Conference Information
CIS 2016 : International Conference on Computational Intelligence and Security
http://www.cis-lab.org/cis2016/index.php
Submission Date:
2016-08-31 Extended
Notification Date:
2016-10-10
Conference Date:
2016-12-17
Location:
Wuxi, China
Years:
12
CORE: c   QUALIS: b3   Viewed: 8547   Tracked: 17   Attend: 1

Conference Location
Advertisment
Call For Papers
International Conference on Computational Intelligence and Security (CIS) is a major annual international conference to bring together researchers, engineers, developers and practitioners from academia and industry working in all areas of two crucial fields in information processing: computational intelligence (CI) and information security (IS), to share the experience, exchange and cross-fertilize ideas. In particular,the series of CIS conference provides an ideal platform to explore the potential applications of CI models, algorithms and technologies to IS.

  Following the great success of CIS'2005-2015, the 12th conference CIS'2016 serves as a forum for the dissemination of the state-of-the-art research, development, and implementations of systems, technologies and applications in these two broad fields. CIS'2016 is organized by Jiangnan University. Also, it is co-sponsored by Guangdong University of Technology, Xidian University, and Beijing Normal University, CIS'2016 will be held at Wuxi, China on December 17-18, 2016.

  Prospective authors are invited to submit high-quality manuscripts written in English.The submission of a paper implies that the paper is original and has not been submitted to elsewhere for possible publication. All submissions will be blindly reviewed by experts in the field based on originality, significance, quality and clarity. Authors must not reveal any author information in the submitted paper(s), otherwise the paper(s) will be rejected immediately without going through the reviewing process. Authors should use the Latex style files or MS-Word templates to format their papers. The length of a submitted paper should not exceed 5 pages in the two-column format of Conference Publishing Services (CPS). The accepted papers will be included in the conference proceedings published by the CPS, and be further submitted to the indexing companies for possible indexing, including EI and ISTP. For your information, all past CIS'2005-CIS'2015 proceedings have been successfully indexed in either SCI or EI. Details can be found at:
http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=7008825.

The accepted papers will be further selected based on its originality and technical quality, and significantly expanded and submitted for inclusion in several International Journals (SCI indexed or EI indexed).  

The topics include but are not limited to: 

Computational Intelligence: 	 
•Artificial Immune Systems 	
•Autonomy-Oriented Computing
•Artificial Neural Systems 	
•Bayesian earning
•Biological Computing 	
•Data Mining
•DNA Computing 	
•Evolutionary Programming
•Evolutionary Algorithms 	
•Image Understanding
•Intelligent Systems 	
•Knowledge Discovery
•Learning Algorithms 	
•Machine Learning
•Multi-Agent Systems 	
•Multi-Objective EA
•Neural Networks 	
•Particle Swarm Optimization
•Probabilistic Reasoning 	
•Reinforcement Learning
•Supervised Learning 	
•Swarm Intelligence
•Probabilistic Learning 	 
  	 
Information Security: 	 
•Access Control 	
•Authentication and Authorization
•Block/Stream Ciphers 	
•Cryptography and Coding
•Cryptographic Protocols 	
•Cryptanalysis
•Computer Forensics 	
•Hash Functions
•Information and System Integrity 	
•Intrusion Detection
•Intrusion Detection 	
•Internet/Intranet Security
•Information Security Management 	
•Key/Identity Management
•Mobile Communications Security 	
•Malicious Codes
•Mobile Code & Agent Security 	
•Network & Wireless Security
•Public Key Cryptosystems 	
•Public Key Infrastructure
•Secret Sharing 	
•Security Management Steganography & Watermarking
  	 
Applications: 	 
•Anti-Virus 	
•Biometrics
•Content Security 	
•Cryptography and Applications
•Communication Security 	
•Copyright Protection
•Database Security 	
•Digital Signatures
•Data Privacy 	
•Distributed Systems Security
•Detection of Abnormality 	
•Elliptic Curve Cryptosystems
•Information Discovery 	
•Mobile Device Security
•Multimedia Security 	
•Software Encryption
•System Security 	
•Statistical Data Analysis
•Web Privacy and Trust 	
•Web Authentication
•Web Security and Integrity 	 
Last updated by Xin Yao in 2016-07-20
Related Publications
Advertisment
Related Conferences
CCFCOREQUALISShortFull NameSubmissionNotificationConference
EECSEuropean Conference on Electrical Engineering and Computer Science2017-10-31 2017-11-17
ACALCIAustralasian Conference on Artificial Life and Computational Intelligence2014-09-202014-10-272015-02-05
cAIAInternational Conference on Artificial Intelligence and Applications2012-10-262012-11-152013-02-11
SIBIRCONInternational Conference on Biomedical Engineering and Computational Technologies2015-08-312015-09-302015-10-28
cCIACInternational Conference on Algorithms and Complexity2012-11-092012-12-202013-05-22
EMSEInternational Conference on Education, Management and Systems Engineering2017-05-11 2017-05-21
VoteIDInternational Conference on E-voting and Identity2015-04-132015-05-262015-09-02
LTB-3DInternational Workshop on Low Temperature Bonding for 3D Integration  2012-05-22
ICCS''International Cloud Computing Summit2012-07-302012-08-302012-10-24
Recommendation