Data Security for Heterogeneous Environments (DASHE 2024)

Scope

In an era marked by the increasing networking and digitization of social resources, the significance of data and its inherent value are consistently underscored and continuously enhanced. The mining and utilization of massive datasets foreshadow that data has become one of the most valuable assets for individuals, organizations, and governments, while also becoming an attractive target for cyber threats. Furthermore, in real-world scenarios, data frequently manifests in a multitude of heterogeneous formats. Accurate labeling of heterogeneous data poses difficulties, potentially resulting in data leakage and privacy breaches if sensitive data is misclassified. Moreover, due to the asymmetry of the offensive and defensive game, malicious actors may find it easier to conceal harmful content within seemingly innocuous data, amplifying the intricacy of detecting and preventing data leakage across multiple data types. Therefore, it is paramount to analyze and provide promising solutions to the security implications inherent in the heterogeneous data paradigm due to the unique challenges it presents compared to its homogeneous counterpart.

This workshop aims to bring together cutting-edge research and developments in the field of data security. We invite researchers, practitioners, and experts from academia and industry to contribute their original work, insights, and perspectives on various aspects of data security for heterogeneous environments. This workshop seeks to advance our understanding of data security challenges, solutions, and best practices, providing a platform for the exchange of ideas and knowledge in this crucial area.


WORKSHOP AREAS

Topic interest include but not limited to:

1. Data security in cloud environments
2. Data security challenges in the Internet of Things (IoT) ecosystem
3. Privacy-preserving data sharing, anonymization, and compliance with data protection regulations
4. Secure encryption techniques for heterogeneous data
5. Machine Learning for data breach detection, threat analysis, and fraud prevention
6. Data integrity, secure storage, and redundancy mechanisms
7. Data security and privacy for large language models
8. Role-based/attribute-based access control and other access control mechanisms
9. Distributed data security and blockchain-based solutions
10. Privacy computing for heterogeneous data
11. Security and privacy for artificial intelligence (AI) applications
12. Threat intelligence and cyber threat detection for heterogeneous environments
13. Security assessment and risk analysis for heterogeneous data environments
14. Intrusion detection and prevention systems for protecting diverse data assets


PAPER SUBMISSION

All submissions should be written in English and submitted via our submission system. A paper submitted to MDATA 2024 cannot be under review for any other conference or journal during the entire period that it is considered for MDATA 2024, and must be substantially different from any previously published work. Submissions are reviewed in a single-blind manner. Please note that all submissions must strictly adhere to the IEEE templates as provided below. The templates also act as a guideline regarding formatting. In particular, all submissions must use either the LATEX template or the MS-Word template. Please follow exactly the instructions below to ensure that your submission can ultimately be included in the proceedings. If you have any question on MDATA 2024, please feel free to contact Dr. Xin Wang: xinwang@qlu.edu.cn


IMPORTANT DATES

  • Full paper due:  May 20,2025
  • Acceptance notification: June 20,2025
  • Camera-ready copy: July 20,2025
  • Conference Date: August 15-17, 2025

  • ORGANIZATION

    WORKSHOP GENERAL CHAIRS

    Ming Yang Qilu University of Technology, Shandong, China
    Heng Zhang Jiangsu Ocean University, Jiangsu, China
    Jia Yu Qingdao University, Shandong, China
    Xin Wang Qilu University of Technology, Shandong, China

    Program Committee

    Fanyu Kong Shandong University, Shandong, China
    Mengxiang Liu The University of Sheffield, Sheffield, U. K.
    Yao Zhang Northwestern Polytechnical University, Shaanxi, China
    Chengcheng Zhao Zhejiang University, Zhejiang, China
    Chao Fang Beijing University of Technology, Beijing, China
    Zhenyong Zhang Guizhou University, Guizhou, China
    Shuai Feng Nanjing University of Science and Technology, Jiangsu, China
    Chongrong Fang Shanghai Jiao Tong University, Shanghai, China
    Jinhui Xia Southeast University, Jiangsu, China
    Yulin Ma Beihang University, Beijing, China



    footer