<div dir="ltr"><p class="MsoNormal" align="center" style="text-align:center;margin:0cm 0cm 10pt;font-size:12pt;font-family:Cambria,serif"><span style="font-family:"Times New Roman",serif;font-size:12pt">We
apology for possible cross posting, and thank you for distributing this CFP</span><br></p>

<p class="MsoNormal" style="margin:0cm 0cm 10pt;font-size:12pt;font-family:Cambria,serif"><span lang="EN-US" style="font-family:"Times New Roman",serif">--</span></p>

<p class="MsoNormal" style="margin:0cm 0cm 10pt;font-size:12pt;font-family:Cambria,serif"><b><span lang="EN-US" style="font-family:"Times New Roman",serif">Please refer to </span></b></p>

<p class="MsoNormal" style="margin:0cm 0cm 10pt;font-size:12pt;font-family:Cambria,serif"><span class="gmail-MsoHyperlink" style="color:blue;text-decoration-line:underline"><b><span lang="EN-US" style="font-family:"Times New Roman",serif"><a href="http://infocom2019.ieee-infocom.org/workshop-security-and-privacy-big-data">http://infocom2019.ieee-infocom.org/workshop-security-and-privacy-big-data</a></span></b></span><b><span lang="EN-US" style="font-family:"Times New Roman",serif"></span></b></p>

<p class="MsoNormal" style="margin:0cm 0cm 10pt;font-size:12pt;font-family:Cambria,serif"><span lang="EN-US" style="font-size:10pt;font-family:"Times New Roman",serif"> </span></p>

<p class="MsoNormal" style="text-align:justify;margin:0cm 0cm 10pt;font-size:12pt;font-family:Cambria,serif"><b><span lang="EN-US" style="font-family:"Times New Roman",serif">Scope
and Topics of Interest</span></b></p>

<p style="text-align:justify;margin:0cm 0cm 0.0001pt;font-size:12pt;font-family:"Times New Roman",serif"><span lang="EN-US">As
we are deep into the Information Age, we also witness the explosive growth of
data available on the Internet. For example, human beings create about 2.5
quintillion bytes of data every day in 2012, which come from sensors,
individual archives, social networks, Internet of Things, enterprise and
Internet in all scales and formats. We face one of the most challenging issues,
i.e., how to effectively manage such a large amount of data and identify new
ways to analyze large amounts of data and unlock information. The issue is also
known as Big Data, which has been emerging as a hot topic in Information and
Communication Technologies (ICT) research.</span><span lang="EN-US"> </span><span lang="EN-US"></span></p>

<p style="text-align:justify;margin:0cm 0cm 0.0001pt;font-size:12pt;font-family:"Times New Roman",serif"><span lang="EN-US"> </span></p>

<p style="text-align:justify;margin:0cm 0cm 0.0001pt;font-size:12pt;font-family:"Times New Roman",serif"><span lang="EN-US">Security
and privacy issue is critical for Big Data. Many works have been carried out
focusing on business, application and information processing level from big
data, such as data mining and analysis.  However,
security and privacy issues in Big Data are seldom mentioned to date. Due to
its extraordinary scale, security and privacy in Big Data faces many
challenges, such as efficient encryption and decryption algorithms, encrypted
information retrieval, attribute based encryption, attacks on availability,
reliability and integrity of Big Data. </span></p>

<p style="text-align:justify;margin:0cm 0cm 0.0001pt;font-size:12pt;font-family:"Times New Roman",serif"><span lang="EN-US"> </span></p>

<p class="MsoNormal" style="text-align:justify;margin:0cm 0cm 10pt;font-size:12pt;font-family:Cambria,serif"><span lang="EN-US" style="font-family:"Times New Roman",serif">The purpose of this
workshop is to offer a timely venue for researchers and industry partners to
present and discuss their latest results in security and privacy related work
of Big Data.  </span></p>

<p class="MsoNormal" style="text-align:justify;margin:0cm 0cm 10pt;font-size:12pt;font-family:Cambria,serif"><span lang="EN-US" style="font-family:"Times New Roman",serif">The topics of interest
include, <b>but are not limited to</b>:  </span></p>

