Top Reasons to Join SPS Today!

1. IEEE Signal Processing Magazine
2. Signal Processing Digital Library*
3. Inside Signal Processing Newsletter
4. SPS Resource Center
5. Career advancement & recognition
6. Discounts on conferences and publications
7. Professional networking
8. Communities for students, young professionals, and women
9. Volunteer opportunities
10. Coming soon! PDH/CEU credits
Click here to learn more.

EDICS

Name Description
ADP ANONYMIZATION AND DATA PRIVACY
ADP-ANDE Anonymization and de-anonymization
ADP-PMOD Privacy modeling and analysis
ADP-PATT Privacy attacks
ADP-PPRO Privacy protection
ADP-ANCR Anonymous credentials
ADP-DIFP Differential privacy
ADP-APPS Applications and systems
ADP-OTHS Others
APC APPLIED CRYPTOGRAPHY
APC-MMED Multimedia encryption
APC-MMPP Property-preserving encryption of multimedia
APC-IPED Information processing in the encrypted domain
APC-IPED-HOM Homomorphic encryption applications
APC-IPED-MPC Applications of two- and multi-party computation
APC-IPED-SEAR Searchable encryption applications
APC-FIN Financial cryptography
APC-VER Secure and verifiable outsourcing
APC-BRTT Broadcast encryption and traitor tracing
APC-FUN Functional encryption applications
APC-SS Secret sharing
APC-OTHS Others
BIO BIOMETRICS
BIO-MODA Biometric modalities
BIO-MODA-FAC Face biometrics
BIO-MODA-FIN Fingerprint biometrics
BIO-MODA-IRI Iris/ocular biometrics
BIO-MODA-VOI Voice biometrics
BIO-MODA-SIG Signature/handwriting biometrics
BIO-MODA-VEIN Vein biometrics
BIO-MODA-OTH Other biometric modalities
BIO-MULM Multi-modal biometric systems
BIO-PROT Biometrics Protocol
BIO-SECP Biometrics security and privacy management
BIO-MODA-PAD Presentation attacks (spoofing) and presentation attack detection (liveness detection ...)
BIO-PEVA Performance evaluation
BIO-STAD Standardization
BIO-APPS Applications
BIO-OTHS Others
CIT COMMUNICATION AND INFORMATION THEORETIC SECURITY
CIT-COM-JAM Jamming and anti-jamming techniques
CIT-COM-COV Covert or stealthy communication via physical layers
CIT-COM-FOR Communication forensics (modulation identification, coding scheme identification, etc.)
CIT-COM-COOP Security and trust in cooperative communications
CIT-COM-MIMO Security and trust in MIMO and multiple-access techniques
CIT-COM-COG Security in cognitive radio
CIT-PHY Physical layer security
CIT-PHY-SKEY Secret key extraction from channels
CIT-PHY-COD Coding for physical layer security
CIT-PHY-MIMO Physical layer security in MIMO systems
CIT-INF Information theoretic security
CIT-INF-SECC Security over channels (wire-tap, broadcast, multiple access, interference, multi-user, etc.)
CIT-INF-CONF Information-theoretic formulation of confidentiality and authentication
CIT-INF-PRIV Information-theoretic formulation of privacy
CIT-ADV Adversarial signal processing
CIT-ADV-DT Adversarial detection and estimation theory
CIT-ADV-CLA Adversarial classification
CIT-ADV-BYZ Distributed signal processing with Byzantines
CIT-OTHS Others
CYB CYBERSECURITY
CYB-MOD Cyber-security modelling (Dynamic systems, Control theoretic, Game theoretic etc ...)
CYB-VAL Model validation and experiments
CYB-DAN Cyber-security data analytics
CYB-APP Applications
CYB-APP-BMHC Bio-medical and health care systems
CYB-APP-CLOU Cloud computing
CYB-APP-DIST Distributed computing systems
CYB-APP-SMGD Smart grid and power/energy systems
CYB-SNET Social networks
CYB-SNET-SEC Security in social networks
CYB-SNET-SMED Social media forensics
CYB-CP Cyber-Physical security
CYB-CP-ATT Coordinated cyber and physical attacks
CYB-CP-AUT Cyber-physical authentication
CYB-CP-OGT Optimization and game-theoretic techniques for physical layer security
CYB-CP-REAL Real-time CPS security
CYB-OTHS Others
MMF MULTIMEDIA FORENSICS
MMF-DEV Acquisition device forensics
MMF-PROC Multimedia processing forensics
MMF-PROC-IM Image forensics
MMF-PROC-VID Video forensics
