
۰۹ تیر - ۱۲ تیر ۱۴۰۴
ACM Conference on Security and Privacy in Wireless and Mobile Networks
هنوز دنبالکنندهای وجود ندارد.
نمای کلی
The 18th ACM Conference on Security and Privacy in Wireless and Mobile Networks (ACM WiSec 2025) will take place from June 30 to July 3, 2025, in Arlington, Virginia, USA, hosted by George Mason University. ACM WiSec is a premier conference focused on security and privacy in wireless and mobile networks, IoT, cyber-physical systems, and related areas, attracting researchers, students, and industry professionals.
Call for Papers: ACM WiSec 2025
The 18th ACM Conference on Security and Privacy in Wireless and Mobile Networks (ACM WiSec 2025) will be held in person from June 30 to July 3, 2025, in Arlington, Virginia, USA.
About ACM WiSec
ACM WiSec is the leading ACM and SIGSAC conference dedicated to all aspects of security and privacy in wireless and mobile networks and their applications, mobile software platforms, the Internet of Things, cyber-physical systems, usable security and privacy, biometrics, and cryptography. It is a competitive, high-quality conference well-attended by industry, government, and academia.
Topics of Interest
Topics of interest for WiSec include:
- Confidentiality, integrity, availability
- Authentication, identity, authorization, access control models and policies, localization, key management (agreement or distribution)
- Privacy of systems, devices, users, their locations and other attributes
- Exploitation of systems, including through reverse engineering, fuzzing, hardware or software vulnerabilities, protocol vulnerabilities, side channels, fault injection, resource exhaustion, jamming, or other means.
- Abuse of and through systems, including messaging abuse (spam, robocalls, etc.), theft of service, and fraud
- Defenses for exploitation and abuse
- Experiences developing, testing, and deploying production-ready or large-scale secure wireless systems
- Formal analysis, formal verification, and proof-based security approaches
- Information theoretical approaches for security
- Usable security and privacy, human factors
- Application of Machine Learning, e.g., for attack detection or privacy violations
- Economic and social impacts to security and privacy
Wireless and Mobile Systems of Interest
- Wireless networking protocols, for example: 802.11, Bluetooth, 802.15.4-based protocols, cellular air protocols including LTE and 5G-NR, Vehicle and industrial device protocols (e.g., LoRA), wireless for critical infrastructure (e.g., ADS-B, GPS, rail, satellites), NFC and smart payment applications
- Cryptographic primitives and protocols for wireless and mobile systems, including: WPA2, AKA, etc.
- Wireless physical layer technologies: transmission, reception, modulation, localization, remote sensing (e.g., radar, mmWave sensing), jammers, dynamic spectrum reuse and cognitive radio systems
- Wireless and mobile device hardware and software, for example: embedded devices, wearables (e.g., watches), smartphones, mobile sensors, home and industrial automation devices (e.g., IoT, Smart Home, utilities, etc.), healthcare devices, vehicles (e.g., drones, automotive, avionics, satellites), and payment systems
- Wireless and mobile adjacent topics, including voice interfaces, visible light communications, sonic, underwater communications, legacy telecommunications, …
Important Dates
- First Cycle Deadlines:
- Submission: November 21, 2024
- Author Notification: January 15, 2025
- Camera-ready: February 5, 2025
- Second Cycle Deadlines:
- Submission: March 16, 2025 (AOE)
- Author Notification: April 25, 2025
- Camera-ready: May 12, 2025
- Posters/Demo Deadlines:
- Submission: April 30, 2025 (AOE)
- Author Notification: May 8, 2025
- Camera-ready: May 12, 2025
Note: All deadlines are firm.
Submission Guidelines
- All papers must be submitted electronically through the HotCRP conference management system:
- Cycle 1: HotCRP submission site for Cycle 1
- Cycle 2: HotCRP submission site for Cycle 2
- Only PDF files will be accepted.
- Submissions must be prepared using the ACM proceedings template and use US Letter page size (8.5 x 11 inches).
Full, Short, and SoK Papers
- Full papers: At most 10 pages (excluding bibliography and appendices), up to 12 pages total.
- Short papers: Up to 6 pages (including bibliography and appendices).
- SoK papers: Up to 10 pages (excluding bibliography and appendices), up to 15 pages total. Title must be prefixed with "SoK:".
- All papers must be anonymized for double-blind review.
Posters and Demos
Instructions for poster and demo submissions will be made available on the WiSec 2025 website.
Artifact Evaluation
WiSec encourages authors to make software and data artifacts publicly available. Artifacts will be evaluated, and corresponding papers may be granted an artifact evaluation label.
Double Submissions
Double/simultaneous submissions to other conferences/journals are not allowed and will result in immediate rejection.
Registration
- Registration is now open.
- Authors of accepted papers must register by May 12, 2025.
- Early bird rates are available until May 19, 2025.
Travel Grants for Students
ACM WiSec 2025 offers a limited number of travel grants for students who have registered and co-authored an accepted paper. Grants are competitive and intended to reimburse travel expenses.
- Maximum of two students per institution.
- Not eligible for postdoctoral researchers, faculty members, or senior research personnel.
- Grant recipients may receive up to $1,000 for documented expenses (registration, airfare, lodging).
- To apply, please complete and submit the travel grant form (Note: Link is illustrative).
Research Ethics
All submitted papers will be reviewed for ethical concerns. Researchers should consider ethical analysis an integral part of their research, adhering to principles of beneficence, justice, respect for persons, and respect of law and public interest. For human subjects research, authors are expected to follow relevant laws and institutional practices (e.g., IRB review in the US).
Policy for Peer-Review Integrity
All SIGSAC-sponsored conferences adhere to ACM policies against harassment and the ACM Code of Ethics. Authors, PC members, and reviewers must follow ACM Publications Policies, including upholding the integrity of the peer review process and avoiding conflicts of interest. Violations will be penalized according to ACM policies.
تاریخهای کنفرانس
Conference Date
۹ تیر ۱۴۰۴ → ۱۲ تیر ۱۴۰۴
ارسال مقاله
First Cycle deadlines Submission
۱ آذر ۱۴۰۳
Second Cycle deadlines Submission
۲۶ اسفند ۱۴۰۳
Posters/Demo deadlines Submission
۱۰ اردیبهشت ۱۴۰۴
اعلان
First Cycle deadlines Author Notification
۲۶ دی ۱۴۰۳
Second Cycle deadlines Author Notification
۵ اردیبهشت ۱۴۰۴
Posters/Demo deadlines Author Notification
۱۸ اردیبهشت ۱۴۰۴
نسخه نهایی
First Cycle deadlines Camera-ready
۱۷ بهمن ۱۴۰۳
Posters/Demo deadlines Camera-ready
۲۲ اردیبهشت ۱۴۰۴
Second Cycle deadlines Camera-ready
۲۲ اردیبهشت ۱۴۰۴
ثبتنام
Authors of accepted papers must register by
۲۲ اردیبهشت ۱۴۰۴
Early bird rates are available until
۲۹ اردیبهشت ۱۴۰۴
رتبه منبع
منبع: CORE2023
رتبه: B
حوزه پژوهشی: Cybersecurity and privacy