Sos Agaian (Email)
The University of Texas at San Antonio, USA
Jinshang Tang (Email)
Michigan Technological University, Houghton, MI, USA
Philip Chen (Email)
The University of Texas at San Antonio, USA
The widespread nature of multimedia processing technologies and the rapid growth of network access availability have enabled many powerful and creative applications. Digital multimedia content can be created, edited, distributed, shared, and stored with convenience at a very low cost over the mobile and ad hoc nature of today’s various networks. The use of emerging technologies and systems based on wireless networks has further facilitated the universal prevalence of multimedia data. Although these new technologies has been viewed as helping individuals to achieve better communications, this has created the possibility for malicious attackers to compromise the confidentiality, integrity and availability of information and corrupt both personal and mission-critical data. Moreover, as our dependency on digital systems keeps growing, denial of service attacks have become a growing threat. With the increasing sophistication and ubiquity of sharing and distribution of data over a plethora of networks, the complexity and challenges of untrustworthy behavior and cyber attacks represent increasing vulnerabilities. Furthermore, modern generations of programmable mobile systems are endowed with low-cost, high-resolution digital cameras and can provide new opportunities for mass deployment in applications that involve the use of multimedia content.
The goal of this technical committee is to serve the interests of its members and the community at large by encouraging the theory, practice, and interdisciplinary aspects of the art and science of information assurance & multimedia-mobile intelligent systems. The Information Assurance and Intelligent Multimedia-Mobile Communications committee aspires to help researchers and developers to exchange ideas on expanding current and building novel intelligent communications systems; to bring together researchers and engineers from all parts of the world with an active interest in the planning, design, process, management and governance of networks in the areas of multimedia-mobile communications with the center of attention on security, digital forensic authentication, transmission and detection of sensitive information via communication systems. The committee is also looking forward to motivate both the theory and applications of this research, advocate their development, disseminate state-of-the-art scientific information and resources, and to establish successful associations with the key experts from academia, industry, government, and information technology consultants.
- Interact with professionals in information assurance & intelligent multimedia-mobile communications and forensic systems that are rapidly growing research fields.
- Participate in motivating conferences and workshops.
- Form professional relationships with associates from different regions of the world.
- Exchange research ideas and sharing research resources, fostering a more effective transfer of information assurance & intelligent multimedia-mobile communications and forensic systems to large-scale applications important to people.
- Promote research, development, education, and understanding of information assurance & intelligent multimedia-mobile communications and forensic systems.
The TC shall engage in various activities that advance the goals described above, including:
- Participating in paper reviews and selecting, organization special sessions for CMS-sponsored conferences.
- Nominate lecturers for the CMS distinguished speakers program.
- Sponsor and organize specialized and focused workshops, conferences and meetings such as:
(a) International conference on Information Assurance and Digital Forensic Systems (2011, 2013)
(b) International conference on Intelligent Multimedia & Mobile Communications System (2008, 2010)
(c) International Conference on Portable Information Devices Application
(d) Information Assurance (2010, 2011, 2012).
- Organized several Special Issues for IEEE Trans. on SMC in 2010, 2012 and 2014, and one Special Issue for IEEE Systems Journal 2014.
- Organized several special sessions for IEEE conference on SMC: 2010, 2011, 2012, 2016.
- TC members published two books in 2013 and in 2016.
- Took active starring role on creating a new joint SMC-AES chapter, 2015.
- Chris Adams, Buckingham University, UK
- Yushin Ahn, Michigan Technological University, USA
- Igor Aizenberg, Texas A&M University-Texarkana, USA
- David Akopian, The University of Texas, San Antonio, USA
- Naseer Al-Jawad, Buckingham University, UK
- Aram Arakelyan, Yerevan State University, Armenia
- Patrick Baier, George Washington University, USA
- Long Bao, Tufts University, USA
- Laura Brown, Michigan Technological University, USA
- Patrizio Campisi, University of Roma Tre, Italy
- Mehmet Celenk, Ohio University, USA
- Chang Wen Chen, Florida Institute of Technology, USA
- Ravindranath C. Cherukuri, Trinity Institute of Technology and Research, India
- Reiner Creutzburg, Fachhochschule Brandenburg University of Applied Sciences, Germany
- Yingzi (Eliza) Du, Indiana University, Indianapolis, USA
- Frederic Dufaux, Ecole Polytechnique Federal De Lausanne, Switzerland
- Touradj Ebrahimi, Ecole Polytechnique Federal De Lausanne, Switzerland
- Karen Egizarian, Tampere University of Technology, Tampere, Finland
- Ayman El-Baz, University of Louisville USA
- Erlan H. Feria, College of Staten Island of the City University of New York, USA
- Chunming Gao, Michigan Technological University, USA
- Phalguni Gupta, Indian Institute of Technology Kanpur, India
- Aaron Greenblatt, Stanford University, USA
- Artyom M Grigoryan, The University of Texas, San Antonio, USA
- Zilong Hu, Michigan Technological University, USA
- Sabah Jassim, University of Buckigham, UK
- Shreyas Kamath, The University of Texas, San Antonio, USA
- Gevorg Karapetyan, The National Academy of Sciences, Republic of Armenia
- Liang Lei, Chongqing University of Science and Technology, China
- Eugene Levin, Michigan Technological University, USA
- Shujun Li, University of Surrey
- Chih-Min Lin, Yuan-Ze University, Taiwan
- Jun Liu, Wuhan University of Science and Technology, China
- Xuan Liu, New Jersey Institute of Technology, USA
- Vladimir Marchuk, Don State Technical University, Russia
- Khader Mohammad, Birzeit University, Palestine
- Clara Mosquera-Lopez, Intel, USA
- Shahan Nercessian, Lincoln Lab USA
- Alessandro Neri, University Roma Tre, Italy
- Hideki Noda, Kyushu Institute of Technology, Japan
- Joseph P. Noonan, Tufts University, USA
- Karen A. Panetta, Tufts University, USA
- William Perry, Western Carolina University, USA
- Gilbert Peterson, Air Force Institute of Technology, USA
- Srijith Rajeev, The University of Texas, San Antonio, USA
- Rahul Rajendran, The University of Texas, San Antonio, USA
- Shishir Paramathma Rao, The University of Texas, San Antonio, USA
- Mehdi Roopaei, Azad University, Iran
- Hani H. Saleh, Khalifa University, The United Arab Emirates
- Arash Samani, Tufts University USA
- Hakob Sarukhanyan, The National Academy of Sciences , Republic of Armenia
- Youri Shukurian, The National Academy of Sciences of the Republic of Armenia, Armenia
- Hassan Takabi, University of North Texas, USA
- Jinshan Tang, Michigan Technological University, USA
- Viacheslav Voronin, Don State Technical University, Russia
- Qianwen Wan, Tufts University, USA
- Gregory B. White, The University of Texas, San Antonio, USA
- Yue Wu, Information Sciences Institute at University of South California, USA
- Xin Xu, Wuhan University of Science and Technology, China
- Xiaohui Yuan, University of North Texas, Denton, USA
- Xiaojing Yuan, University of Houston, USA
- Kai Zhang, Wuhan University of Science and Technology
- XiaoLong Zhang, Wuhan University of Science and Technology, China
- Huiyu Zhou, Queen’s University of Belfast, UK
- Yicong Zhou, University of Macau, China