ICAIS 2021 CALL FOR WORKSHOP/SESSION PROPOSALS

发布者:袁铭扬发布时间:2020-07-31浏览次数:732

  

(Dublin, Ireland) 


The 7th International Conference on Artificial Intelligence and Security (ICAIS 2021), will be held in Dublin, Ireland, in July 2021. Over the past six years, ICAIS has become a leading conference on artificial intelligence and security, garnering comprehensive coverage in July 2019 by Reuters and in June 2018 by CCTV 4 China News. ICAIS is a highly selective and premier international forum on computer science and engineering research. In addition to the main sessions, the conference will include workshops, panels, demonstrations, and exhibits. The organizing committee is excited to invite you to take part in ICAIS 2021, to discuss issues at the technological frontier of society today as well as interdisciplinary technological trends.


       
   



(ICAIS 2020)


(Reuters reported the ICAIS 2019)


(CCTV 4 China News reported the ICCCS 2018)


We invite proposals for workshops that will provide forums for researchers, engineers and scientists from all communities (academia, industry, standards organizations) to present their latest research findings, novel ideas, and valuable comments in specific areas of interests.


Topics



             

             

             

             

Topics of interest include, but are not limited to:

1.Artificial Intelligence


   

   

 

Machine Learning

Natural Language Processing

Computer Vision

Data Mining

Artificial Neural Networks

Affective Computing

Multiagent Systems

Planning

Knowledge Representation

Reasoning

Robotics and Reception

Artificial Intelligence Applications in Science, Engineering, Healthcare and Medicine


 

2. Big Data


   

   

 

Techniques, Models and Algorithms for Big Data

Tools and Systems for Big Data

Big Data Analytics and Social Media

Hardware/Software Infrastructure for Big Data

Mobile Communications and Networks

Security and Privacy for Big Data

Copyright Protection for Big Data

Data Compression

Machine Learning and AI for Big Data

Big Data Persistence and Preservation

Big Data Quality and Provenance Control

Big Data Storage and Retrieval

Big Data Applications


 

3. Cloud Computing and Security


   

   

 

Cloud Computing Architecture and Systems

Cloud Computing Models, Simulations, Designs, and Paradigms

Cloud Management and Operations

Dynamic Resource Provision and Consuming

Cloud Computing Technologies, Services and Applications

Security Evaluation and Benchmarks Based on Cloud

Authentication, Authorization and Reliability Issues in Cloud

Security and Privacy in Cloud Computing


 

4. Information Hiding


   

   

 

Coverless Information Hiding

Steganography and Steganalysis

Digital Watermarking, Fingerprinting and Forensics

Multimedia Authentication and Encryption

Covert/Subliminal Channels


 

5. IoT Security


   

   

 

Data Security and Privacy in the IoT

Attacks and Countermeasures on IoT Systems

Trust Model, Data Aggregation and Information Sharing

Secure Hardware and Software for IoT

Application Security for IoT


 

6. Multimedia Forensics


   

   

 

Active and Passive Forensics

Big Data Forensics

Portable electronic device forensics

Network Forensics

Anti-forensics


 

7. Encryption and Cybersecurity


   

   

 

Measurements for Cybersecurity

Post Quantum Cybersecurity

Visualization for Security

Applied Cryptography

Language-based Security


 

8. Block Chain Technology


   

   

 

Block chain Technology Innovation and Application

Block chain Encryption

Block chain Privacy Protection

Block chain Auditing and Forensics

Block chain and Bitcoin Security


 



             

             

             

             

Benefits of Accepted Workshop Proposal


             

             

             

             
       
 


Provide same benefits with the main conference;

       
 


Accepted outstanding papers could be recommended to be published in SCI indexed journals;

       
 


Accepted regular papers could be published on LNCS (EI indexed);

       
 


Accepted short papers could be published on international academic journals.


             

             

             

             

Submission Guidelines


             

             

             

             
           
 


Title;

       
 


Abstract: 200 word summary of the workshop purpose;

       
 


Topics: What topics of interest will be covered by the workshop;

       
 


Chair(s): Name, affiliation, email address, homepage and short (one paragraph) biography of each chair (at least one member of chairs comes from oversea);

       
 


Program Committee: Names and affiliations of potential PC members.

       
 


Proposal Submission:Please download ICAIS workshop template in our official website and send to Prof.Baowei Wang, Email: wang@nuist.edu.cn or Prof.Lingyun Xiang,Email: xiangly210@163.com



             

             

             

             



   

Review Criteria


   

The decision on acceptance or rejection of a workshop proposal will be made on the basis of the overall quality of the proposal and its appeal to a reasonable fraction of the artificial intelligence, cloud computing, and cyber security community. Other factors, such as overlap with other workshop proposals, or the number of attendances, will also be taken into account when making the final decision.



(ICAIS 2020)

The workshop organizer(s) will be responsible for promoting the workshops in communities and moderating the workshop.



   




   

Publication


 

Outstanding papers will be invited for possible publication in SCI-indexed journals.

All accepted papers will be published in Springer LNCS and other journals.



   

Important Dates

Workshop proposals due:

August 10, 2020

Notification of accepted proposals:

August 15, 2020



   

Contact Information


               

               

               

               

Prof.Baowei Wang, ICAIS 2021 Workshop Chair.  

Email: wang@nuist.edu.cn


Prof.Lingyun Xiang, ICAIS 2021 Workshop Chair.  

Email: xiangly210@163.com