征稿已开启

查看我的稿件

注册已开启

查看我的门票

已截止
活动简介

International Conference on Computational Intelligence and Security (CIS) is a major annual international conference to bring together researchers, engineers, developers and practitioners from academia and industry working in all areas of two crucial fields in information processing: computational intelligence (CI) and information security (IS), to share the experience, exchange and cross-fertilize ideas. In particular,the series of CIS conference provides an ideal platform to explore the potential applications of CI models, algorithms and technologies to IS.

Following the great success of CIS'2005-2015, the 12th conference CIS'2016 serves as a forum for the dissemination of the state-of-the-art research, development, and implementations of systems, technologies and applications in these two broad fields. CIS'2016 is organized by Jiangnan University. Also, it is co-sponsored by Guangdong University of Technology, Xidian University, and Beijing Normal University, CIS'2016 will be held at Wuxi, China on December 16-19, 2016.

Prospective authors are invited to submit high-quality manuscripts written in English.The submission of a paper implies that the paper is original and has not been submitted to elsewhere for possible publication. All submissions will be blindly reviewed by experts in the field based on originality, significance, quality and clarity. Authors must not reveal any author information in the submitted paper(s), otherwise the paper(s) will be rejected immediately without going through the reviewing process. Authors should use the Latex style files or MS-Word templates to format their papers. The length of a submitted paper should not exceed 5 pages in the two-column format of Conference Publishing Services (CPS).

征稿信息

重要日期

2016-07-15
初稿截稿日期
2016-08-20
初稿录用日期

征稿范围

Computational Intelligence:  
•Artificial Immune Systems 
•Autonomy-Oriented Computing
•Artificial Neural Systems 
•Bayesian earning
•Biological Computing 
•Data Mining
•DNA Computing 
•Evolutionary Programming
•Evolutionary Algorithms 
•Image Understanding
•Intelligent Systems 
•Knowledge Discovery
•Learning Algorithms 
•Machine Learning
•Multi-Agent Systems 
•Multi-Objective EA
•Neural Networks 
•Particle Swarm Optimization
•Probabilistic Reasoning 
•Reinforcement Learning
•Supervised Learning 
•Swarm Intelligence
•Probabilistic Learning   

 

Information Security:  
•Access Control 
•Authentication and Authorization
•Block/Stream Ciphers 
•Cryptography and Coding
•Cryptographic Protocols 
•Cryptanalysis
•Computer Forensics 
•Hash Functions
•Information and System Integrity 
•Intrusion Detection
•Intrusion Detection 
•Internet/Intranet Security
•Information Security Management 
•Key/Identity Management
•Mobile Communications Security 
•Malicious Codes
•Mobile Code & Agent Security 
•Network & Wireless Security
•Public Key Cryptosystems 
•Public Key Infrastructure
•Secret Sharing 
•Security Management Steganography & Watermarking

 

Applications:  
•Anti-Virus 
•Biometrics
•Content Security 
•Cryptography and Applications
•Communication Security 
•Copyright Protection
•Database Security 
•Digital Signatures
•Data Privacy 
•Distributed Systems Security
•Detection of Abnormality 
•Elliptic Curve Cryptosystems
•Information Discovery 
•Mobile Device Security
•Multimedia Security 
•Software Encryption
•System Security 
•Statistical Data Analysis
•Web Privacy and Trust 
•Web Authentication
•Web Security and Integrity

留言
验证码 看不清楚,更换一张
全部留言
重要日期
  • 12月17日

    2016

    会议日期

  • 07月15日 2016

    初稿截稿日期

  • 08月20日 2016

    初稿录用通知日期

  • 12月17日 2016

    注册截止日期

移动端
在手机上打开
小程序
打开微信小程序
客服
扫码或点此咨询