<p class="gmail-MsoListParagraphCxSpFirst" style="margin:0cm 0cm 0.0001pt 36pt;text-align:justify;font-size:12pt;font-family:Cambria,serif"><span lang="EN-US" style="font-family:Symbol">·<span style="font-variant-numeric:normal;font-variant-east-asian:normal;font-stretch:normal;font-size:7pt;line-height:normal;font-family:"Times New Roman"">       </span></span><span lang="EN-US" style="font-family:"Times New Roman",serif">Threat and Vulnerability
Analysis</span><span lang="EN-US" style="font-family:"Times New Roman",serif"> in Big Data</span></p>

<p class="gmail-MsoListParagraphCxSpMiddle" style="margin:0cm 0cm 0.0001pt 36pt;text-align:justify;font-size:12pt;font-family:Cambria,serif"><span lang="EN-US" style="font-family:Symbol">·<span style="font-variant-numeric:normal;font-variant-east-asian:normal;font-stretch:normal;font-size:7pt;line-height:normal;font-family:"Times New Roman"">       </span></span><span lang="EN-US" style="font-family:"Times New Roman",serif">Architecture for Security and Privacy in Big Data</span></p>

<p class="gmail-MsoListParagraphCxSpMiddle" style="margin:0cm 0cm 0.0001pt 36pt;text-align:justify;font-size:12pt;font-family:Cambria,serif"><span lang="EN-US" style="font-family:Symbol">·<span style="font-variant-numeric:normal;font-variant-east-asian:normal;font-stretch:normal;font-size:7pt;line-height:normal;font-family:"Times New Roman"">       </span></span><span lang="EN-US" style="font-family:"Times New Roman",serif">Encrypted Information Retrieval in Big Data</span></p>

<p class="gmail-MsoListParagraphCxSpMiddle" style="margin:0cm 0cm 0.0001pt 36pt;text-align:justify;font-size:12pt;font-family:Cambria,serif"><span lang="EN-US" style="font-family:Symbol">·<span style="font-variant-numeric:normal;font-variant-east-asian:normal;font-stretch:normal;font-size:7pt;line-height:normal;font-family:"Times New Roman"">       </span></span><span lang="EN-US" style="font-family:"Times New Roman",serif">Cryptanalysis and
Applications</span><span lang="EN-US" style="font-family:"Times New Roman",serif"> in Big Data</span></p>

<p class="gmail-MsoListParagraphCxSpMiddle" style="margin:0cm 0cm 0.0001pt 36pt;text-align:justify;font-size:12pt;font-family:Cambria,serif"><span lang="EN-US" style="font-family:Symbol">·<span style="font-variant-numeric:normal;font-variant-east-asian:normal;font-stretch:normal;font-size:7pt;line-height:normal;font-family:"Times New Roman"">       </span></span><span lang="EN-US" style="font-family:"Times New Roman",serif">Lightweight
Cryptographic Algorithms </span><span lang="EN-US" style="font-family:"Times New Roman",serif">in Big Data</span></p>

<p class="gmail-MsoListParagraphCxSpMiddle" style="margin:0cm 0cm 0.0001pt 36pt;text-align:justify;font-size:12pt;font-family:Cambria,serif"><span lang="EN-US" style="font-family:Symbol">·<span style="font-variant-numeric:normal;font-variant-east-asian:normal;font-stretch:normal;font-size:7pt;line-height:normal;font-family:"Times New Roman"">       </span></span><span lang="EN-US" style="font-family:"Times New Roman",serif">Trust in Big Data</span></p>

<p class="gmail-MsoListParagraphCxSpMiddle" style="margin:0cm 0cm 0.0001pt 36pt;text-align:justify;font-size:12pt;font-family:Cambria,serif"><span lang="EN-US" style="font-family:Symbol">·<span style="font-variant-numeric:normal;font-variant-east-asian:normal;font-stretch:normal;font-size:7pt;line-height:normal;font-family:"Times New Roman"">       </span></span><span lang="EN-US" style="font-family:"Times New Roman",serif">Network Security, Privacy in Big Data</span></p>

