Conference Information
CCS 2025: ACM Conference on Computer and Communications Security
https://www.sigsac.org/ccs/CCS2025/Submission Date: |
2025-04-14 |
Notification Date: |
2025-07-01 |
Conference Date: |
2025-10-13 |
Location: |
Taipei, Taiwan |
Years: |
32 |
CCF: a CORE: a* QUALIS: a1 Viewed: 177983 Tracked: 316 Attend: 32
Call For Papers
The 32nd ACM Conference on Computer and Communications Security (CCS) seeks submissions presenting novel contributions related to all real-world aspects of computer security and privacy. Theoretical papers must make a convincing case for the relevance of their results to practice. Authors are encouraged to write the abstract and introduction of their paper in a way that makes the results accessible and compelling to a general computer-security researcher. In particular, authors should bear in mind that anyone on the program committee may be asked to review any paper. CCS has two review cycles in 2025. For each submission, one of the following decisions will be made: Accept: Papers in this category will be accepted for publication in the proceedings and presentation at the conference, possibly after making minor changes with the oversight of a shepherd. Minor revision: Papers in this category are considered to be promising but need some minor additional work (e.g., minor experiments, proofs to minor lemmas). Authors will be given the opportunity to resubmit such papers, with appropriate revisions, in which case they should clearly explain in a separate note how the revisions address the comments of the reviewers. The revised paper will then be re-evaluated, and either accepted or rejected. Reject: Papers in this category are declined for inclusion in the conference. Papers rejected from the first review cycle may not be submitted again (even in revised form) to the second review cycle. Authors of each accepted paper must ensure that at least one author registers for the conference, and that their paper is presented in-person at the conference if at all possible. Paper Submission Information All submissions must be received by 11:59 PM AoE (UTC-12) on the day of the corresponding deadline. Submitted papers must not substantially overlap with papers that have been published or accepted for publication, or that are simultaneously in submission to a journal, conference, or workshop with published proceedings. All submissions should be properly anonymized. Papers should avoid revealing authors’ identity in the text. When referring to their previous work, authors are required to cite their papers in the third person, without identifying themselves. In the unusual case in which a third-person reference is infeasible, authors can blind the reference itself. Papers not properly anonymized may be rejected without review. All submitted papers will be evaluated based on their merits, particularly their importance to practical aspects of computer and communications security and privacy, novelty, quality of execution, and presentation. For papers that might raise ethical concerns, authors are expected to convince reviewers that proper procedures (such as IRB approval or responsible disclosure) have been followed, and due diligence has been made to minimize potential harm. Submitted papers may be rejected for being out of scope, at the discretion of the PC chairs. Authors who have questions about whether their paper is in scope are encouraged to ask the PC chairs in advance. No modifications to the author list on a paper may be made after submission.
Last updated by Dou Sun in 2024-11-23
Acceptance Ratio
Year | Submitted | Accepted | Accepted(%) |
---|---|---|---|
2021 | 879 | 196 | 22.3% |
2020 | 715 | 121 | 16.9% |
2019 | 934 | 149 | 16% |
2018 | 809 | 134 | 16.6% |
2017 | 843 | 151 | 17.9% |
2016 | 831 | 137 | 16.5% |
2015 | 660 | 128 | 19.4% |
2014 | 585 | 114 | 19.5% |
2013 | 530 | 105 | 19.8% |
2012 | 423 | 80 | 18.9% |
2011 | 429 | 60 | 14% |
2010 | 320 | 55 | 17.2% |
2009 | 315 | 58 | 18.4% |
2008 | 280 | 51 | 18.2% |
2007 | 302 | 55 | 18.2% |
2006 | 256 | 38 | 14.8% |
2005 | 249 | 38 | 15.3% |
2004 | 251 | 35 | 13.9% |
2003 | 128 | 21 | 16.4% |
2002 | 153 | 27 | 17.6% |
2001 | 153 | 27 | 17.6% |
2000 | 131 | 28 | 21.4% |
1999 | 83 | 16 | 19.3% |
1998 | 85 | 17 | 20% |
1997 | 64 | 17 | 26.6% |
1996 | 59 | 19 | 32.2% |
1994 | 70 | 31 | 44.3% |
1993 | 60 | 27 | 45% |
Best Papers
Year | Best Papers |
---|---|
2016 | PhishEye: Live Monitoring of Sandboxed Phishing Kits |
Go to page:
Related Conferences
Related Journals
CCF | Full Name | Impact Factor | Publisher | ISSN |
---|---|---|---|---|
Applied Artificial Intelligence | Taylor & Francis | 0883-9514 | ||
Abstract and Applied Analysis | Hindawi | 1085-3375 | ||
Microelectronics Reliability | 1.600 | Elsevier | 0026-2714 | |
b | Cognition | 2.800 | Elsevier | 0010-0277 |
c | IEEE Geoscience and Remote Sensing Letters | 4.000 | IEEE | 1545-598X |
c | Neural Processing Letters | 2.600 | Springer | 1370-4621 |
c | International Journal on Semantic Web and Information Systems | 3.200 | IGI Global | 1552-6283 |
Computers & Geosciences | 4.200 | Elsevier | 0098-3004 | |
International Journal of Health Geographics | 3.000 | Springer | 1476-072X | |
c | Artificial Intelligence in Medicine | 6.100 | Elsevier | 0933-3657 |
Full Name | Impact Factor | Publisher |
---|---|---|
Applied Artificial Intelligence | Taylor & Francis | |
Abstract and Applied Analysis | Hindawi | |
Microelectronics Reliability | 1.600 | Elsevier |
Cognition | 2.800 | Elsevier |
IEEE Geoscience and Remote Sensing Letters | 4.000 | IEEE |
Neural Processing Letters | 2.600 | Springer |
International Journal on Semantic Web and Information Systems | 3.200 | IGI Global |
Computers & Geosciences | 4.200 | Elsevier |
International Journal of Health Geographics | 3.000 | Springer |
Artificial Intelligence in Medicine | 6.100 | Elsevier |
Recommendation