6th International Doctoral Symposium on Applied Computation and Security Systems (ACSS-2019),

March 12-13, 2019,

University of Calcutta, India

About ACSS

The 6th International Doctoral Symposium on Applied Computation and Security Systems (ACSS-2019) is to be held during March 12-13, 2019 in Kolkata, India. ACSS 2019 is aimed at offering a qualified opportunity for presentation and discussion of the research outcomes by PhD scholars enrolled with Universities and Research Institutes around the world. While the emphasis of the workshop is on Security Systems, we solicit research outcomes on other relevant areas pertaining to advancement of computing.

  • We would request researchers to submit manuscripts containing unpublished research work in the domains of computing and security systems. Please see the detailed list of topics in the Call For Paper.
  • We particularly encourage researchers involved in emerging areas to submit their works for interesting discussions and post-symposium Springer Books to be indexed by the Conference Proceedings Citation Index of Thomson Reuters (ISI Indexing), EI-Compendex, DBLP and SCOPUS.

Our Gallery

Our Speakers

Frank B. Brokken

University of Groningen, Netherlands

Andrea Albarelli

Università Ca' Foscari Venezia, Italy

Aninda Bose

Springer New Delhi

Vaclav Snasel

VSB – Technical University of Ostrava, Ostrava

Programme Schedule


Our Organizers

University of Calcutta, India

Department of Computer Science & Engineering
A. K. Choudhury School of Information Technology

University of Calcutta, India

Our Co-organizers

Our History

History of 2014 Download
History of 2015 Download
History of 2016 Download
History of 2017 Download

Author Registration

Category From India From Abroad
Author (Oral Presentation) INR 8000 400 US Dollar
Listener INR 2000 100 US Dollar
Industry INR 10,000 500 US Dollar
Note: Please note that at least one author of the accepted paper should register and the Ph D scholar should present the paper, failing which, the paper will not be included in the post-symposium book. The registration fee for the symposium includes entry to all the technical sessions, tutorials and workshops, besides lunches and the banquet dinner.

Please pay your registration charges according to your category to the a/c given below and proceed for registration, along with a copy of the bank wire transfer receipt (RTGS/NEFT).

Mode of Payment:
  • Bank Name
  • Branch Name
  • Account Title
  • Account Number
  • IFSC Code
  • Branch Address
  • ---------
  • ---------
  • ---------
  • ---------
  • ---------
  • ---------
  • Bank of Baroda
  • Surya Sen Street EC
  • 98210100001607
  • 92 APC Road, Kolkata 700009, India
Enter Registration Details

Call For Papers

The ACSS-2019 International Doctoral Symposium aims to facilitate PhD scholars to present and discuss their doctoral research with senior researchers in a constructive and friendly atmosphere. Each contributed paper must have at least one enrolled PhD student as the first author of the submission and his/her supervisor(s) as co-author(s).

Download as PDF Consent to Publish


Important Dates

Paper Submission Date : October 31, 2018

Author Notification : January 15, 2019

Camera Ready Submission & Author Registration : January 25, 2019

Symposium : March 12-13, 2019

We welcome all such authors to submit research papers to 6th International Doctoral Symposium on Applied Computation and Security Systems (ACSS-2019). Any work that is not presented in ACSS-2019 shall not be included in the post-conference book. This symposium would be best suited for scholars who already have a plan outlined for their dissertation in one of the following broad areas:

  • Computer Vision & Applications
  • Security for Internet of Things
  • Security in Hetarogeneous Networks
  • Signal Processing
  • Intelligent Transportation System
  • VLSI Design and Embedded Systems
  • Privacy and Confidentiality
  • Big Data and Cloud Computing
  • Bioinformatics and Systems Biology
  • Remote Healthcare
  • Software Security
  • Mobile and Pervasive Computing
  • Biometrics-based Authentication
  • Natural Language Processing
  • Analysis and Verification Techniques
  • Large Scale Networking
  • Distributed Systems
  • Digital Forensics
  • Human Computer Interaction
  • Access Control
  • Data Analytics and Applications
  • Requirements Engineering
  • Algorithms
  • Quantum Computing