<p class="gmail-MsoListParagraphCxSpMiddle" style="margin:0cm 0cm 0.0001pt 36pt;text-align:justify;font-size:12pt;font-family:Cambria,serif"><span lang="EN-US" style="font-family:Symbol">·<span style="font-variant-numeric:normal;font-variant-east-asian:normal;font-stretch:normal;font-size:7pt;line-height:normal;font-family:"Times New Roman"">       </span></span><span lang="EN-US" style="font-family:"Times New Roman",serif">Network Forensics in Big Data</span></p>

<p class="gmail-MsoListParagraphCxSpMiddle" style="margin:0cm 0cm 0.0001pt 36pt;text-align:justify;font-size:12pt;font-family:Cambria,serif"><span lang="EN-US" style="font-family:Symbol">·<span style="font-variant-numeric:normal;font-variant-east-asian:normal;font-stretch:normal;font-size:7pt;line-height:normal;font-family:"Times New Roman"">       </span></span><span lang="EN-US" style="font-family:"Times New Roman",serif">Anonymous Communication in Big Data</span></p>

<p class="gmail-MsoListParagraphCxSpMiddle" style="margin:0cm 0cm 0.0001pt 36pt;text-align:justify;font-size:12pt;font-family:Cambria,serif"><span lang="EN-US" style="font-family:Symbol">·<span style="font-variant-numeric:normal;font-variant-east-asian:normal;font-stretch:normal;font-size:7pt;line-height:normal;font-family:"Times New Roman"">       </span></span><span lang="EN-US" style="font-family:"Times New Roman",serif">Physical Layer Security</span><span lang="EN-US" style="font-family:"Times New Roman",serif"> in Big Data</span></p>

<p class="gmail-MsoListParagraphCxSpMiddle" style="margin:0cm 0cm 0.0001pt 36pt;text-align:justify;font-size:12pt;font-family:Cambria,serif"><span lang="EN-US" style="font-family:Symbol">·<span style="font-variant-numeric:normal;font-variant-east-asian:normal;font-stretch:normal;font-size:7pt;line-height:normal;font-family:"Times New Roman"">       </span></span><span lang="EN-US" style="font-family:"Times New Roman",serif">Privacy and Security in
Cloud</span><span lang="EN-US" style="font-family:"Times New Roman",serif"> Data</span></p>

<p class="gmail-MsoListParagraphCxSpMiddle" style="margin:0cm 0cm 0.0001pt 36pt;text-align:justify;font-size:12pt;font-family:Cambria,serif"><span lang="EN-US" style="font-family:Symbol">·<span style="font-variant-numeric:normal;font-variant-east-asian:normal;font-stretch:normal;font-size:7pt;line-height:normal;font-family:"Times New Roman"">       </span></span><span lang="EN-US" style="font-family:"Times New Roman",serif">Privacy and Security in</span><span lang="EN-US" style="font-family:"Times New Roman",serif">
</span><span lang="EN-US" style="font-family:"Times New Roman",serif">Data Center</span><span lang="EN-US" style="font-family:"Times New Roman",serif">
Networks</span><span lang="EN-US" style="font-family:"Times New Roman",serif"></span></p>

<p class="gmail-MsoListParagraphCxSpMiddle" style="margin:0cm 0cm 0.0001pt 36pt;text-align:justify;font-size:12pt;font-family:Cambria,serif"><span lang="EN-US" style="font-family:Symbol">·<span style="font-variant-numeric:normal;font-variant-east-asian:normal;font-stretch:normal;font-size:7pt;line-height:normal;font-family:"Times New Roman"">       </span></span><span lang="EN-US" style="font-family:"Times New Roman",serif">Application Level </span><span lang="EN-US" style="font-family:"Times New Roman",serif">Security and Privacy in Big Data</span></p>

