Conference Topics

 

AISIS is an annual conference which aims to present the latest research and results of scholars and experts related to Artificial Intelligence, Intelligent Systems, and Information Security. Topics of interest for submission include, but are not limited to:

Track 1: System Security
◇ Intelligent Perception and Security Situation Analysis
◇ Automated Security
◇ Network and System Security
◇ Distributed Intelligent Security Coordination
◇ Multi-Agent Systems
◇ Network Resource Management
◇ Network Intelligence
◇ Cloud/Edge/Endpoint Integration
◇ Unmanned Systems Swarm
◇ Cloud Security
◇ Security Vulnerability Detection
◇ AI-Driven Security Protection
◇ Cloud and Virtualization Security
◇ Risk Assessment
◇ Generative Artificial Intelligence Security
◇ Mobile Edge Intelligence
Track 2: Information Security
◇ Edge Computing and IoT Security
◇ Mobile Edge Computing Security
◇ Data Privacy Protection
◇ Encryption Technology
◇ Anonymous Communication
◇ Security Authentication
◇ Privacy and Blockchain Technology
◇ Quantum Communication Security
◇ Zero Trust Network Security
◇ Software-Defined Networking (SDN) Security and Communication Assurance
◇ Biometric Recognition Technology
◇ 5G/6G Network Security
◇ Wireless Communication Security
◇ Federated Learning and Privacy-Preserving Design
◇ Human-Machine Intelligent Interaction Security
Track 3: Artificial Intelligence and Machine Learning
◇ Artificial Intelligence Algorithms
◇ Machine Learning Models and Applications
◇ Deep Learning Technology
◇ Explainable Artificial Intelligence (XAI)
◇ Reinforcement Learning
◇ AI-Driven Security Protection
◇ Natural Language Processing (NLP)
◇ Automated Decision-Making Systems
◇ Federated Learning Technology
◇ Artificial Intelligence Ethics and Governance
Track 4: Intelligent Systems and Robotics
◇ Autonomous Intelligent Systems
◇ Multi-Robot Systems
◇ Intelligent Sensing Technology
◇ Human-Robot Collaboration and Interaction
◇ Intelligent Control and Decision-Making
◇ Robot Safety Applications
◇ Swarm Intelligence Systems
◇ Edge and Cloud Intelligence Integration
◇ Intelligent Systems in Industry and Healthcare
Track 5: Communication and Network Security
◇ Network Attack and Defense Techniques
◇ Intrusion Detection and Response
◇ Software-Defined Networking Security
◇ 6G and Future Network Security
◇ Network Protocol Security
◇ Wireless and Mobile Network Security
◇ Blockchain and Network Security
◇ Network Security Monitoring and Situation Awareness
◇ Secure Communication Protocols
Track 6: Data Security and Privacy Protection
◇ Data Encryption and Key Management
◇ Privacy Protection Technologies
◇ Secure Multi-Party Computation (SMPC)
◇ Big Data Security Governance
◇ Cloud Data Security
◇ Data Breach Detection and Response
◇ Data Anonymization and De-identification
◇ Access Control and Security Audit
◇ Privacy Regulations and Compliance