Scopes
Topic 1: Computational Modeling and Simulation
Modeling Tools and Languages
Modeling and simulation methods
Visual and Visualization Technology
Perception issues in visualization and modeling
Mathematical and Numerical Methods in Simulation and Modeling
Simulation algorithm
High performance computing and simulation
Universal Computing and Simulation
Discretization and numerical simulation
Intelligent Computing and Simulation
Parallel and Distributed Computing Simulation
Real time modeling and simulation
Modeling of Chaotic Systems
Analysis and Control
Dynamic modeling and simulation
Web-based simulation
Simulation optimization
Simulator
Intelligent System Modeling and Simulation
Modeling and Simulation of Complex Systems
Power system simulation
Environmental modeling and simulation
Computer Games and Simulation
Artificial Intelligence Simulation Technology
Medical simulation
Virtual Technology and Applications
Digital Twin
Process Engineering Modeling
Simulation and Modeling in Molecular Biology
Traffic Engineering Simulation
Aerospace System Simulation
Information Engineering Simulation
Materials Engineering Simulation
Modeling and simulation technology, other applications, etc
Topic 2: Information Security
Information System Security and Management
Network Engineering and Security
Information security algorithms and protocols
Blockchain Information Security
Electric power information security
Applied Cryptography
Database security
Risk assessment
Operating System Security
Embedded System Security
IoT security and privacy, etc
Topic 3: Privacy Protection
Privacy technologies and mechanisms
Security and Privacy Metrics
Security and Privacy Policy
The Theory and Foundation of Privacy Computing
Programming languages and compilers for privacy computing
Privacy computing model
Privacy quantification, formal description
Privacy Information Engineering, Providers, Collectors, and Users
Privacy Operations and Modeling
Data utility and privacy loss
Context adaptive cryptography for privacy protection
Information hiding and sharing based on privacy protection
Privacy Control and Protection for Data Analysis
Privacy awareness information collection
Privacy awareness and distribution
Comprehensive privacy protection
Privacy Protection Data Release
Private information storage
Integration and synergy of the private sector
Private information exchange and sharing
Privacy inference and inference
Privacy in the Cloud
Privacy in Online Social Networks
Privacy in the Internet of Things and Industrial Internet
Privacy and Artificial Intelligence
Privacy and Blockchain
Modeling Tools and Languages
Modeling and simulation methods
Visual and Visualization Technology
Perception issues in visualization and modeling
Mathematical and Numerical Methods in Simulation and Modeling
Simulation algorithm
High performance computing and simulation
Universal Computing and Simulation
Discretization and numerical simulation
Intelligent Computing and Simulation
Parallel and Distributed Computing Simulation
Real time modeling and simulation
Modeling of Chaotic Systems
Analysis and Control
Dynamic modeling and simulation
Web-based simulation
Simulation optimization
Simulator
Intelligent System Modeling and Simulation
Modeling and Simulation of Complex Systems
Power system simulation
Environmental modeling and simulation
Computer Games and Simulation
Artificial Intelligence Simulation Technology
Medical simulation
Virtual Technology and Applications
Digital Twin
Process Engineering Modeling
Simulation and Modeling in Molecular Biology
Traffic Engineering Simulation
Aerospace System Simulation
Information Engineering Simulation
Materials Engineering Simulation
Modeling and simulation technology, other applications, etc
Topic 2: Information Security
Information System Security and Management
Network Engineering and Security
Information security algorithms and protocols
Blockchain Information Security
Electric power information security
Applied Cryptography
Database security
Risk assessment
Operating System Security
Embedded System Security
IoT security and privacy, etc
Topic 3: Privacy Protection
Privacy technologies and mechanisms
Security and Privacy Metrics
Security and Privacy Policy
The Theory and Foundation of Privacy Computing
Programming languages and compilers for privacy computing
Privacy computing model
Privacy quantification, formal description
Privacy Information Engineering, Providers, Collectors, and Users
Privacy Operations and Modeling
Data utility and privacy loss
Context adaptive cryptography for privacy protection
Information hiding and sharing based on privacy protection
Privacy Control and Protection for Data Analysis
Privacy awareness information collection
Privacy awareness and distribution
Comprehensive privacy protection
Privacy Protection Data Release
Private information storage
Integration and synergy of the private sector
Private information exchange and sharing
Privacy inference and inference
Privacy in the Cloud
Privacy in Online Social Networks
Privacy in the Internet of Things and Industrial Internet
Privacy and Artificial Intelligence
Privacy and Blockchain
Important Dates/重要日期
- Submission Deadline: 2026.4.19
- Registration Deadline: 2026.4.26
- Conference Date: 2026.5.9
- Notification Date: About a week after the submission
Submission Portal/投稿方式
Mail Address: com_conference@163.com
If you have any question or need any assistance regarding the conference, please feel free to contact our conference specialists:
田老师
+86-17162865530(微信同号)
3766818743
--
+86---(微信同号)
--