MMF-PROC-AU Audio forensics
MMF-PROC-TXT Text fingerprinting
MMF-PROC-MM Multimodal forensic analysis
MMF-MCLUE Multi-clue forensics analysis
MMF-BENM Benchmarking
MMF-BENM-REF Reference datasets and algorithms
MMF-BENM-PER Performance measurement and validation of forensic evidence
MMF-ADV Adversarial multimedia forensics
MMF-ADV-COU Counter forensics
MMF-ADV-ACOU Anti counter-forensics measures
MMF-ADV-GT Game theory in multimedia forensics
MMF-OTHS Others
HWS HARDWARE SECURITY
HWS-PRIM Hardware security primitives
HWS-PRIM-PUF Physical Unclonable Functions
HWS-PRIM-RAN True random number generators
HWS-PRIM-TPM Trusted execution environments
HWS-SIDE Side channels (power, timing, electromagnetic radiation, etc.)
HWS-HWTR Hardware Trojans
HWS-ANTI Anti-counterfeiting
HWS-FORE Hardware forensics
HWS-OTHS Others
MMH MULTIMEDIA CONTENT HASH
MMH-CHF Content hash functions
MMH-BENM Benchmarking
MMH-BENM-REF Reference datasets and algorithms
MMH-BENM-SEC Security analysis
MMH-BENM-PER Performance measurement
MMH-APPS Applications
MMH-APPS-NDD Near-duplicate detection
MMH-APPS-CBR Content identification and authentication
MMH-APPS-PLA Content plagiarism detection
MMH-OTHS Others
NET NETWORK SECURITY
NET-SPRO Security protocols
NET-KEYD Key distribution and management
NET-ATTP Network attacks and protection
NET-ATTP-VUL Vulnerability analysis
NET-ATTP-MAL Malware analysis
NET-ATTP-DOS Denial-of-service attack
NET-ATTP-INT Intrusion detection and prevention
NET-ATTP-FIW Firewalls
NET-MOB Security in mobile networks
NET-MOB-MAN Mobile ad-hoc networks (MANET)
NET-MOB-VNET Vehicular networks
NET-MOB-AUTH Authentication protocols for mobile networks
NET-MONT Network monitoring
NET-SSN Sensor networks
NET-SREC Self-recovery from failures
NET-TRAC Network forensics (network trace analysis, etc.)
NET-OTHS Others
SUR SURVEILLANCE
SUR-OBJD Object detection, tracking and behavior analysis
SUR-BEHA Behavior analysis
SUR-EVNT Event detection and recognition
SUR-FORE Forensics in surveillance
SUR-PRIV Privacy in surveillance
SUR-ADAW Adversary-aware video surveillance
SUR-SENA Design and analysis of sensor arrays
SUR-OTHS Others
USH USABILITY AND HUMAN FACTORS
USH-DESN Usability design
USH-EVAL Evaluation of privacy and security solutions
USH-TRU Trust management and models
USH-NTEC Non-technical (legal, ethical, social, and economic) aspects
USH-BSOC Behavior forensics and social factors
USH-HAAI Hard artificial intelligence problems and security (Captcha’s, man vs machine identification)
USH-PASS Password generation and protection
USH-OTHS Others
WAT WATERMARKING AND DATA HIDING
WAT-MOD Theoretical models
WAT-ALGO Watermarking algorithms
WAT-ALGO-IM Image watermarking algorithms
WAT-ALGO-VID Video watermarking algorithms
WAT-ALGO-AUD Audio watermarking algorithms
WAT-ALGO-3D 3D watermarking
WAT-PCM Perceptual models
WAT-RSYN Resynchronization strategies
WAT-BENM Benchmarking
WAT-SEC Watermarking security
WAT-APPS Applications
WAT-REV Reversible data hiding
WAT-STEG Steganography
WAT-STGA Steganalysis
WAT-NM Steganography in new media
WAT-OTH Others

SPS on Twitter

  • DEADLINE EXTENDED: The 2023 IEEE International Workshop on Machine Learning for Signal Processing is now accepting… https://t.co/NLH2u19a3y
  • ONE MONTH OUT! We are celebrating the inaugural SPS Day on 2 June, honoring the date the Society was established in… https://t.co/V6Z3wKGK1O
  • The new SPS Scholarship Program welcomes applications from students interested in pursuing signal processing educat… https://t.co/0aYPMDSWDj
  • CALL FOR PAPERS: The IEEE Journal of Selected Topics in Signal Processing is now seeking submissions for a Special… https://t.co/NPCGrSjQbh
  • Test your knowledge of signal processing history with our April trivia! Our 75th anniversary celebration continues:… https://t.co/4xal7voFER

IEEE SPS Educational Resources

IEEE SPS Resource Center

IEEE SPS YouTube Channel