Papers
Call for Papers
Authors are invited to submit contributions for review and possible presentation at this conference on the tracks of interest, including advancements and innovations. Submissions must be in standard IEEE two-column format and must be six pages in length. Only accepted and presented submissions that are in the required format with double-blind reviews will be considered for inclusion in the conference proceeding. All accepted and registered submissions will appear in the proceedings distributed at the conference. Research contributions are welcome and not limited to all tracks pertinent to artificial intelligence and cybersecurity. ICCAI’22 will feature high quality keynotes, plenary talks, technical and industry papers, workshops, tutorials, and demonstrations. The detailed instructions, including due dates, formats, and templates, will be available on the conference website.
Conference Tracks:
Track 1: Cyber security
- Cyber-security and AI
- Cyber-threat intelligence
- Moving target defense
- Network intrusion detection
- Post-quantum security
- Miscellaneous trust issues in cyber Security
- System reverse engineering
- Watermarking and security
- Cryptanalysis and security solutions
Track 2: Security Applications
- Network and cyber security
- Computer security
- Database security
- Web applications security
- Security policy, model and architecture
- Security in social networks
- Security in parallel and distributed systems
- Security in mobile and wireless communications
- Security in cloud/pervasive computing
- Authentication, authorization and accounting
- Security of 5G Networks
- Miscellaneous security issues
- Steganography and steganalysis
- Security-aware facial recognition
Track 3: Privacy
- Privacy in web-based applications and services
- Privacy in database systems
- Privacy in parallel and distributed systems
- Privacy in cloud/pervasive computing
- Privacy in mobile and wireless communications
- Privacy in e-commerce and e-government
- Privacy in network deployment and management
- Privacy and trust
- Privacy and security
- Privacy and anonymity
- Privacy preservation in 5G
- Miscellaneous privacy issues
- Privacy-preserving biometrics
Track 4: Forensics and Analytics
- Anti-forensics and analytics
- Big data forensics
- CCTV forensics
- Cloud forensics
- Computational forensics
- Cyber-physical system forensics
- Data mining for forensics
- Fingerprint forensics
- Image forensics
- Malware forensics
- Mobile app forensics (e.g. Skype, WeChat and Facebook)
- Mobile device forensics
- Multimedia forensics
- Network forensics
Track 5: Cybersecurity Emerging Tech
- Emerging hardware security
- Emerging security problems and solutions in edge/fog computing
- Emerging paradigms of deep learning in security
- Emerging applications of reinforcement learning for securing networks
- Emerging secure mechanisms for service delivery models
- Emerging quantum safe cryptography for 5G
- Emerging techniques in intelligent transportation systems
- Emerging network attacks & anomalies detection and prevention
- Emerging approaches to cybersecurity
- Emerging techniques in identity management
- Emerging approaches of smart contract and distributed ledger
- Emerging blockchain techniques
Track 6: Artificial Intelligence
- Deep Learning
- Neural Networks
- Fuzzy Logic
- Expert Systems
- Computational Intelligence
- Natural Language Processing
- Data Mining
- Neuromorphic systems
- Biometrics
- Sentiment Analysis
Track 7: Machine Vision
- Human Computer Interaction
- Pattern Recognition
- Image/Video Processing
- Brain-Machine Interface
- Geographic Information Systems
- Signal Processing
- Medical Diagnosis
- Segmentation Techniques
- Augmented/Virtual Reality
Track 8: Robotics
- Humanoid Robots
- Space and underwater robots
- Assistive Robots
- Mobile Robots
- Autonomous Robots
- Human-Robot Interaction
- Telerobotics
- Walking and Climbing Robots
- Robotic Automation
- Robot Localization and Map Building
Track 9: Ambient Intelligence
- Smart Cities
- Internet of Things
- Ambient Assisted Living
- Smart Healthcare
- Intelligent Transportation
- Data Science
- Sensing and Sensor Networks
- Affective computing
- Agents and Multi-agent Systems
- Context-aware pervasive systems