The submission draft for full papers should be limited to 10-12 pages. The authors of selected papers shall be required to submit an extended version for publication as a book chapter in the post-symposium book. All papers will be carefully reviewed by the program committee and a balanced program will be selected based on relevance and technical soundness. Each paper will receive at least two blind reviews. Please note that author names, affiliations, etc. are not to be included in any form in the manuscript, failing which, the paper will be rejected. The selected and presented works for ACSS 2019 are to be published by Springer after the symposium as an edited book in the series,

Get The Book

Proceedings Template


2019 Keynote Talks

    Frank B. Brokken

    Information Security - Technology and Beyond

    When the ARPAnet originated in the 2nd half of the 60s of the previous century security wasn't one of its cornerstones. Since then, many things have changed: we now use levels of firewalls, intrusion detection mechanisms, a limited number of server facilities, and active system maintenance. Our current tools for achieving IT Security are extremely advanced but, interestingly, in the end, their underlying philosophy hasn't changed much since the late middle ages. Even so, our society more and more depends on IT: train and plane reservations, almost our complete infra-structure (energy, traffic control, hospitals, communication) depends on properly functioning IT facilities. The IT systems of these essential societal components may cause those components to grind to a complete halt if their security is compromised. Despite the fact that many great books have been published about software engineering, software frequently is based on horrible design, showing many presentation flaws, making it sheer impossible to understand and maintain it. Good software should be well designed, following a clear description model, and should be developed `bottom-up'. The Stealth program was designed that way and its characteristics are covered during the conference. However, technology is a tool, and attaining an acceptable level of IT security cannot be reached by merely using that tool. Over the years the Internet has grown from a medium used by friendly colleagues to an technology mirroring what's happening in the physical world, including addictions and crime. Adversaries may be 20,000 km away, but they can reach our computers in seconds. Few computer users understand this, and use, e.g., e-mail as though they are sending a letter using the postal service, not realizing that they're essentially making potentially confidential information available to unknown and possibly criminal third parties.
    Real steps forward in the field of information security cannot be achieved by IT alone. In science major steps ahead are often achieved by joining forces of at first sight completely different scientific disciplines. `Looking over de fence' research often results in dissertations rewarded with cum-laudes. How do we `look over the fence' in the field of IT, aiming at improving Information Security? The area to join forces with is Psychology: many IT users assume Information Security is not their responsibility or they think they do not run real risks of falling victim to cyber threats. Promising approach lines are found in behavior change models in which behavior, e.g., cyber security compliance depends on human factors such as attitudes, social norms and perceived behavioral control towards Cyber Security (cf. the Theory of Planned Behavior). According to this theory, which has received an enormous amount of empirical suppport, behavior (and thus security awareness) changes as a result of changing social norms, affecting personal attitudes and users' behavior once they realize they are in control. Here clear information about the real risks of irresponsible behavior in the area of IT helps people to change their attitudes. From learning theories we know that incentives in particular help to change behavior (while punishment doesn't). Joining forces with Psychology results in developing software not only securing our computers, but more importantly: in software that offers users with on-the-spot guidelines on how to act when confronted with potentially threatening events. We can't do it all by ourselves. When IT Security is important we must realize that technology, although very important, is not enough. The time has come to reach out to other scientific disciplines and to join forces.

