Scopes
(Topics include but are not limited to)
Scientific research based on big data
Algorithms and programming techniques for big data processing
Big data search algorithms and systems
Big data analysis in mobile and ubiquitous computing
Data Mining and Machine Learning Tools
Big data analysis management
Big data analysis, search, and mining
Big data services
Big data encryption
Big Data Open Platform
Big data quality and source control
Basic model of big data
Big data analysis and social media
Big Data Applications: Bioinformatics
The Scientific Application of Big Data
Innovation of big data business models
Network and data security and privacy protection
The technology, models, and algorithms of big data
Tools and systems for big data
Big data visualization analysis
Big data hardware/software infrastructure
Intelligent data processing
Machine learning and big data artificial intelligence
Knowledge Discovery and Data Mining
Intelligent database system
fuzzy control
pattern recognition
Smart communication
Intelligent data processing
Computer Vision and Image Processing
Computer Science and Internet
Network coding, programming language
Cross layer optimization and control
Network access technology
Router and Switch Design
Network based on smart antennas
Smartphones and mobile applications
Network Economics and Pricing
Network management
Network measurement and analysis cognition, cellular and mobile networks
computer simulation
Big data, algorithms
network security
Digital devices and computer components
Active Defense System
Adaptive Defense System
Security system analysis, benchmarking
Applied cryptography
Authentication method
Biometric security
Complex system security
Database and System Security
data protection
Data/System Integrity
Distributed Access Control
Distributed attack system
Denial of service
High performance network virtualization
High performance security system
Security in Cloud and Grid Systems
Security in E-commerce
Security in ubiquitous/ubiquitous computing
Security and Privacy in Smart Grid
Security and Privacy in Wireless Networks
Secure mobile agents and mobile code
Security simulation and tools
Scientific research based on big data
Algorithms and programming techniques for big data processing
Big data search algorithms and systems
Big data analysis in mobile and ubiquitous computing
Data Mining and Machine Learning Tools
Big data analysis management
Big data analysis, search, and mining
Big data services
Big data encryption
Big Data Open Platform
Big data quality and source control
Basic model of big data
Big data analysis and social media
Big Data Applications: Bioinformatics
The Scientific Application of Big Data
Innovation of big data business models
Network and data security and privacy protection
The technology, models, and algorithms of big data
Tools and systems for big data
Big data visualization analysis
Big data hardware/software infrastructure
Intelligent data processing
Machine learning and big data artificial intelligence
Knowledge Discovery and Data Mining
Intelligent database system
fuzzy control
pattern recognition
Smart communication
Intelligent data processing
Computer Vision and Image Processing
Computer Science and Internet
Network coding, programming language
Cross layer optimization and control
Network access technology
Router and Switch Design
Network based on smart antennas
Smartphones and mobile applications
Network Economics and Pricing
Network management
Network measurement and analysis cognition, cellular and mobile networks
computer simulation
Big data, algorithms
network security
Digital devices and computer components
Active Defense System
Adaptive Defense System
Security system analysis, benchmarking
Applied cryptography
Authentication method
Biometric security
Complex system security
Database and System Security
data protection
Data/System Integrity
Distributed Access Control
Distributed attack system
Denial of service
High performance network virtualization
High performance security system
Security in Cloud and Grid Systems
Security in E-commerce
Security in ubiquitous/ubiquitous computing
Security and Privacy in Smart Grid
Security and Privacy in Wireless Networks
Secure mobile agents and mobile code
Security simulation and tools
Important Dates | 重要日期
- Submission Deadline: 2024.12.9
- Registration Deadline: 2024.12.14
- Conference Date: 2024.12.29
- Notification Date: About a week after the submission
Submission Portal | 投稿方式
Mail Address: infpox_info@126.com
If you have any question or need any assistance regarding the conference, please feel free to contact our conference specialists:
张老师
17162863232
3771563441
--
--
--
Indexing Service | 索引服务

Follow Us | 联系我们

张老师
--