2025电子信息、网络安全与密码学国际会议(ICEINSC 2025)
2025 International Conference on Electronic Information, Network Security, and Cryptography
Submission Deadline
2024.12.15
Registration Deadline
2024.12.20
Conference Date
2025/01/05
Notification Date: About a week after the submission
城市: 北京
距会议开始还有
0
天
00
时
00
分
00
秒
欢迎投稿~
Scopes
(Topics include but are not limited to)
Topic 1: Electronic Information
power electronic technology
Communication signal processing
Radar Engineering
digital signal processing
Microwave Technology and Antennas
Electromagnetic Fields and Waves
Signal and Image Processing
Automatic control and intelligent control
Computer and Network Technology
Network and Office Automation Technology
multimedia technology
Microcontroller technology
Electronic System Design Process
Electronic Design Automation (EDA) Technology
digital signal processing
Topic 2: Cybersecurity
Artificial Intelligence Algorithm
natural language processing
fuzzy logic
Computer Vision and Image Understanding
Signal and image processing
Speech and Natural Language Processing
Computational Learning Theory
Information Retrieval and Fusion
Hybrid intelligent system
Intelligent System Architecture
knowledge representation
Knowledge-based system
Mechatronics integration
Multimedia and Cognitive Informatics
Parallel processing of artificial neural networks
pattern recognition
Ubiquitous computing and environmental intelligence
Theory and application of soft button tungsten carbide calculation
Software and hardware architecture
automatic programming
machine learning
Auto-Control
Data Mining and Machine Learning Tools
Robotics
Artificial Intelligence Tools and Applications
Recent trends and developments
Topic 3: Cryptography
Password Protocol
Encryption and Encoding
Untraceability
Privacy and authentication
key management
Trust Management
Quantum cryptography
Secure computing intelligence
Artificial immune system
Biology and Evolutionary Computing
Intelligent agents and systems
Reinforcement and Unsupervised Learning
Autonomous Computing
Collaborative Evolutionary Algorithm
fuzzy system
Biometric Security
Trust Model and Metrics
Regulatory and trust mechanisms
Data integrity
Identity verification, trust, and authorization model
Wireless Network Security
information hiding
Electronic Commerce
Data and system integrity
Topic 1: Electronic Information
power electronic technology
Communication signal processing
Radar Engineering
digital signal processing
Microwave Technology and Antennas
Electromagnetic Fields and Waves
Signal and Image Processing
Automatic control and intelligent control
Computer and Network Technology
Network and Office Automation Technology
multimedia technology
Microcontroller technology
Electronic System Design Process
Electronic Design Automation (EDA) Technology
digital signal processing
Topic 2: Cybersecurity
Artificial Intelligence Algorithm
natural language processing
fuzzy logic
Computer Vision and Image Understanding
Signal and image processing
Speech and Natural Language Processing
Computational Learning Theory
Information Retrieval and Fusion
Hybrid intelligent system
Intelligent System Architecture
knowledge representation
Knowledge-based system
Mechatronics integration
Multimedia and Cognitive Informatics
Parallel processing of artificial neural networks
pattern recognition
Ubiquitous computing and environmental intelligence
Theory and application of soft button tungsten carbide calculation
Software and hardware architecture
automatic programming
machine learning
Auto-Control
Data Mining and Machine Learning Tools
Robotics
Artificial Intelligence Tools and Applications
Recent trends and developments
Topic 3: Cryptography
Password Protocol
Encryption and Encoding
Untraceability
Privacy and authentication
key management
Trust Management
Quantum cryptography
Secure computing intelligence
Artificial immune system
Biology and Evolutionary Computing
Intelligent agents and systems
Reinforcement and Unsupervised Learning
Autonomous Computing
Collaborative Evolutionary Algorithm
fuzzy system
Biometric Security
Trust Model and Metrics
Regulatory and trust mechanisms
Data integrity
Identity verification, trust, and authorization model
Wireless Network Security
information hiding
Electronic Commerce
Data and system integrity
Important Dates/重要日期
- Submission Deadline: 2024.12.15
- Registration Deadline: 2024.12.20
- Conference Date: 2025/01/05
- Notification Date: About a week after the submission
Submission Portal/投稿方式
Mail Address: ieiper@126.com
If you have any question or need any assistance regarding the conference, please feel free to contact our conference specialists:
谢老师
- +86-15528045772(微信同号)
- 3825393354
--
- +86---(微信同号)
- --