ICAIS2019
  • Home
  • Committees
  • Keynote Speakers
  • Program
  • News
  • History
  • Travel & Hotels
    • Accommodation
    • Conference Tour
call for papers Close Back    
  • Home
  • Committees
  • Keynote Speakers
  • Program
  • News
  • History
  • Travel & Hotels
    • Back  
    • Accommodation
    • Conference Tour
Call For Paper
Call For Paper
Workshops
Workshops
Submission
Submission
Registration
Registration
Proceedings
Free Conference Proceedings
Important Dates
 
Paper Submission Due:
November 10, 2018

Notification of Acceptance:
December 1, 2018
 
Registration Due:
December 17, 2018

Camera-Ready Paper Due:
December 31, 2018
 
Conference Date:
July 26-28, 2019
 
Sponsors
    ACM-logo
    200px-The_logo_of_Nanjing_University_of_Information_Science_and_Technology副本
    123
    Michigan_State_University
    UCA
    ubs
    Logo_National_Cheng_Kung_University
    National_Dong_Hwa_University_logo.svg副本
    NSFC
    静宜大学
    中国电子学会
    isn
    南航
    jscs
    tsp logo
    Call for Papers
    + 查看更多
     
    Call For Papers-ICAIS.pdf
     
    The 5th International Conference on Artificial Intelligence and Security (ICAIS 2019),  formerly called the International Conference on Cloud Computing and Security (ICCCS),  will be held in July 26-28, 2019 at New York University, New York, USA. Over the past four years, ICCCS has become a leading conference on artificial intelligence and security, garnering comprehensive coverage in June 2018 by CCTV 4 China News. ICAIS is a highly selective and premier international forum on computer science and engineering research. In addition to the main sessions, the conference will include workshops, panels, demonstrations, and exhibits. The organizing committee is excited to invite you to take part in ICAIS 2019, to discuss issues at the technological frontier of society today as well as interdisciplinary technological trends.
     
    Topics of interest include, but are not limited to:
     
    1. Artificial Intelligence
    • Machine Learning
    • Natural Language Processing
    • Computer Vision
    • Data Mining
    • Artificial Neural Networks
    • Affective Computing
    • Multiagent Systems
    • Planning
    • Knowledge Representation
    • Reasoning
    • Robotics and Reception
    • Big Data Applications
    • Artificial Intelligence Applications in Science, Engineering, Healthcare and Medicine
     
    2. Big Data
    • Techniques, Models and Algorithms for Big Data
    • Tools and Systems for Big Data
    • Big Data Analytics and Social Media
    • Hardware/Software Infrastructure for Big Data
    • Mobile Communications and Networks
    • Security and Privacy for Big Data
    • Copyright Protection for Big Data
    • Data Compression
    • Machine Learning and AI for Big Data
    • Big Data Persistence and Preservation
    • Big Data Quality and Provenance Control
    • Big Data Storage and Retrieval
     
    3. Cloud Computing and Security
    • Cloud Computing Architecture and Systems
    • Cloud Computing Models, Simulations, Designs, and Paradigms
    • Cloud Management and Operations
    • Dynamic Resource Provision and Consuming
    • Cloud Computing Technologies, Services and Applications
    • Security Evaluation and Benchmarks Based on Cloud
    • Authentication, Authorization and Reliability Issues in Cloud
    • Security and Privacy in Cloud Computing
     
    4. Information Hiding
    • Coverless Information Hiding
    • Steganography and Steganalysis
    • Digital Watermarking, Fingerprinting and Forensics
    • Multimedia Authentication and Encryption
    • Covert/Subliminal Channels
     
    5. IoT Security
    • Data Security and Privacy in the IoT
    • Attacks and Countermeasures on IoT Systems
    • Trust Model, Data Aggregation and Information Sharing
    • Secure Hardware and Software for IoT
    • Application Security for IoT
     
    6. Multimedia Forensics
    • Active and Passive Forensics
    • Big Data Forensics
    • Portable electronic device forensics
    • Network Forensics
    • Anti-forensics
     
    7. Encryption and Cybersecurity
    • Measurements for Cybersecurity
    • Post Quantum Cybersecurity
    • Visualization for Security
    • Applied Cryptography
    • Language-based Security
     
    Paper Submission
    1. All submissions must be in English. This year we are accepting Full paper and Short Paper submissions. Full papers, must be at least 12 LNCS pages in length but no more than 15 LNCS pages,including figures and references.  Short papers, must be 4-7 LNCS pages in length, including figures and references.Authors should refer to the conference submission format to prepare their papers.
    2. The submitted papers must not be previously published anywhere, and must not be submitted to any other conferences before and during the ICAIS 2019 review process. For any accepted paper,at least one author must register and attend the conference to present the paper.
     
    Acceptance
    Manuscripts should present the current research in areas identified in the call for papers. All submitted manuscripts will be reviewed by experts in the field and will be judged on problem significance, contributions, originality, correctness, technical strength, quality of presentation, relevance, and value to conference attendees.
     
    Publication
    1. Outstanding papers will be invited for possible publication in SCI-indexed journals.
    2. All accepted papers will be published in LNCS and other journals.
     
    Important Dates
     
    Paper Submission Due:                   November 10, 2018
    Notification of Acceptance:         December 1, 2018
    Registration Due:                             December 17, 2018
    Camera-Ready Paper Due:           December 31, 2018
    Conference Date:                           July 26-28,2019
     
     
    International Conference on Artificial Intelligence and Security
    Tel: +86-(25)-58731244
    Email: icccsconf@yeah.net
    ICAIS WeChat Official Accounts: