Useful Resource
Please find useful resource for attending the conferences.
Recording Guidance
The guidance for recording and video FTP instructions is here.
Conference Program
The preliminary conference program is released. Please check program page.
Camera Ready
The Camera-ready submission for TPS is open. Please use the Author Kit to submit your final paper. Check Camera Ready page for more details.
Keynote Speaker
Keynote Speaker for CogMI
Subbarao Kambhampati
Professor, Arizona State University, USA Past President of AAAI
Keynote Speaker for TPS
Vitaly Shmatikov
Professor, Cornell University and Cornell Tech, USA
Registration is open. Please check registration page for details.
Panels Speakers
Panels Speakers
Plenary Panel: Trust, Privacy and Security in the IoT era: Can We Have All
Panel Moderator
Murat Kantarcioglu
Professor, University of Texas at Dallas, USA
Panelists (alphabetical by last name)
Elisa Bertino
Samuel Conte Professor, Purdue University, USA
Indrajit Ray
Indrajit Ray
Professor, Colorado State University, Program Director, SaTC, NSF, USA
Bhavani Thuraisingham
Bhavani Thuraisingham
Fellow of ACM, IEEE, AAAS, NAI, Founders Chair Professor, The University of Texas at Dallas, USA
Cliff Wang
Cliff Wang
IEEE Fellow, Director, Computer Science Division, ARO, Adjunct Professor, North Carolina State University, USA
Please check Panels page for details.
Extended Submission
ROUND TWO submissions is extended to Oct. 4, 2020.
2ed Round Submission
We are accepting ROUND TWO submissions due on Sept. 20, 2020.
Notice (20/7/2020)
With the COVID-19 situation we are unable to foresee the viability of the planned conference meeting in Atlanta and impossibility of relocation to a safe place due to the pandemic nature of the disease. Therefore, IEEE TPS 2020 will be a virtual conference on December 1 - 3 (North America Time). We will post the corresponding update soon.
Welcome to
TPS 2020
Welcome to 2020 The Second IEEE International Conference on Trust, Privacy and Security in Intelligent Systems, and Applications.

Keynote Speakers


What Are Machine Learning Models Hiding?

Vitaly Shmatikov
Computer Science at Cornell University and Cornell Tech USA

More information, please check Keynotes page.

Important Dates

Vision Track
  • Vision Paper Submission Oct. 20, 2020
  • Camera Ready Nov. 4, 2020
Round 2
  • Abstract Submission (optional) Sept. 12, 2020
  • Full Paper Submission Sept. 20, 2020 Oct. 4, 2020
  • Notification of Acceptance Oct. 20, 2020 Oct. 30, 2020
  • Camera Ready Nov. 10, 2020
Round 1
  • Abstract Submission (optional) June 15, 2020
  • Full Paper Submission June 22, 2020
  • Notification of Acceptance August 1, 2020
  • Camera Ready October 20, 2020

Keynote Speakers from Past Years

Conference Speakers of CIC/CogMI/TPS 2019

Jiawei Han
Abel Bliss Professor University of Illinois at Urbana-Champaign, US
Structuring of Unstructured Data: A Key to Automated Machine Intelligence
Karl Aberer
Professor Swiss Federal Institute of Technology Lausanne (EPFL), Switzerland
Making News Credible Again
Robert Yates
Distinguished Engineer IBM (Data and AI Product Group), US
Collaborating with Machines
Ashish Kundu
ACM Distinguished Member, ACM Distinguished Speaker Graphaigo Inc., US
Trusting Autonomous Vehicles


Recent advances in computing and information technologies such as IoT, mobile Edge/Cloud computing, cyber- physical-social systems, Artificial Intelligence/Machine Learning/ Deep Learning, etc., have paved way for creating next generation smart and intelligent systems and applications that can have transformative impact in our society while accelerating rapid scientific discoveries and innovations. Such newer technologies and paradigms are getting increasingly embedded in the computing platforms and networked information systems/infrastructures that form the digital foundation for our personal, organizational and social processes and activities. It is increasingly becoming critical that the trust, privacy and security issues in such digital environments are holistically addressed to ensure the safety and well-being of individuals as well as our society.

IEEE TPS-ISA is an international multidisciplinary forum for presentation of state-of-the art innovations, and discussion among academic, industrial researchers, and practitioners on issues related to trust, privacy and security in emerging smart and intelligent systems and applications.

IEEE Computer Society Open Conference Statement

Equity, Diversity, and Inclusion are central to the goals of the IEEE Computer Society and all of its conferences. Equity at its heart is about removing barriers, biases, and obstacles that impede equal access and opportunity to succeed. Diversity is fundamentally about valuing human differences and recognizing diverse talents. Inclusion is the active engagement of Diversity and Equity.

A goal of the IEEE Computer Society is to foster an environment in which all individuals are entitled to participate in any IEEE Computer Society activity free of discrimination. For this reason, the IEEE Computer Society is firmly committed to team compositions in all sponsored activities, including but not limited to, technical committees, steering committees, conference organizations, standards committees, and ad hoc committees that display Equity, Diversity, and Inclusion.

IEEE Computer Society meetings, conferences and workshops must provide a welcoming, open and safe environment, that embraces the value of every person, regardless of race, color, sex, sexual orientation, gender identity or expression, age, marital status, religion, national origin, ancestry, or disability. All individuals are entitled to participate in any IEEE Computer Society activity free of discrimination, including harassment based on any of the above factors.

IEEE Event Conduct and Safety Statement

IEEE believes that science, technology, and engineering are fundamental human activities, for which openness, international collaboration, and the free flow of talent and ideas are essential. Its meetings, conferences, and other events seek to enable engaging, thought provoking conversations that support IEEE’s core mission of advancing technology for humanity. Accordingly, IEEE is committed to providing a safe, productive, and welcoming environment to all participants, including staff and vendors, at IEEE-related events.

IEEE has no tolerance for discrimination, harassment, or bullying in any form at IEEE-related events. All participants have the right to pursue shared interests without harassment or discrimination in an environment that supports diversity and inclusion. Participants are expected to adhere to these principles and respect the rights of others.

IEEE seeks to provide a secure environment at its events. Participants should report any behavior inconsistent with the principles outlined here, to on site staff, security or venue personnel, or to