Scopes
(Topics include but are not limited to)
Topic 1: Computer Technology
artificial intelligence
intelligent control
Virtual Reality and Human Computer Interaction
computer animation
software engineering
Computer modeling
Data Models and Methods
Big data search and information retrieval technology
Intelligent information fusion, etc
Topic 2: Cryptography
Password Protocol
Encryption and Encoding
Untraceability
Privacy and authentication
key management
Trust Management
Quantum cryptography
Secure computing intelligence
Artificial immune system
Biology and Evolutionary Computing
Intelligent agents and systems
Reinforcement and Unsupervised Learning
Autonomous Computing
Collaborative Evolutionary Algorithm
fuzzy system
Biometric Security
Trust Model and Metrics
Regulatory and trust mechanisms
Data integrity
Wireless Network Security
Topic Three: Cybersecurity
Communication privacy and anonymity
Distributed Denial of Service
Public Key Infrastructure
key management
credential
network security
Secure routing
Naming/Addressing
Network Management
Security and Privacy in Ubiquitous Computing
Security and Privacy of Emerging Technologies
Information leakage
Data tampering
Topic 1: Computer Technology
artificial intelligence
intelligent control
Virtual Reality and Human Computer Interaction
computer animation
software engineering
Computer modeling
Data Models and Methods
Big data search and information retrieval technology
Intelligent information fusion, etc
Topic 2: Cryptography
Password Protocol
Encryption and Encoding
Untraceability
Privacy and authentication
key management
Trust Management
Quantum cryptography
Secure computing intelligence
Artificial immune system
Biology and Evolutionary Computing
Intelligent agents and systems
Reinforcement and Unsupervised Learning
Autonomous Computing
Collaborative Evolutionary Algorithm
fuzzy system
Biometric Security
Trust Model and Metrics
Regulatory and trust mechanisms
Data integrity
Wireless Network Security
Topic Three: Cybersecurity
Communication privacy and anonymity
Distributed Denial of Service
Public Key Infrastructure
key management
credential
network security
Secure routing
Naming/Addressing
Network Management
Security and Privacy in Ubiquitous Computing
Security and Privacy of Emerging Technologies
Information leakage
Data tampering
Important Dates/重要日期
- Submission Deadline: 2025/7/15
- Registration Deadline: 2025/7/19
- Conference Date: 2025/7/24
- Notification Date: About a week after the submission
Submission Portal/投稿方式
Mail Address: ei_icosip@163.com
If you have any question or need any assistance regarding the conference, please feel free to contact our conference specialists:
谢老师
+86-15528045772(微信同号)
3825393354
--
+86---(微信同号)
--