providing for bi-directional message transmission and device control, in a manner which is compatible with but independent of the ASTM efforts to specify DSRC Layers 1 and 2. This will entail specifying the transponder resources, the transponder resource manager, the application message sets, and ...