鶹ýӳ

Call for Papers - Signal Processing Magazine
Special Issue on on Signal Processing for Cyber‐security and Privacy
Aug 1, 2012

Aim and Scope

Information technology and electronic communications have been rapidly applied to many spheres of human activity, including commerce, medicine and social networking. This has led to the creation of massive electronic repositories for distributed information storage and processing, which enables access by a large number of authorized users. The need for timely access to electronic data makes it imperative to guarantee the security and privacy of this data. Traditionally, electronic data security has been ensured via cryptographic techniques, but these distributed data systems require security and privacy mechanisms at all levels of the system. Thus, providing precise guarantees on the security and privacy of electronic information requires leveraging a range of information processing techniques beyond traditional cryptography to ensure secure distributed storage and access mechanisms. The problems of information exchange, interaction, and access lend themselves to fundamental information processing abstractions and theoretical analysis. The tools of rate‐distortion theory, distributed compression algorithms, distributed storage codes, machine learning for feature identification and suppression, and compressive sensing and sampling theory are fundamental and can be applied to precisely formulate and quantify the tradeoff between utility and privacy in a variety of domains. Thus, while rate‐distortion theory and information‐theoretic security can provide fundamental bounds on privacy and security leakage of distributed data systems, the information and signal processing techniques of compressive sensing, machine learning, and graphical models are the key ingredients necessary to achieve these performance limits in a variety of applications involving streaming data (smart grid, intelligent data collection), distributed data storage (cloud), and interactive data applications across a number of platforms. This special issue seeks to provide a venue for ongoing research in information and signal processing for security and privacy applications across a wide variety of domains, including communication media (e.g. ranging from wireless networks at the edge to optical backbones at the core of the Internet), to computer systems (e.g. ranging from traditional computer architectures to distributed systems, including cloud computing).

Topics of Interest include (but are not limited to):

  • Signal processing for information‐theoretic security
  • Data mining and analysis for anomaly and intrusion detection
  • Forensic analysis: device identification, recovery of lost/corrupted information
  • Information processing in the encrypted domain
  • Security in distributed storage systems
  • Codes for security in distributed storage and cloud computing
  • Location privacy and obfuscation of mobile device positioning
  • Physical layer security methods: confidentiality and authentication
  • Secure identity management
  • Formalized models for adversaries and threats
  • Techniques to achieve covert or stealthy communication
  • Stochastic models for large data repositories and for streaming data in cyber‐physical systems

Submission Process

Articles submitted to either issue must contain significant relevance to signal processing and its application to security and privacy. All submissions will be peer reviewed according to the 鶹ýӳ and Signal Processing Society guidelines for both publications. Submitted articles should not have been published or under review elsewhere. Manuscripts should be submitted online at using the Manuscript Central interface. Submissions to this special issue of the 鶹ýӳ SIGNAL PROCESSING MAGAZINE should have significant tutorial value. Prospective authors should consult the site for guidelines and information on paper submission.

Important Dates: Expected publication date for both special issues is September 2013.

Time Schedule Signal Processing Magazine
White paper due August 30, 2012
Invitation notification October 30, 2012
Manuscript submission due December 20, 2012
Acceptance notification February 3, 2013
Revised manuscript due March 1, 2013
Final acceptance notification March 30, 2013
Final material from authors April 20, 2013 (strict)

Guest Editors

Lalitha Sankar, Lead GE, Arizona State University, USA, [email protected]

Vincent Poor, Princeton University, USA, [email protected]

Mérouane Debbah, Supelec, Gif‐sur‐Yvette, France, [email protected]

Kannan Ramchandran, University of California Berkeley, USA, [email protected]

Wade Trappe, Rutgers University, USA, [email protected]