CONF-SPML 2025

Organizer

Department of Computer and Information Sciences, University of Strathclyde


Workshop Chair

Prof. Anil Fernando

Professor in University of Strathclyde

Personal Bio:

Prof. Anil Fernando received the B.Sc. (Hons.) degree (First Class) in electronics and telecommunication engineering from the University of Moratuwa, Sri Lanka, in 1995, and the M.Sc. in Communications (Distinction) from the Asian Institute of Technology, Bangkok, Thailand in 1997 and Ph.D. in Computer Science (Video Coding and Communications) from the University of Bristol, UK in 2001. He is a professor in Video Coding and Communications at the Department of Computer and Information Sciences, University of Strathclyde, UK. He leads the video coding and communication research team at Strathclyde. He has worked on major national and international multidisciplinary research projects and led most of them. He has published over 450 papers in international journals and conference proceedings and published a book on 3D video broadcasting. He has been working with all major EU broadcasters, BBC, and major European media companies/SMEs in the last decade in providing innovative media technologies for British and EU citizens. His main research interests are in Video coding and Communications, Machine Learning (ML) and Artificial Intelligence (AI), Semantic Communications, Signal Processing, Networking and Communications, Interactive Systems, Resource Optimizations in 6G, Distributed Technologies, Media Broadcasting and Quality of Experience (QoE).

Workshop Committee Members

Prof. Anil Fernando, Professor, Anil.fernando@strath.ac.uk

Mrs. Thisarani Atulugama, Researcher, Thisarani.atulugama@strath.ac.uk

Call for Papers:


The workshop "Semantic Communication For Secure Image Transmission" aims to explore the cutting-edge paradigm of semantic communication, which focuses on using data to enhance communication efficiency, compression, and security. This workshop invites submissions that delve into the semantic security of autoencoder-based communication systems and relevant subjects. Key topics include, but are not limited to, semantic communication, autoencoders, latent space representations, decoder models, privacy preservation, and image reconstruction. Through this workshop, we seek to evaluate the robustness of these systems against potential attackers, demonstrating the inherent security features of semantic communications. Researchers, practitioners, and students are encouraged to participate and contribute to advancing the field of secure image transmission.

Keywords

  • Semantic Communication
  • Autoencoder
  • Semantic security
  • Latent space representations
  • Decoder model
  • Privacy preservation
  • Image reconstruction

Background:

Semantic communication is an emerging paradigm that leverages the underlying meaning of data to optimize various aspects of communication, including compression, error correction, and privacy preservation. While autoencoder-based approaches have shown promise in efficient compression and encoding of data into compact latent representations, ensuring the semantic security of these systems remains a critical challenge. The proposed research aims to investigate the semantic security of autoencoder-based communication systems under a realistic threat model, where an attacker has access to a different autoencoder model trained on the same data distribution as the legitimate encoder.

Goal/Rationale:

This workshop considers investigating the semantic security of autoencoder-based communication systems under a realistic threat model, where an attacker has access to a different autoencoder model trained on the same data distribution as the legitimate encoder. The goal is to evaluate the robustness of the system against an attacker who intercepts the transmitted latent representations but lacks knowledge of the specific decoder model used by the legitimate recipient. By demonstrating the limitations of an attacker with access to a different decoder model, this research aims to contribute to the understanding of semantic security and pave the way for the development of robust and secure semantic communication frameworks.

Scope and Information for Participants

The workshop focuses on the semantic security of autoencoder-based communication systems in the context of image transmission. We will demonstrate the effectiveness of inherent security in semantic communications using the MNIST dataset of handwritten digits. Two separate autoencoders are trained on different subsets of the MNIST dataset, simulating different scenarios where a legitimate encoder and an attacker have access to distinct autoencoder models trained on the same data distribution. The methodology involves training the autoencoders, obtaining latent representations from one autoencoder's encoder, and attempting to reconstruct the original images using both the matching decoder and the mismatched decoder from the other autoencoder. The reconstructed images are then analyzed and compared to assess the level of semantic security achieved by the mismatch between the encoder and decoder models. Participants will get hands on experience how semantic communication test bed can be used to secure image transmissions.

Submission

Prospective authors are kindly invited to submit full papers that include title, abstract, introduction, tables, figures, conclusion and references. It is unnecessary to submit an abstract in advance. The deadline for general submission is December 9, 2024.

Each paper should be no less than 4 pages. One regular registration can cover a paper of 6 pages, and additional pages will be charged. Please format your paper well according to the conference template below before submission.