<p class="gmail-MsoListParagraphCxSpMiddle" style="margin:0cm 0cm 0.0001pt 36pt;text-align:justify;font-size:12pt;font-family:Cambria,serif"><span lang="EN-US" style="font-family:Symbol">·<span style="font-variant-numeric:normal;font-variant-east-asian:normal;font-stretch:normal;font-size:7pt;line-height:normal;font-family:"Times New Roman"">       </span></span><span lang="EN-US" style="font-family:"Times New Roman",serif">Attacks and Counter Measures in Big Data</span></p>

<p class="gmail-MsoListParagraphCxSpMiddle" style="margin:0cm 0cm 0.0001pt 36pt;text-align:justify;font-size:12pt;font-family:Cambria,serif"><span lang="EN-US" style="font-family:Symbol">·<span style="font-variant-numeric:normal;font-variant-east-asian:normal;font-stretch:normal;font-size:7pt;line-height:normal;font-family:"Times New Roman"">       </span></span><span lang="EN-US" style="font-family:"Times New Roman",serif">Information Forensics in Big Data</span></p>

<p class="gmail-MsoListParagraphCxSpMiddle" style="margin:0cm 0cm 0.0001pt 36pt;text-align:justify;font-size:12pt;font-family:Cambria,serif"><span lang="EN-US" style="font-family:Symbol">·<span style="font-variant-numeric:normal;font-variant-east-asian:normal;font-stretch:normal;font-size:7pt;line-height:normal;font-family:"Times New Roman"">       </span></span><span lang="EN-US" style="font-family:"Times New Roman",serif">Secure </span><span lang="EN-US" style="font-family:"Times New Roman",serif">Cross-layer
Design </span><span lang="EN-US" style="font-family:"Times New Roman",serif">in Big Data</span></p>

<p class="gmail-MsoListParagraphCxSpMiddle" style="margin:0cm 0cm 0.0001pt 36pt;text-align:justify;font-size:12pt;font-family:Cambria,serif"><span lang="EN-US" style="font-family:Symbol">·<span style="font-variant-numeric:normal;font-variant-east-asian:normal;font-stretch:normal;font-size:7pt;line-height:normal;font-family:"Times New Roman"">       </span></span><span lang="EN-US" style="font-family:"Times New Roman",serif">Identity Management and
Key Management </span><span lang="EN-US" style="font-family:"Times New Roman",serif">in Big Data</span></p>

<p class="gmail-MsoListParagraphCxSpMiddle" style="margin:0cm 0cm 0.0001pt 36pt;text-align:justify;font-size:12pt;font-family:Cambria,serif"><span lang="EN-US" style="font-family:Symbol">·<span style="font-variant-numeric:normal;font-variant-east-asian:normal;font-stretch:normal;font-size:7pt;line-height:normal;font-family:"Times New Roman"">       </span></span><span lang="EN-US" style="font-family:"Times New Roman",serif">Intrusion Detection and
Response</span><span lang="EN-US" style="font-family:"Times New Roman",serif"> in Big Data</span></p>

<p class="gmail-MsoListParagraphCxSpMiddle" style="margin:0cm 0cm 0.0001pt 36pt;text-align:justify;font-size:12pt;font-family:Cambria,serif"><span lang="EN-US" style="font-family:Symbol">·<span style="font-variant-numeric:normal;font-variant-east-asian:normal;font-stretch:normal;font-size:7pt;line-height:normal;font-family:"Times New Roman"">       </span></span><span lang="EN-US" style="font-family:"Times New Roman",serif">Security and Privacy in Complex Networks</span></p>

<p class="gmail-MsoListParagraphCxSpMiddle" style="margin:0cm 0cm 0.0001pt 36pt;text-align:justify;font-size:12pt;font-family:Cambria,serif"><span lang="EN-US" style="font-family:Symbol">·<span style="font-variant-numeric:normal;font-variant-east-asian:normal;font-stretch:normal;font-size:7pt;line-height:normal;font-family:"Times New Roman"">       </span></span><span lang="EN-US" style="font-family:"Times New Roman",serif">Malware and Virus Detection in Big Data</span></p>

