Scopes
(Topics include but are not limited to)
Topic 1: Cybersecurity
Communication Engineering
Identity Access Management
Cyber Physical System Security
access control
Information System Security and Management
Social network security, privacy, and trust
computer network and communication
Signal and Image Processing
Information security algorithms and protocols
Embedded System Security
Cloud and edge computing Security
Blockchain Security and Privacy
Intellectual Property Protection
Topic 2: Cryptography
cryptographic protocol
Cryptography
cryptanalysis
Encryption and encoding
untraceability
Privacy and authentication
Key Management
Trust Management
cryptography
Secure computing intelligence
Artificial Immune System
Biology and Evolutionary Computing
Intelligent agents and systems
Reinforcement and Unsupervised Learning
Autonomous Computing
coevolutionary algorithm
fuzzy system
Biometric Security
Trust Model and Metrics
Regulatory and trust mechanisms
data integrity
Identity verification, trust, and authorization model
Wireless Network Security
Information Hiding
Topic 3: Quantum Computing
Quantum Algorithm and Machine Learning
Quantum programming
quantum optics
quantum control
quantum information processing
Quantum tensor network
Quantum error correction and mitigation
Fault-tolerant quantum computing
Hybrid quantum classical system
Quantum Computing and Network Security
Topic 1: Cybersecurity
Communication Engineering
Identity Access Management
Cyber Physical System Security
access control
Information System Security and Management
Social network security, privacy, and trust
computer network and communication
Signal and Image Processing
Information security algorithms and protocols
Embedded System Security
Cloud and edge computing Security
Blockchain Security and Privacy
Intellectual Property Protection
Topic 2: Cryptography
cryptographic protocol
Cryptography
cryptanalysis
Encryption and encoding
untraceability
Privacy and authentication
Key Management
Trust Management
cryptography
Secure computing intelligence
Artificial Immune System
Biology and Evolutionary Computing
Intelligent agents and systems
Reinforcement and Unsupervised Learning
Autonomous Computing
coevolutionary algorithm
fuzzy system
Biometric Security
Trust Model and Metrics
Regulatory and trust mechanisms
data integrity
Identity verification, trust, and authorization model
Wireless Network Security
Information Hiding
Topic 3: Quantum Computing
Quantum Algorithm and Machine Learning
Quantum programming
quantum optics
quantum control
quantum information processing
Quantum tensor network
Quantum error correction and mitigation
Fault-tolerant quantum computing
Hybrid quantum classical system
Quantum Computing and Network Security
Important Dates/重要日期
- Submission Deadline: 2025/7/2
- Registration Deadline: 2025/7/7
- Conference Date: 2025/7/10
- Notification Date: About a week after the submission
Submission Portal/投稿方式
Mail Address: icsm_info@126.com
If you have any question or need any assistance regarding the conference, please feel free to contact our conference specialists:
谢老师
+86-15528045772(微信同号)
3825393354
--
+86---(微信同号)
--