Scopes
Cryptography:
Password Protocol
Encryption and encoding
Untraceability
Privacy and authentication
Key management
Trust management
Quantum cryptography
Security computing intelligence
Artificial immune system
Biological and evolutionary computing
Intelligent agents and systems
Reinforcement and unsupervised learning
Autonomous oriented computing
Collaborative Evolution Algorithm
Fuzzy system
Biometric security
Trust models and metrics
Regulatory and trust mechanisms
Data integrity
Identity verification, trust, and authorization models
Wireless network security
Information hiding
Electronic Commerce
Data and System Integrity
Network:
Energy saving heterogeneous network
Wireless sensor network
Opportunistic network
Cognitive Radio Network
Network security, etc
Information Technology:
Pattern recognition
Data mining
Information Systems and Technology
The application of information technology
Intelligent robots and autonomous agents
Modeling and Simulation
Data mining
Computational Biology and Bioinformatics
Soft computing
Computer Architecture
Design Systems and Algorithms
Internet technology
Information Technology Management
Wireless communication and mobile computing
Human-computer interaction
Signal and image processing, etc
Password Protocol
Encryption and encoding
Untraceability
Privacy and authentication
Key management
Trust management
Quantum cryptography
Security computing intelligence
Artificial immune system
Biological and evolutionary computing
Intelligent agents and systems
Reinforcement and unsupervised learning
Autonomous oriented computing
Collaborative Evolution Algorithm
Fuzzy system
Biometric security
Trust models and metrics
Regulatory and trust mechanisms
Data integrity
Identity verification, trust, and authorization models
Wireless network security
Information hiding
Electronic Commerce
Data and System Integrity
Network:
Energy saving heterogeneous network
Wireless sensor network
Opportunistic network
Cognitive Radio Network
Network security, etc
Information Technology:
Pattern recognition
Data mining
Information Systems and Technology
The application of information technology
Intelligent robots and autonomous agents
Modeling and Simulation
Data mining
Computational Biology and Bioinformatics
Soft computing
Computer Architecture
Design Systems and Algorithms
Internet technology
Information Technology Management
Wireless communication and mobile computing
Human-computer interaction
Signal and image processing, etc
Important Dates | 重要日期
- Submission Deadline: 2025.5.4
- Registration Deadline: 2025.5.9
- Conference Date: 2025.5.24
- Notification Date: About a week after the submission
Submission Portal | 投稿方式
Mail Address: ei_iceepe@126.com
If you have any question or need any assistance regarding the conference, please feel free to contact our conference specialists:
唐老师
17168296597
3264234551
田老师
17162865530
3766818743
Indexing Service | 索引服务

Follow Us | 联系我们

唐老师

田老师