
Call for Papers
Paper Submission Deadline: Jan. 10, 2026
Policy
All Regular, Short, Workshop and Poster Papers must adhere to the following page limit rules:
-
Regular Research Papers: 6-8 pages
-
Poster Papers: 2-3 pages
All the papers will be published through online open access.
-
Submissions should represent original research results and may not be under review or accepted for publication in another venue.
-
Paper submissions should be formatted according to the IEEE standard double-column format with a font size of 10 pt or larger. Please refer to the IEEE formatting instruction for details.
-
Research and poster papers will be peer-reviewed, and those accepted will be included in the IEEE SVCC 2026 proceedings and archived in IEEE Xplore after thorough plagiarism and policy checks.
-
SVCC 2026 follows a double-blind submission policy to ensure impartial and fair reviews. Authors must remove identifying information such as names, affiliations, and acknowledgments from their manuscripts before submission.
Author Changes or Title Change Policy
In order to ensure an appropriate consideration of conflicts of interest in the review process, SVCC prohibits any change to the list of authors and/or the title of a paper when the paper is under review or if accepted for final publication. The author list or the title of a paper may be changed only prior to the submission deadline.
No Show Policy
For All (Regular/Short/Poster) Paper Authors: Authors are required to present their paper at the conference in order for a paper to appear in the conference proceedings (except for authors in the online forum session). Registration receipts and proceedings will be available only for papers that are presented. Your paper will be excluded from being published and included in the the conference proceeding should your paper fail to be presented at the conference. Any exceptions to this policy can only be made by the General and Program Chairs.
Camera-ready Instructions
You can read the camera-ready instruction below after your paper is accepted in Feb. Camera-ready submission: PDF Instructions for Authors Before Creating a PDF • Proofread your source document thoroughly to confirm that it will require no revision. We will update it in detail soon.
Topics of interest (including but not limited to):
01
Network Security
-
Intrusion and anomaly detection and prevention
-
Attack detection, prevention, or mitigation
-
Cryptography for network security
-
Denial-of-service attacks and countermeasures
-
Mobile and wireless network security
04
System and Hardware Security
-
Security primitives in system architecture and systems
-
Side-channel attacks and mitigation
-
Anti-counterfeit, anti-tamper
-
Hardware obfuscation
-
FPGA design and security
-
Cryptographic processors
-
Post-quantum security primitives
-
On-device AI security
-
Robotics security and safety
02
Blockchain Security
-
Security and privacy in decentralized applications
-
Distributed consensus protocols
-
Blockchain theory and algorithms
-
Communication protocols and standards for dApps
-
Decentralized identity and identity management
05
Software Security
-
Secure software design/architecture
-
Secure software practices
-
Security analysis tools and methods
-
Security evaluation criteria and methodology
-
Vulnerability, threat, and risk analysis
-
Malware detection/intrusion detection
-
Obfuscation and software security
03
AI Cybersecurity
-
ML/DL security and privacy
-
LLM applications in cybersecurity and data protection
-
Privacy-preserving AI models
-
Adversarial attacks and defenses for ML/DL
-
LLM security attacks and defenses
-
Privacy protections for AI applications
06
HCI for Cybersecurity
-
Behavior-based cybersecurity
-
Human detection of trusted execution
-
HCI for web technologies
-
HCI for mobile or cloud computing
-
Smart cities
-
Social networks
-
User privacy
-
Cyber Security Application and Technology
-
VR/AR systems
-
Ethical, social, and legal implications of AI and LLMs in cybersecurity