Scopes
Topic 1: Artificial Intelligence
Robotics
Natural language processing
Machine learning
Pattern recognition
Neural Networks and Support Vector Machines
Fuzzy Control and Systems
Human-computer interaction
Cybersecurity
Expert system
Data mining
Intelligent control and decision-making
Knowledge discovery
Intelligent systems and language
Machine perception
Computer vision
Evolutionary computation
Information retrieval and online search
Adaptive system
Topic 2: Cybersecurity
Malicious software and botnets
Communication privacy and anonymity
Distributed Denial of Service
Public Key Infrastructure
Key Management
Credentials
Cybersecurity
Secure routing
Naming/Addressing
Network management
Security and Privacy in Ubiquitous Computing
Security and Privacy of Emerging Technologies: VoIP
Point to point and overlay network systems
Information leakage
Data tampering
Data deletion
Computer virus
Security vulnerability
Attack monitoring
Encrypted communication
Information dissemination security
Network isolation
Application Security
Email Security
Anti virus and anti malware software
Network segmentation
Application Security
Behavioral Analysis
Cloud security
Intrusion prevention system
Mobile device security
Security Information and Event Management
Wireless security, etc
Topic 3: Information Security
Information System Security and Management
Network Engineering and Security
Information security algorithms and protocols
Blockchain Information Security
Electric power information security
Applied Cryptography
Database security
Risk assessment
Operating System Security
Embedded System Security
IoT security and privacy, etc
Robotics
Natural language processing
Machine learning
Pattern recognition
Neural Networks and Support Vector Machines
Fuzzy Control and Systems
Human-computer interaction
Cybersecurity
Expert system
Data mining
Intelligent control and decision-making
Knowledge discovery
Intelligent systems and language
Machine perception
Computer vision
Evolutionary computation
Information retrieval and online search
Adaptive system
Topic 2: Cybersecurity
Malicious software and botnets
Communication privacy and anonymity
Distributed Denial of Service
Public Key Infrastructure
Key Management
Credentials
Cybersecurity
Secure routing
Naming/Addressing
Network management
Security and Privacy in Ubiquitous Computing
Security and Privacy of Emerging Technologies: VoIP
Point to point and overlay network systems
Information leakage
Data tampering
Data deletion
Computer virus
Security vulnerability
Attack monitoring
Encrypted communication
Information dissemination security
Network isolation
Application Security
Email Security
Anti virus and anti malware software
Network segmentation
Application Security
Behavioral Analysis
Cloud security
Intrusion prevention system
Mobile device security
Security Information and Event Management
Wireless security, etc
Topic 3: Information Security
Information System Security and Management
Network Engineering and Security
Information security algorithms and protocols
Blockchain Information Security
Electric power information security
Applied Cryptography
Database security
Risk assessment
Operating System Security
Embedded System Security
IoT security and privacy, etc
Important Dates/重要日期
- Submission Deadline: 2026.3.9
- Registration Deadline: 2026.3.16
- Conference Date: 2026.3.29
- Notification Date: About a week after the submission
Submission Portal/投稿方式
Mail Address: conf_eeqcis@126.com
If you have any question or need any assistance regarding the conference, please feel free to contact our conference specialists:
唐老师
+86-17168296597(微信同号)
3264234551
--
+86---(微信同号)
--
