Ranking & Metrics Conference Call for Papers Other Conferences in United States
CCS 2021 : ACM Symposium on Computer and Communications Security

CCS 2021 : ACM Symposium on Computer and Communications Security

Seoul , South Korea

Submission Deadline: Monday 20 Jan 2020

Conference Dates: Nov 14, 2021 - Nov 14, 2021

Research
Impact Score 16.30

OFFICIAL WEBSITE

Conference Organizers: Deadline extended?
Click here to edit

Ranking & Metrics Impact Score is a novel metric devised to rank conferences based on the number of contributing the best scientists in addition to the h-index estimated from the scientific papers published by the best scientists. See more details on our methodology page.

Research Impact Score: 16.30
Contributing Best Scientists: 319
H5-index:
Papers published by Best Scientists 467
Research Ranking (Computer Science) 14
Research Ranking (Electronics and Electrical Engineering) 182

Conference Call for Papers

The 28th ACM Conference on Computer and Communications Security (CCS) seeks submissions presenting novel contributions related to all real-world aspects of computer security and privacy. Theoretical papers must make a convincing case for the relevance of their results to practice. Authors are encouraged to write the abstract and introduction of their paper in a way that makes the results accessible and compelling to a general computer-security researcher. In particular, authors should bear in mind that anyone on the program committee may be asked to review any paper.

As in 2019, CCS will have two review cycles in 2020. For each submission, one of the following decisions will be made:

Accept: Papers in this category will be accepted for publication in the proceedings and presentation at the conference, possibly after making minor changes with the oversight of a shepherd.
Major Revision: Papers in this category are considered to be promising but need additional work (e.g., new experiments, proofs, or implementations). Authors will be given the opportunity to resubmit such papers, with appropriate revisions, in which case they should clearly explain in a well-marked appendix how the revisions address the comments of the reviewers. The revised paper will then be re-evaluated, and either accepted or rejected.
Reject: Papers in this category are declined for inclusion in the conference. Papers rejected from the first review cycle may not be submitted again (even in revised form) to the second review cycle.

Overview

Top Research Topics at Computer and Communications Security?

  • Computer security (40.32%)
  • Theoretical computer science (9.82%)
  • Encryption (9.46%)

The discussions in Computer and Communications Security mainly cover the fields of Computer security, Theoretical computer science, Encryption, Cryptography and Computer network. The Computer security works featured in the conference incorporate elements from The Internet and Internet privacy. It primarily discusses Encryption topics, particularly Public-key cryptography, Ciphertext and Attribute-based encryption.

It features Authentication research that overlaps with concepts in Password.

What are the most cited papers published at the conference?

  • Random oracles are practical: a paradigm for designing efficient protocols (4203 citations)
  • Attribute-based encryption for fine-grained access control of encrypted data (3725 citations)
  • A key-management scheme for distributed sensor networks (3455 citations)

Research areas of the most cited articles at Computer and Communications Security:

Computer security, Encryption, Theoretical computer science, Cryptography and Computer network are the main subjects of interest in the most cited publications. The most cited publications tackle studies in Android (operating system) and the interrelated subject of Permission to gain insights into Computer security. The featured Computer network studies in the published articles mainly concentrate on Distributed computing but also cover areas of interest in Scalability.

What topics the last edition of the conference is best known for?

  • Operating system
  • The Internet
  • Law

The previous edition focused in particular on these issues:

The scientific interests tackled in Computer and Communications Security are Computer security, Artificial intelligence, Machine learning, Protocol (object-oriented programming) and Encryption. It concentrated on Computer security research, specifically Malware, Password and Exploit. It connects the study in Artificial intelligence with the closely related area of Key (cryptography).

Some problems in Protocol (object-oriented programming) that were presented in it overlapped with concepts under Hash function, Theoretical computer science and Overhead (computing). Studies on Deep learning discussed in it link to the field of Data mining.

The most cited articles from the last conference are:

  • Targeting the Weakest Link: Social Engineering Attacks in Ethereum Smart Contracts (5 citations)
  • DeepSweep: An Evaluation Framework for Mitigating DNN Backdoor Attacks using Data Augmentation (4 citations)
  • BugGraph: Differentiating Source-Binary Code Similarity with Graph Triplet-Loss Network (4 citations)

Papers citation over time

A key indicator for each conference is its effectiveness in reaching other researchers with the papers published at that venue.

The chart below presents the interquartile range (first quartile 25%, median 50% and third quartile 75%) of the number of citations of articles over time.