<p class="gmail-MsoListParagraphCxSpMiddle" style="margin:0cm 0cm 0.0001pt 36pt;text-align:justify;font-size:12pt;font-family:Cambria,serif"><span lang="EN-US" style="font-family:Symbol">·<span style="font-variant-numeric:normal;font-variant-east-asian:normal;font-stretch:normal;font-size:7pt;line-height:normal;font-family:"Times New Roman"">       </span></span><span lang="EN-US" style="font-family:"Times New Roman",serif">Biometric Security and Forensics</span><span lang="EN-US" style="font-family:"Times New Roman",serif"> in Big Data</span></p>

<p class="gmail-MsoListParagraphCxSpMiddle" style="margin:0cm 0cm 0.0001pt 36pt;text-align:justify;font-size:12pt;font-family:Cambria,serif"><span lang="EN-US" style="font-family:Symbol">·<span style="font-variant-numeric:normal;font-variant-east-asian:normal;font-stretch:normal;font-size:7pt;line-height:normal;font-family:"Times New Roman"">       </span></span><span lang="EN-US" style="font-family:"Times New Roman",serif">Reliability and Availability in Big Data</span></p>

<p class="gmail-MsoListParagraphCxSpMiddle" style="margin:0cm 0cm 0.0001pt 36pt;text-align:justify;font-size:12pt;font-family:Cambria,serif"><span lang="EN-US" style="font-family:Symbol">·<span style="font-variant-numeric:normal;font-variant-east-asian:normal;font-stretch:normal;font-size:7pt;line-height:normal;font-family:"Times New Roman"">       </span></span><span lang="EN-US" style="font-family:"Times New Roman",serif">Network Security in Big Data</span></p>

<p class="gmail-MsoListParagraphCxSpMiddle" style="margin:0cm 0cm 0.0001pt 36pt;text-align:justify;font-size:12pt;font-family:Cambria,serif"><span lang="EN-US" style="font-family:Symbol">·<span style="font-variant-numeric:normal;font-variant-east-asian:normal;font-stretch:normal;font-size:7pt;line-height:normal;font-family:"Times New Roman"">       </span></span><span lang="EN-US" style="font-family:"Times New Roman",serif">Network Privacy in Big Data</span></p>

<p class="gmail-MsoListParagraphCxSpMiddle" style="margin:0cm 0cm 0.0001pt 36pt;text-align:justify;font-size:12pt;font-family:Cambria,serif"><span lang="EN-US" style="font-family:Symbol">·<span style="font-variant-numeric:normal;font-variant-east-asian:normal;font-stretch:normal;font-size:7pt;line-height:normal;font-family:"Times New Roman"">       </span></span><span lang="EN-US" style="font-family:"Times New Roman",serif">Security and Privacy Theories in Big Data</span></p>

<p class="gmail-MsoListParagraphCxSpMiddle" style="margin:0cm 0cm 0.0001pt 36pt;text-align:justify;font-size:12pt;font-family:Cambria,serif"><span lang="EN-US" style="font-family:Symbol">·<span style="font-variant-numeric:normal;font-variant-east-asian:normal;font-stretch:normal;font-size:7pt;line-height:normal;font-family:"Times New Roman"">       </span></span><span lang="EN-US" style="font-family:"Times New Roman",serif">Security, Privacy, and Trust in Cloud</span></p>

<p class="gmail-MsoListParagraphCxSpMiddle" style="margin:0cm 0cm 0.0001pt 36pt;text-align:justify;font-size:12pt;font-family:Cambria,serif"><span lang="EN-US" style="font-family:Symbol">·<span style="font-variant-numeric:normal;font-variant-east-asian:normal;font-stretch:normal;font-size:7pt;line-height:normal;font-family:"Times New Roman"">       </span></span><span lang="EN-US" style="font-family:"Times New Roman",serif">Security, Privacy, and Trust in Large Scale Systems</span></p>