    Andrea Albarelli

    Game Theory as a tool for Pattern Recognition

    By providing an elegant and theoretically-founded framework to model complex scenarios, Game Theory has found a variety of applications not only in Economics and Social Sciences, but also in different fields of Engineering and Information Technologies. In fact, recent literature comprises many effective techniques addressing problems in Computer Vision, Pattern Recognition and Machine Learning from a Game-Theoretical perspective. Moreover, with the recent development of Algorithmic Game Theory, the interest in these communities around Game-Theoretical models and algorithms is growing at a fast pace. The goal of this keynote is to give an introduction to the general setting and to describe the most successful efforts to foster the adoption of such methods to solve a wide range of Pattern Recognition problems. In particular, when dealing with tasks involving the discovery of sparse groups of inliers within a mostly noisy dataset. We shall assume no pre-existing knowledge of game theory by the audience, thereby making the lecture self-contained and understandable by a non

    Aninda Bose

    Importance of Ethics in Research Publishing

    The importance of research publishing can be defined by a simple quote of Gerard Piel, which says “Without publication, science is dead.” The first scientific journal was published in 1665 and we have travelled more than 350 years since then. In the last 20 years, science and reporting of science have undergone revolutionary changes. Computerization and Internet have changed the traditional ways of reading and writing. Hence, it is very important for scientists and students of the sciences in all disciplines to understand the complete process of writing and publishing of scientific paper in good journals. There is also a downside of digital publishing. The principal challenge for publishers is to handle ethical issues and it is of utmost importance for the authors to understand the ethical practices involved in the process. The question is what is right or what is wrong; what is acceptable and what is non-acceptable; what is an error and what are serious scientific fraud. There is no single solution or answer to these questions. There are several government agencies, professional associations and universities have adopted specific codes, rules, and policies relating to research ethics. The talk is designed to highlight different ethical problems, provide information on codes and policies, and also on how to make use of various author services for publishing a genuine work.

    Vaclav Snasel

    Deep Learning for Advanced Computing and Systems for Security

    Recent research trends in the areas of computational intelligence, communications, data mining, and computational models aim to achieve a multi-disciplinary balance between research advances in the fields of collective intelligence, data science, human-centric computing, knowledge management, and network science. The purpose of the lecture is to give their perspective on the challenges and opportunities that Deep learning presents to Advanced Computing and Systems for Security. Deep learning discovers an intricate structure in large data sets by using complex or compressed attributes. These methods have dramatically improved the state-of-the-art in visual object recognition, object detection, network science and many other domains such as drug discovery and genomics. This talk will discuss some unifying approach for text, image and network data. Then, this talk will provide some real-life Deep learning applications.

Submit Paper

Log in to EasyChair to submit paper for ACSS2019
Login Paper submission date has expired

Publications & Indexing

The ACSS 2019 authors shall be asked to submit an extended version of their work based on the discussions during the symposium. This extended version will be published as a book-chapter in the bi-volume post-symposium book to be published by Springer. The ACSS book volume(s) are indexed by Thomson Reuters (ISI Proceedings), EI-Compendex, DBLP, SCOPUS and others. Extension of some of the selected papers will also be published in a, Special Issues on Transactions on Computational Science.




    Nabendu Chaki, University of Calcutta, Kolkata, India

    Khalid Saeed, Warsaw University, Warsaw, Poland


    Agostino Cortesi, Ca' Foscari University, Venice, Italy

    Rituparna Chaki, University of Calcutta, Kolkata, India


    Sankhayan Choudhury, University of Calcutta, Kolkata, India

    Amlan Chakrabarti, University of Calcutta, Kolkata, India


    Ca' Foscari University, Venice, Italy

    Bialystok University of Technology, Poland


    Novarun Deb, Ca' Foscari University, Italy

    Ayan Dey, University of Calcutta, India

    Souvick Das, University of Calcutta, India

    Jayadratha Mondal, University of Calcutta, India

Contact Info


Technology Campus

Acharya Prafulla Chandra Sikhsha Prangan

University of Calcutta

JD-2,Sector-3,Salt Lake

Kolkata 700098


The Pride Hotel Kolkata

New Town Terminus, B.G-12,

Action Area I, 1-B, Rajarhat,

Kolkata 700156