posted by user: steschulte || 2361 views || tracked by 4 users: [display]

AFT 2021 : ACM Advances in Financial Technologies

FacebookTwitterLinkedInGoogle

Link: https://aft.acm.org/aft21/index.html
 
When Sep 26, 2021 - Sep 28, 2021
Where Arlington, VA
Submission Deadline May 27, 2021
Notification Due Aug 3, 2021
Categories    blockchain   consensus   cryptoassets   cryptocurrencies
 

Call For Papers

AFT'19
Home(current)
Call for Papers
Committees
Editions
Call for Papers
The ACM conference on Advances in Financial Technologies (AFT) is a premier venue for presenting the latest developments in technologies related directly and indirectly to novel financial infrastructure such as cryptocurrencies and their applications, blockchains, and exchanges.
Papers may present advances in the theory, design, implementation, analysis, verification, or empirical evaluation and measurement of relevant systems.

We solicit previously unpublished papers offering novel research contributions. Proceedings will be published with open-access by the ACM.

Schedule
Submission deadline: May 27 2021
Author notification: August 3 2021
Camera ready: TBA
Conference: September 26-28 2021
Topics of interest include, but are not limited to the following:
Blockchains and blockchain technologies
Consensus protocols
Permissioned blockchains
High-performance transaction processing
Centralized and decentralized exchanges
Mechanism design for blockchains
Threat models and attacks
Game-theoretic analysis of blockchains
Cryptoassets
Client and network security
Security analysis of operational systems
Custody solutions
Anonymity and privacy
Metrics, measurements, and network forensics
Proof-of-work, -stake, -burn, and alternatives
Smart contracts and applications
Smart contract security: formal analysis, correct by design, security frameworks
Scalability issues and solutions
User studies
Technical repercussions of economic, legal, ethical, regulatory, and societal aspects
Transaction graph analysis
Financial markets
Relationship to traditional payment systems
Fraud detection and financial crime prevention
Case studies (e.g., of adoption, attacks, forks, scams, etc.)
Applications of blockchain and cryptocurrencies
Censorship resistance
Quantum-resistant cryptography, quantum algorithms and quantum cryptography in financial technologies
Hardware to aid financial technologies
Submissions Policy
All submissions must be original work; the submitter must clearly document any overlap with previously published or simultaneously submitted papers from any of the authors. Failure to point out and explain overlap will be grounds for rejection. Simultaneous submission of the same paper to another venue with proceedings or a journal is not allowed and will be grounds for automatic rejection. Contact the program committee chairs if there are questions about this policy.

SoK
We welcome Systemization of Knowledge (SoK) papers. These are not surveys of prior academic work but rather organization of results presented informally by the open-source community or used in operational projects. SoK submissions should be clearly marked with an “SoK:” prefix in their title.

Anonymous Submission
Papers must be submitted in a form suitable for anonymous review: no author names or affiliations may appear on the title page, and papers should avoid revealing their identity in the text. When referring to your previous work, do so in the third person, as though it were written by someone else. Only blind the reference itself in the (unusual) case that a third-person reference is infeasible. Publication as a technical report or in an online repository does not constitute a violation of this policy. Contact the program chairs if you have any questions. Papers that are not properly anonymized may be rejected without review.

Conflict of Interest
During submission of a research paper, the submission site will request information about conflicts of interest of the paper’s authors with program committee (PC) members. It is the full responsibility of all authors of a paper to identify all and only their potential conflict-of-interest PC members, according to the following definition. A paper author has a conflict of interest with a PC member when and only when one or more of the following conditions holds:

The PC member is a co-author of the paper.
The PC member has been a co-worker in the same company or university within the past two years.
For student interns, the student is conflicted with their supervisors and with members of the same research group. If the student no longer works for the organization, then they are not conflicted with a PC member from the larger organization.
The PC member has been a collaborator within the past two years.
The PC member is or was the author’s primary thesis advisor, no matter how long ago.
The author is or was the PC member’s primary thesis advisor, no matter how long ago.
The PC member is a relative or close personal friend of the author.
For any other situation where the authors feel they have a conflict with a PC member, they must explain the nature of the conflict to the PC chairs, who will mark the conflict if appropriate. Papers with incorrect or incomplete conflict of interest information as of the submission closing time are subject to immediate rejection.

When a program co-chair is conflicted, the other co-chair will be responsible for managing that paper. When both program co-chairs are in conflict, a committee member will be appointed to handle the paper. Program co-chairs are not allowed to be authors or co-authors of any submissions.

Human Subjects and Ethical Considerations
Submissions that describe experiments on human subjects, that analyze data derived from human subjects (even anonymized data), or that otherwise may put humans at risk or affect financial situation of humans in existing systems, must:

Disclose whether the research received an approval or waiver from each of the authors’ institutional ethics review boards (IRB) if applicable.
Discuss steps taken to ensure that participants and others who might have been affected by an experiment were treated ethically and with respect.
If the submission deals with vulnerabilities (e.g., software vulnerabilities in a given program or design weaknesses in a hardware system), the authors need to discuss in detail the steps they have taken or plan to take to address these vulnerabilities (e.g., by disclosing vulnerabilities to the vendors). The same applies if the submission deals with personal identifiable information (PII) or other kinds of sensitive data. If a paper raises significant ethical and legal concerns, it might be rejected based on these concerns.

Page Limit and Formatting
Submitted papers may include up to 12 pages of text in double-column ACM format (see https://www.acm.org/publications/proceedings-template), and unlimited pages for references and appendices. Latex submissions should use the sigconf template.
All submissions will be automatically checked for conformance to these requirements. Failure to adhere to the page limit and formatting requirements are grounds for immediate rejection.

A total of 13 pages is allowed for camera-ready papers. Appendices will be read at the reviewers’ discretion.

Submission
Submissions must be in Portable Document Format (.pdf). Authors should pay special attention to unusual fonts, images, and figures that might create problems for reviewers. Your document should render correctly in Adobe Reader 9 and when printed in black and white.

Conference Submission Server
TBA
Publication and Presentation
Authors are responsible for obtaining appropriate publication clearances. At least one of the authors of the accepted paper is expected to register for the conference. In the event of an in-person meeting, one of the authors is expected to attend and deliver a presentation at the meeting. Authors may contact the program chairs directly to enquire about exceptions.

For comments and questions please email chairs@aft.acm.org

Related Resources

SPIE-Ei/Scopus-DMNLP 2025   2025 2nd International Conference on Data Mining and Natural Language Processing (DMNLP 2025)-EI Compendex&Scopus
ICoSR 2025   2025 4th International Conference on Service Robotics
ACM SAC 2025   40th ACM/SIGAPP Symposium On Applied Computing
COIT 2025   5th International Conference on Computing and Information Technology
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
MSEJ 2024   Advances in Materials Science and Engineering: An International Journal
CFEM AI 2024   Cornell Financial Engineering 2024 Conference Call For Papers
ADMA 2024   20th International Conference Advanced Data Mining and Applications
ICDTHT 2025   ICDTHT´25 - The 2025 International Conference on Demographic Transition, Health and Technologies