International Conference on Computational Intelligence and Security (CIS) is a major annual international conference to bring together researchers, engineers, developers and practitioners from academia and industry working in all areas of two crucial fields in information processing: computational intelligence (CI) and information security (IS), to share the experience, exchange and cross-fertilize ideas. In particular,the series of CIS conference provides an ideal platform to explore the potential applications of CI models, algorithms and technologies to IS.
Following the great success of CIS'2005-2015, the 12th conference CIS'2016 serves as a forum for the dissemination of the state-of-the-art research, development, and implementations of systems, technologies and applications in these two broad fields. CIS'2016 is organized by Jiangnan University. Also, it is co-sponsored by Guangdong University of Technology, Xidian University, and Beijing Normal University, CIS'2016 will be held at Wuxi, China on December 16-19, 2016.
Prospective authors are invited to submit high-quality manuscripts written in English.The submission of a paper implies that the paper is original and has not been submitted to elsewhere for possible publication. All submissions will be blindly reviewed by experts in the field based on originality, significance, quality and clarity. Authors must not reveal any author information in the submitted paper(s), otherwise the paper(s) will be rejected immediately without going through the reviewing process. Authors should use the Latex style files or MS-Word templates to format their papers. The length of a submitted paper should not exceed 5 pages in the two-column format of Conference Publishing Services (CPS).
Computational Intelligence:
•Artificial Immune Systems
•Autonomy-Oriented Computing
•Artificial Neural Systems
•Bayesian earning
•Biological Computing
•Data Mining
•DNA Computing
•Evolutionary Programming
•Evolutionary Algorithms
•Image Understanding
•Intelligent Systems
•Knowledge Discovery
•Learning Algorithms
•Machine Learning
•Multi-Agent Systems
•Multi-Objective EA
•Neural Networks
•Particle Swarm Optimization
•Probabilistic Reasoning
•Reinforcement Learning
•Supervised Learning
•Swarm Intelligence
•Probabilistic Learning
Information Security:
•Access Control
•Authentication and Authorization
•Block/Stream Ciphers
•Cryptography and Coding
•Cryptographic Protocols
•Cryptanalysis
•Computer Forensics
•Hash Functions
•Information and System Integrity
•Intrusion Detection
•Intrusion Detection
•Internet/Intranet Security
•Information Security Management
•Key/Identity Management
•Mobile Communications Security
•Malicious Codes
•Mobile Code & Agent Security
•Network & Wireless Security
•Public Key Cryptosystems
•Public Key Infrastructure
•Secret Sharing
•Security Management Steganography & Watermarking
Applications:
•Anti-Virus
•Biometrics
•Content Security
•Cryptography and Applications
•Communication Security
•Copyright Protection
•Database Security
•Digital Signatures
•Data Privacy
•Distributed Systems Security
•Detection of Abnormality
•Elliptic Curve Cryptosystems
•Information Discovery
•Mobile Device Security
•Multimedia Security
•Software Encryption
•System Security
•Statistical Data Analysis
•Web Privacy and Trust
•Web Authentication
•Web Security and Integrity
12月17日
2016
会议日期
初稿截稿日期
初稿录用通知日期
注册截止日期
留言