[EI Call for Papers | ACM Publishing] 2023 International Academic Conference on Artificial Intelligence, Systems and Network Security (AISNS 2023)

2023 International Academic Conference on Artificial Intelligence, Systems and Network Security (AISNS 2023)

2023 International Conference on Artificial Intelligence, Systems and Network Security

The 2023 International Academic Conference on Artificial Intelligence, Systems and Network Security (AISNS 2023) hosted by the School of Computer Science and Technology of Southwest University of Science and Technology will Held in Mianyang City from December 22 to 24, 2023, this conference mainly focused on discussions in the research fields of artificial intelligence, systems, and network security. The conference aims to provide a platform for experts and scholars, engineering technicians, and technology R&D personnel engaged in related scientific research fields to share scientific research results and cutting-edge technologies, understand academic development trends, broaden research ideas, strengthen academic research and discussion, and promote industrialization cooperation of academic achievements. platform. The conference sincerely invites experts and scholars from universities and scientific research institutions at home and abroad, business people and other relevant personnel to participate in the conference and exchange. Attendees can not only listen to wonderful reports by well-known experts at home and abroad, but also participate in face-to-face exchanges and discussions with experts and scholars from all over the world.

Important information

Official website of the conference:www.aisns.org (click to learn more about participation/submission)

Conference time: December 22-24, 2023

Last round submission deadline: December 15, 2023

Acceptance notice: seven working days after submission   

Meeting location: China-Mianyang

Inclusion and search: EI Compendex, Scopus


*More detailed conference information, submission discounts, submission matters, priority review[Click to receive]


Support Units

Paper publication

ACM.jpg

After the conference submissions are strictly reviewed by 2-3 experts from the organizing committee, the final accepted papers will beACM ICPS (ACM International Conference Proceeding Series) (ISBN: 979- 8-4007-1696-6)Publish the proceedings and submit them to EI Compendex and Scopus for retrieval. At present, the conference paper retrieval is very stable.

◆ Article template:[Download]

◆ Papers must be formatted according to the template on the official website of the conference, and the number of pages should not be less than 4 pages.

◆ The conference only accepts manuscripts written in English. If you need translation or language editing services,you can contact the conference secretary.

◆ After acceptance and payment, the organizing committee will check the manuscript for plagiarism. The plagiarism checking system is CrossCheck, Turnitin. The author can also check for plagiarism at his own expense. The authors will be solely responsible for rejections caused by duplication of articles, and papers suspected of plagiarism will not be published.

Call for Papers Topic

* Artificial Intelligence (artificial intelligence algorithms, natural language processing, fuzzy logic, computer vision and image understanding, signal and image processing, speech Related to natural language processing, computational learning theory, information retrieval and fusion, hybrid intelligent systems, intelligent system architecture, knowledge representation, knowledge-based systems, mechatronics, multimedia and cognitive informatics, artificial neural network parallel processing, pattern recognition, Ubiquitous computing and ambient intelligence, soft computing theory and applications, software and hardware architecture, automatic programming, machine learning, automatic control, data mining and machine learning tools, robotics, artificial intelligence tools and applications, recent trends and developments, etc.)< /span>

Computer network security (active defense system, adaptive defense system, security system analysis, benchmark, applied cryptography, authentication method, Biometric security, complex systems security, database and system security, data protection, data/system integrity, distributed access control, distributed attack systems, denial of service, high-performance network virtualization, high-performance security systems, cloud and grid Security in systems, security in e-commerce, security in ubiquitous/ubiquitous computing, security and privacy in smart grids, security and privacy in wireless networks, secure mobile agents and mobile code , security simulations and tools, trusted computing, etc.)

Computer system (operating system, distributed system, database system, network system, compilation system, computer architecture, virtualization technology , container technology)

Any other related topics can be submitted

How to participate

1. Author participation: One author of an accepted article is allowed to attend the conference for free;
2. Reporting method: oral report or poster presentation must be chosen; 6. Audience participation: just attend the conference without submitting papers, you can also apply for speeches and presentations. 5. Report registration: please pay close attention Pay attention to the conference announcements and conference email notifications on this page, and be notified 1-2 weeks before the conference to register for the conference and choose the reporting method. 4. Poster Display: Application for poster display must be sent to the conference email [email protected] at least one week before the meeting. Requirements: A1 size, vertical version, color, png format;
3. Oral report: To apply for an oral report, you need to contact the conference teacher to register at least 10 days before the meeting. The time is 10-15 minutes and you need to prepare a PPT report;


Guess you like

Origin blog.csdn.net/qq_57563030/article/details/134854703