Scopes
(The following topics include but are not limited to)
Topic 1: Computer Networks
cloud computing
Higher-order spectral analysis
Hardware Implementation of Signal Processing
Image Processing and Understanding
Computer Vision and Virtual Reality
Multimedia and human-computer interaction
Statistical learning and pattern recognition
Artificial Intelligence and Neural Networks
Internet and wireless communication service providers
Database technology
Parallel, Parallel, and Distributed Systems
Computer Network Technology and Equipment
intelligent network 
Computer and Network Security
Network Engineering and Security
Computer Security And Cryptography 
Computer Network Information Management
network security
Security Theory
Adversarial concept
Network supervision
Wireless Network Security
Network Survivability
Credit and Risk of Electronic Payment
Intelligent security system
Topic 2: Communication
Communication and Information Systems
Antenna and propagation
Algorithm and Architecture of Digital Signal Processor
Green Communication
Communication Theory and Information Theory
microwave communication 
Wireless Sensor Network
Communication system
Optoelectronics and Optical Communication
5G/6G Communication Technology and Mobile Terminals
Application and Development of 5G/6G Industry
satellite communication
Intelligent communication
Design of Ultra Large Scale Integrated Circuits
Topic 3: Information Security
Information leakage
Data tampering
Data deletion
computer virus
Security vulnerabilities
Attack monitoring
Encrypted communication
Information dissemination security
Network isolation
Application Security
Email Security
Anti virus and anti malware software
Network segmentation
Application Security
Behavioral Analysis
Cloud Security
Intrusion prevention system
Mobile device security
Security Information and Event Management
Wireless Security
Intelligent Communication/Information Security
Malicious software and botnets
Communication privacy and anonymity
Distributed Denial of Service
Public Key Infrastructure, Key Management, Credentials
network security
Secure routing, naming/addressing, network management
Security and Privacy in Ubiquitous Computing
Network intrusion detection and prevention, firewall, packet filter
Security and privacy in wired, wireless, mobile, hybrid, sensor, and self-organizing networks
Security and privacy of emerging technologies: VoIP, peer-to-peer, and overlay network systems
Important Dates/重要日期
  • Submission Deadline: December 13, 2025
  • Registration Deadline: December 18, 2025
  • Conference Date: December 28, 2025
  • Notification Date: About a week after the submission
Submission Portal/投稿方式

Mail Address:  icpat_info@163.com

If you have any question or need any assistance regarding the conference, please feel free to contact our conference specialists:

江老师
  • +86-17162867270(微信同号)
  • 3896770362
--
  • +86---(微信同号)
  • --