<p class="gmail-MsoListParagraphCxSpLast" style="margin:0cm 0cm 0.0001pt 36pt;text-align:justify;font-size:12pt;font-family:Cambria,serif"><span lang="EN-US" style="font-family:"Times New Roman",serif"> </span></p>

<p class="MsoNormal" style="margin:0cm 0cm 0.0001pt;text-align:justify;font-size:12pt;font-family:Cambria,serif"><i><span lang="EN-US" style="font-family:"Times New Roman",serif"> </span></i></p>

<p class="MsoNormal" style="margin:0cm 0cm 0.0001pt;text-align:justify;font-size:12pt;font-family:Cambria,serif"><b><span lang="EN-US" style="font-family:"Times New Roman",serif">General Co-chairs</span></b></p>

<p class="MsoNormal" style="margin:0cm 0cm 0.0001pt;text-align:justify;font-size:12pt;font-family:Cambria,serif"><span lang="EN-US" style="font-family:"Times New Roman",serif">Professor Nirwan Ansari, New Jersey Institute of
Technology, USA</span></p>

<p class="MsoNormal" style="margin:0cm 0cm 0.0001pt;text-align:justify;font-size:12pt;font-family:Cambria,serif"><span lang="EN-US" style="font-family:"Times New Roman",serif">Dr Chonggang Wang, </span><span lang="EN-US" style="font-family:"Times New Roman",serif;color:black;background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial">InterDigital
Communications</span><span lang="EN-US" style="font-family:"Times New Roman",serif">,
USA<span class="gmail-MsoHyperlink" style="color:blue;text-decoration-line:underline"><span style="color:black;background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial;text-decoration-line:none"> </span></span> </span></p>

<p class="MsoNormal" style="margin:0cm 0cm 0.0001pt;text-align:justify;font-size:12pt;font-family:Cambria,serif"><span lang="EN-US" style="font-family:"Times New Roman",serif"> </span></p>

<p class="MsoNormal" style="margin:0cm 0cm 0.0001pt;text-align:justify;font-size:12pt;font-family:Cambria,serif"><b><span lang="EN-US" style="font-family:"Times New Roman",serif">Technical Program Co-chairs</span></b></p>

<p class="MsoNormal" style="margin:0cm 0cm 0.0001pt;text-align:justify;font-size:12pt;font-family:Cambria,serif"><span lang="EN-US" style="font-family:"Times New Roman",serif">Professor Shui Yu, University of Technology Sydney,
Australia</span></p>

<p class="MsoNormal" style="margin:0cm 0cm 0.0001pt;text-align:justify;font-size:12pt;font-family:Cambria,serif"><span lang="EN-US" style="font-family:"Times New Roman",serif">Professor Ke Liu, National Natural Science
Foundation of China, China</span></p>

<p class="MsoNormal" style="margin:0cm 0cm 0.0001pt;text-align:justify;font-size:12pt;font-family:Cambria,serif"><span lang="EN-US" style="font-family:"Times New Roman",serif"> </span></p>

<p class="MsoNormal" style="margin:0cm 0cm 0.0001pt;text-align:justify;font-size:12pt;font-family:Cambria,serif"><b><span lang="EN-US" style="font-family:"Times New Roman",serif">Submission Instruction</span></b></p>

<p class="MsoNormal" style="margin:0cm 0cm 10pt;font-size:12pt;font-family:Cambria,serif"><span lang="EN-US" style="font-family:"Times New Roman",serif">We call for original and unpublished papers no
longer than 6 pages. The reviews will be single blind. The manuscripts should
be formatted in standard IEEE camera-ready format (double-column, 10-pt font)
and be submitted as PDF files (formatted for 8.5x11-inch paper). The submission
url is</span><span lang="EN-US" style="color:rgb(31,73,125)"> </span><span class="gmail-MsoHyperlink" style="color:blue;text-decoration-line:underline"><span lang="EN-US"><a href="https://protect-au.mimecast.com/s/lBqzCXLWMAf3kBZF6PUgA?domain=edas.info" style="color:blue">https://www.edas.info/?c=25581</a></span></span><span lang="EN-US" style="font-family:"Times New Roman",serif"> </span><span lang="EN-US" style="font-size:11pt;color:rgb(31,73,125)"></span></p>

