[Download the PDF Call for Papers]
The ubiquity of technologies such as wireless communications, biometric identification systems, on-line data repositories, and smart electricity grids, has created new challenges in information security and privacy. Traditional approaches based on cryptography are far from adequate in such complex systems and fundamentally new techniques must be developed. Control and Information theory provide fundamental limits that can guide the development of methods for addressing these challenges. Historically, both Systems and Control and the Information Theory communities have developed independent approaches to deal with the issue of security and privacy. But various emerging applications require tools from both theories to be used in tandem. There has been relatively little effort in bringing the two fields together and have a cohesive discussion on modelling and solution approaches to security and privacy. The symposium aims to serve as such a venue that discusses the perspectives developed by both communities in a timely and productive manner.
University of Michigan
Abstract
We discuss the challenges present in cyber security problems. We examine control
and game theoretic approaches to address these challenges.
We present two control theoretic approaches based on dependency graphs and non-
probabilistic finite state machines. These models lead to Partially Observed Markov Decision Processes (POMDP) and Minmax control problems, respectively.
We consider stochastic dynamic games with asymmetric information, present a
common information approach to these games and discuss its features.
Biography
Demos Teneketzis received his Ph.D. degree in electrical engineering from the Massachusetts Institute of Technology, Cambridge, MA, USA. He is currently Professor of Electrical Engineering and Computer Science at the University of Michigan, Ann Arbor, MI, USA. His research interests are in stochastic control, decentralized systems, queueing and communication networks, stochastic scheduling and resource allocation problems, mathematical economics, and discrete-event systems.
Tuesday, November 14 | |
09:40 - 10:30 | |
ITPS-DST.1: Distinguished Speaker - Demosthenis Teneketzis, University of Michigan | |
11:00 - 12:30 | |
ITPS-O.1: Control & Information Theoretic Approaches to Privacy and Security I | |
14:00 - 15:30 | |
ITPS-O.2: Control & Information Theoretic Approaches to Privacy and Security II |
Submissions are welcome on topics including:
Notice: The IEEE Signal Processing Society enforces a “no-show” policy. Any accepted paper included in the final program is expected to have at least one author or qualified proxy attend and present the paper at the conference. Authors of the accepted papers included in the final program who do not attend the conference will be subscribed to a “No-Show List”, compiled by the Society. The “no-show” papers will not be published by IEEE on IEEEXplore or other public access forums, but these papers will be distributed as part of the on-site electronic proceedings and the copyright of these papers will belong to the IEEE.
Paper Submission Deadline | June 2, 2017 |
Review Results Announced | July 17, 2017 |
Camera-Ready Papers Due | August 5, 2017 |
Aditya Mahajan, McGill University
Ashish Khisti, University of Toronto
Rafael F. Schaefer, Technische Universität Berlin
Holger Boche, Technische Universität München
Cedric Langbort, University of Illinois, Urbana Champaign