Research.com

The top authors publishing at Computer and Communications Security (based on the number of publications) are:

  • Elisa Bertino (38 papers) published 1 paper at the last edition the same number as at the previous edition,
  • Michael K. Reiter (38 papers) published 1 paper at the last edition,
  • Ari Juels (36 papers) absent at the last edition,
  • Michael Backes (36 papers) published 1 paper at the last edition the same number as at the previous edition,
  • Ahmad-Reza Sadeghi (34 papers) absent at the last edition.

The overall trend for top authors publishing at this conference is outlined below. The chart shows the number of publications at each edition of the conference for top authors.

Research.com

Only papers with recognized affiliations are considered

The top affiliations publishing at Computer and Communications Security (based on the number of publications) are:

  • IBM (130 papers) absent at the last edition,
  • Purdue University (128 papers) published 5 papers at the last edition, 3 less than at the previous edition,
  • Microsoft (122 papers) published 3 papers at the last edition, 4 less than at the previous edition,
  • University of California, Berkeley (103 papers) published 2 papers at the last edition, 5 less than at the previous edition,
  • University of Illinois at Urbana–Champaign (100 papers) published 2 papers at the last edition, 5 less than at the previous edition.

The overall trend for top affiliations publishing at this conference is outlined below. The chart shows the number of publications at each edition of the conference for top affiliations.

Research.com

Publication chance based on affiliation

The publication chance index shows the ratio of articles published by the best research institutions at the conference edition to all articles published within that conference. The best research institutions were selected based on the largest number of articles published during all editions of the conference.

The chart below presents the percentage ratio of articles from top institutions (based on their ranking of total papers).Top affiliations were grouped by their rank into the following tiers: top 1-10, top 11-20, top 21-50, and top 51+. Only articles with a recognized affiliation are considered.

Research.com

During the most recent 2021 edition, 6.20% of publications had an unrecognized affiliation. Out of the publications with recognized affiliations, 15.70% were posted by at least one author from the top 10 institutions publishing at the conference. Another 5.79% included authors affiliated with research institutions from the top 11-20 affiliations. Institutions from the 21-50 range included 16.53% of all publications and 61.98% were from other institutions.

Returning Authors Index

A very common phenomenon observed among researchers publishing scientific articles is the intentional selection of conferences they have already attended in the past. In particular, it is worth analyzing the case when the authors participate in the same conference from year to year.

The Returning Authors Index presented below illustrates the ratio of authors who participated in both a given as well as the previous edition of the conference in relation to all participants in a given year.

Research.com

Returning Institution Index

The graph below shows the Returning Institution Index, illustrating the ratio of institutions that participated in both a given and the previous edition of the conference in relation to all affiliations present in a given year.

Research.com

The experience to innovation index

Our experience to innovation index was created to show a cross-section of the experience level of authors publishing at a conference. The index includes the authors publishing at the last edition of a conference, grouped by total number of publications throughout their academic career (P) and the total number of citations of these publications ever received (C).

The group intervals were selected empirically to best show the diversity of the authors' experiences, their labels were selected as a convenience, not as judgment. The authors were divided into the following groups:

  • Novice - P < 5 or C < 25 (the number of publications less than 5 or the number of citations less than 25),
  • Competent - P < 10 or C < 100 (the number of publications less than 10 or the number of citations less than 100),
  • Experienced - P < 25 or C < 625 (the number of publications less than 25 or the number of citations less than 625),
  • Master - P < 50 or C < 2500 (the number of publications less than 50 or the number of citations less than 2500),
  • Star - P ≥ 50 and C ≥ 2500 (both the number of publications greater than 50 and the number of citations greater than 2500).

Research.com

The chart below illustrates experience levels of first authors in cases of publications with multiple authors.

Research.com

Other Conferences in South Korea

11th International Conference on Power Electronics - ECCE Asia

May 22, 2023 - May 25, 2025

Jeju Island , South Korea, South Korea

Deadline: Friday 21 Oct 2022

11th International Conference on Power Electronics

May 22, 2023 - May 25, 2023

Jeju , South Korea, South Korea

Deadline: Friday 21 Oct 2022

IEEE International Conference on Big Data and Smart Computing

Feb 13, 2023 - Feb 16, 2023

Jeju , South Korea, South Korea

Deadline: Friday 14 Oct 2022

International Conference on Big Data and Smart Computing

Feb 13, 2023 - Feb 16, 2023

Jeju , South Korea, South Korea

Deadline: Friday 14 Oct 2022

International Conference on  Big Data and Smart Computing

Feb 13, 2023 - Feb 16, 2023

Jeju , South Korea, South Korea

Deadline: Friday 14 Oct 2022

Previous Editions

Something went wrong. Please try again later.