Paper Template

Please prepare your paper in both .doc/.docx and .pdf format and submit your full paper by email with both formats attached directly to ws_glasgow@confspml.org

Workshop Date

December 16, 2024 (GMT+1)

Submission & Payment

Type Regular Submission
Paper Submission December 9, 2024
Review Process 2 weeks
Revise & Acceptance 2 weeks
Registration & Payment 2 weeks

Fees

Items Amount(VAT Included)
Registration and Publishing Fee(6 pages included) $500
Additional Page $40/extra page

Publication

Accepted papers of this workshop will be published in IET Conference Proceedings (Online ISSN: 2732-4494) or Applied and Computational Engineering (Print ISSN: 2755-2721), and will be submitted to EI Compendex, Conference Proceedings Citation Index (CPCI), Crossref, Portico, Inspec, Google Scholar, CNKI , and other databases for indexing. The situation may be affected by factors among databases like processing time, workflow, policy, etc.

Participation


Poster

Besides the onsite meeting, this workshop also holds a poster session which allow for a larger number of authors to share their research. The poster session will provide an opportunity for researchers to present their work in a visual and interactive way, allowing for more engagement and discussion with other attendees. Authors of qualified papers will be invited to present their works with digital posters. We believe that this online poster session will still be a great platform for participants to share, discuss, and cooperate.

All accepted authors will receive an invitation email to present a poster at this workshop. Please note that all poster presenters must submit the poster before December 9, 2024.

Guidelines for Poster Presentation

  1. Poster presentations must be prepared using the template provided:
  2. *Poster layout template for poster presentation (download)
  3. *Poster layout background (download)
  4. Posters should generally be in A1 size (width: 594mm x height: 841mm) and include the followings:
  5. Title, author and co-author names, and the affiliation(s) information.
  6. Body parts, including "Abstract", "Introduction", "Methods", "Results", "Discussion" and "Conclusions".
  7. Presenters are suggested to set the font size properly and avoid placing anything at the margin part of the poster as it will be difficult to view.
  8. Posters should be well illustrated. All the pictures used should be high quality and with high resolution.
  9. All the posters will be displayed online on the official website. Each poster will have both a small thumbnail and a full-size version.
  10. Posters will be displayed during the online session. After the presentation is over, the full-size version of all posters will become invisible. But thumbnails still can be seen on the website.

(You can refer to the instructions for more detailed information. Additional presentation guidelines may be announced by workshop committees.)

Highlights

Our recent Workshop on Semantic Security explored advanced techniques for ensuring secure and efficient communication in modern networks. The discussions focused on optimizing network resources to enhance data integrity, confidentiality, and resilience against emerging cyber threats.
Key topics included secure transmission strategies, adaptive encryption methods, and network-aware security protocols designed to protect transmitted data from adversarial interference. Participants examined challenges such as channel capacity, resource allocation, and minimizing transmission delays while maintaining high-fidelity communication.
Hands-on demonstrations showcased innovative security frameworks that mitigate information leakage by focusing on the meaning and intent of transmitted data rather than traditional bit-level encryption. Attendees collaborated with experts to design context-aware security models, leveraging real-time threat detection and intelligent routing to enhance communication reliability.
The workshop emphasized the importance of integrating semantic security into classical and next-generation network architectures. These advancements are crucial for real-time medical data transmission, secure satellite communications, and next-generation media streaming, ensuring robust protection against evolving security threats.
By fostering interdisciplinary collaboration, this workshop contributed to shaping the future of secure, efficient, and scalable communication systems in an era of increasing secure image transmission challenges.

Image 1
Image 2
Image 3
Image 4

Access to Workshop: CONF-SPML 2025 Workshop -- Glasgow - YouTube

Venue


Room LT404, Livingston Tower, Department of Computer and Information Sciences, University of Strathclyde, Glasgow, UK

VISA

Welcome to GOV.UK

In order to ensure the information is correct and up to date, there may be changes which we are not aware of. And different countries have different rules for the visa application. It is always a good idea to check the latest regulations in your country. This page just gives some general information of the visa application.

UK Visa Information

What you need to do

  • Check if what you plan to do in the UK is allowed as a Standard Visitor.
  • Check you meet the eligibility requirements.
  • Check if you need to apply for a visa to visit the UK.
  • Apply for a Standard Visitor visa online - if you need one.

Check you meet the eligibility requirements

You must have a passport or travel document to enter the UK. It should be valid for the whole of your stay.

You must be able to show that:

  • you'll leave the UK at the end of your visit
  • you're able to support yourself and your dependants during your trip (or have funding from someone else to support you)
  • you're able to pay for your return or onward journey (or have funding from someone else to pay for the journey)
  • you'll not live in the UK for extended periods through frequent or successive visits, or make the UK your main home

Check if you need a visa to visit the UK

Depending on your nationality, you'll either:

  • have to apply for a Standard Visitor visa before you travel to the UK
  • be able to visit the UK for up to 6 months without needing a visa

You can check if you need a visa before you apply.

If you do not need a visa, you must still meet the Standard Visitor eligibility requirements to visit the UK. You may be asked questions at the UK border about your eligibility and the activities you plan to do.