Security and Privacy in Metaverse (SPM)

Overview

The metaverse is a virtual living space that integrates a variety of existing technologies with the aim of being able to create digital world that simulates real world situations without being limited by real world constraints. This gives plenty of possibilities and options that would not be possible without metaverse paradigms. For example, in the field of gaming, the metaverse can provide an immersive gaming experience. In education, classrooms can be everywhere and are no longer limited by physical constraints. With the metaverse, travel enthusiasts can enjoy the pleasure of travel without leaving their homes.

More concretely, the metaverse builds an economic system based on blockchain, provides an immersive experience based on interactive technology like Augmented Reality (AR) and Virtual Reality (VR), generates a mirror image of the real world based on digital twins, implements data computing, data storage, processing and sharing based on cloud computing, and realizes interconnected intelligence based on AI and IoT technology.

However, as this new digital space takes shape to transition from our physical world to the digital realm, domain experts will be concerned with the emerging of security and privacy risks in the metaverse context, which will include new forms of threats.

New approaches to guard against these new threats must be developed as soon as possible, rather than waiting until the problems are already embedded in the ecosystem, which will have serious consequences for the social acceptability and future development of the metaverse.

This track calls for new, original and high-quality scientific contributions to recent advances in identity management, security and privacy in the metaverse.

Topics include but not limited to

  • Authentication and Authorization mechanisms
  • Security/privacy protocol design
  • Security and privacy of digital twins
  • Blockchain applications in the metaverse
  • Intrusion detection and prevention systems for network security
  • Trusted software and applications
  • AR/VR and their related communication security
  • Privacy-preserving computation and metaverse
  • Security and privacy of machine learning in the metaverse
  • Adversarial attack and defense in the metaverse
  • Trust, security, and privacy in cloud computing/edge computing, in metaverse context.
  • Privacy preservation in AI-enabled networks

Important Dates

Submission Deadline    October 20th, 2023 (hard)
Notification of acceptance    on the fly, not later than October 31th, 2023
Camera Ready Deadline    3 days after the notification of acceptance and later than November 3th, 2023
Registration Deadline    4 days after the notification of acceptance and not later than November 4th, 2023
Conference    December 14th—16th, 2023

Submission guidelines

WETICE will be accepting the submissions starting from 14 th May. The submissions must be original that have not been published or submitted for publication elsewhere. All papers (including Selected invited tracks) should be submitted via CMT: https://cmt3.research.microsoft.com/WETICE2023

Papers must be submitted in English and formatted according to the following instructions. Please check and carefully follow the instructions provided in the templates which contains detailed instructions on formatting your document. IEEE template files: https://www.ieee.org/conferences/publishing/templates.html

Authors should submit a paper maximum of 6 pages including figures and references, carefully checked for correct grammar and spelling, using the on-line submission procedure indicated below. Authors are required to include their names and affiliations in their papers.

Chairs:

  • Dr. Boussad AIT SALEM, Efrei Paris Panthéon Assas University, France. Email : boussad.ait.salem@efrei.fr
  • Pr. Riza SULAIMAN, National University of Malaysia, Malaysia. Email : riza@ukm.edu.my
  • Pr. Layth SLIMAN, Efrei Paris Panthéon Assas University , France. Email : layth.sliman@efrei.fr

Program committee members:

  • Andrea Corradini, University of Southern Denmark, Denmark
  • Andrew L. Nelson, Androtics LLC, United States
  • Anna Kononova, Heriot-Watt University, United Kingdom
  • Anne Laurent, University of Montpellier, France
  • Belgacem Benhedia, CEA, France
  • Binod Kumar Prasad, Maharastra Academy of Engineering, India
  • Carlos Alberto Ochoa Ortiz, Universidad Autónoma de Ciudad Juárez, Mexico
  • Carlos Fernandez Llatas, Universidad Politecnica de Valencia, Spain
  • Carlos Pereira, Instituto Superior de Engenharia de Coimbra, Portugal
  • Chi Kin Chow, University of Hong Kong, China
  • Charles Perez, Paris School of Business, Paris, France
  • Ernesto Exposito, Pau University, France
  • Kaori Yoshida, Kyushu Institute of Technology, Japan
  • Mario Koeppen, Kyushu Institute of Technology, Japan
  • Takoua Abdellatif, Ecole Polytechnique de Tunis, Tunisia
  • Thais Batista Federal University of Rio Grande do Norte, Brazil
  • Vasile Alecsandri, University of Bacau, Romania
  • Yamine Ait Ameur IRIT/INPT-ENSEEIHT, France
  • Karim Tamine, University of Limoges, France
  • Mehammed DAOUI, University of Tizi-ouzou, Algeria