<p class="MsoNormal" style="margin:0cm 0cm 0.0001pt;text-align:justify;font-size:12pt;font-family:Cambria,serif"><span lang="EN-US" style="font-family:"Times New Roman",serif"> </span></p>

<p class="MsoNormal" style="margin:0cm 0cm 0.0001pt;text-align:justify;font-size:12pt;font-family:Cambria,serif"><b><span lang="EN-US" style="font-family:"Times New Roman",serif">Important Dates</span></b></p>

<p class="MsoNormal" style="margin:0cm 0cm 0.0001pt;text-align:justify;font-size:12pt;font-family:Cambria,serif"><span lang="EN-US" style="font-family:"Times New Roman",serif">Submission Deadline:  December 30, 2018 </span></p>

<p class="MsoNormal" style="margin:0cm 0cm 0.0001pt;text-align:justify;font-size:12pt;font-family:Cambria,serif"><span lang="EN-US" style="font-family:"Times New Roman",serif">Authors Notification:   February 22,  2019</span></p>

<p class="MsoNormal" style="margin:0cm 0cm 0.0001pt;text-align:justify;font-size:12pt;font-family:Cambria,serif"><span lang="EN-US" style="font-family:"Times New Roman",serif">Final Manuscript Due: March 10,      2019</span></p>

<p class="MsoNormal" style="margin:0cm 0cm 0.0001pt;text-align:justify;font-size:12pt;font-family:Cambria,serif"><span lang="EN-US" style="font-family:"Times New Roman",serif"> </span></p>

<p class="MsoNormal" style="margin:0cm 0cm 0.0001pt;text-align:justify;font-size:12pt;font-family:Cambria,serif"><span lang="EN-US" style="font-family:"Times New Roman",serif">Inquiries
should be submitted to Dr Shui Yu (Shui.Yu AT <a href="http://uts.edu.au">uts.edu.au</a>) </span></p>

<p class="MsoNormal" style="margin:0cm 0cm 0.0001pt;text-align:justify;font-size:12pt;font-family:Cambria,serif"><span lang="EN-US" style="font-family:"Times New Roman",serif"> </span></p><div><br></div>-- <br><div dir="ltr" class="gmail_signature" data-smartmail="gmail_signature"><div dir="ltr"><div><div dir="ltr"><p style="MARGIN:0cm 0cm 0pt"><span><span><font size="3" face="Calibri"></font></span></span></p>
<p style="MARGIN:0cm 0cm 0pt"><span><span><font size="3"><font face="Calibri"></font></font></span></span></p>
<p style="MARGIN:0cm 0cm 0pt"><span><span><font size="3"><font face="Calibri">-----------------------------</font></font></span></span></p>
<p style="MARGIN:0cm 0cm 0pt"><span><span><font size="3"><font face="Calibri">Shui YU, PhD,  Professor</font></font></span></span></p><p>Editor for </p><p>IEEE
Communications Surveys and Tutorials,</p><p>IEEE Transactions on
Computational Social Systems, </p><p><span style="font-size:12.8px">IEEE Comm Letters, </span>IEEE Access, </p><p style="MARGIN:0cm 0cm 0pt">



</p><p>IEEE Internet of Things Journal,
IEEE Communication Magazine, </p><p>Elsevier Journal of Network and Computer Applications.</p>
<p style="MARGIN:0cm 0cm 0pt"><span><span><font size="3"><font face="Calibri">School of Software, University of Technology Sydney, </font></font></span></span></p>
<p style="MARGIN:0cm 0cm 0pt"><span><span><font size="3"><font face="Calibri">Sydney,<span>  </span>Australia.</font></font></span></span></p>
<p style="MARGIN:0cm 0cm 0pt"><a href="http://www.deakin.edu.au/~syu" style="font-family:Calibri;font-size:medium" target="_blank">http://www.nsp.org.au/syu</a>/ <br></p></div></div></div></div></div>