Special lssues
Table of Content

Unveiling the Role of AIGC, Large Models, and Human - Centric Insights in Digital Defense

Submission Deadline: 31 May 2024 Submit to Special Issue

Guest Editors

Dr. Affan Yasin, Northwestern Polytechnical University (NPU), China
Prof. Zhili Zhou, Guangzhou University, China
Prof. Weizhi Meng, Technical University of Denmark (DUT), Denmark
Dr. Javed Ali Khan, University of Hertfordshire, UK
Dr. Chen Qian, Tsinghua y University, China

Summary

As digital technologies and internet-connected systems become ubiquitous across public, private, and commercial spheres, new cybersecurity threats seem to emerge daily. Recent high-profile hacks and data breaches demonstrate the growing sophistication of malicious actors and the inability of conventional cyber defenses to keep pace. Clearly we need more innovative, proactive approaches to enhance digital security in the modern hyperconnected world. This requires moving beyond siloed disciplinary perspectives and leveraging insights across computing, social sciences, business, law, and humanities.

 

This special issue aims to catalyze fresh interdisciplinary collaborations and perspectives to strengthen the reliability, resilience, and trustworthiness of our digital ecosystems against misuse and attack. We seek to break down traditional academic barriers and synthesise diverse vantage points on bolstering cyber defenses while maintaining ethics, privacy, and human values. The latest advances in adversarial machine learning, decentralized blockchain architectures, risk modeling, behavioral psychology, and regulation all have important roles to play. By fostering creative cross-pollination between these fields, we hope to spur promising new directions for research and practice.

 

Possible topics for study submission and are not limited to those listed below.

 

1. Technical Approaches

(1) Artificial intelligence security applications

(2) Cross-model generative models and foundation models

(3) Copyright protection of Artificial Intelligence Generated Content (AIGC)

(4) Adversarial machine learning

(5) Production and Detection of AIGC

(6) Adversarial attacks in AIGC

(7) Privacy protection in AIGC

(8) Identity authentication in AIGC

(9) Digital forensics for AIGC

 

2. Deception technology

 

3. Social Engineering / Human Factor

(1) Behavioral Methods

(2) Human factors in cybersecurity (Phishing Attacks, Smishing, Vishing, Phishing  etc)

(3) Usable security

(4) Social engineering defenses

 

4. Other Topics

(1) Game design and theory

(2) Privacy enhancing technologies Or theory

(3) Cybercrime deterrence and Policy


Keywords

Artificial Intelligence Generated Content (AIGC), Social Engineering, Phishing Attack, Digital Defence

Share Link