Scopes
(Including but not limited to the following topics)
Track 1: Artificial Intelligence
Electronic Information Science and Technology
Communication Engineering
Artificial Intelligence Technology and Applications Algorithm
Deep Learning
Natural Language Processing Software Engineering
Computer Vision
Machine learning and deep learning
Computer vision and pattern recognition
Natural language processing and speech technology
Intelligent decision-making and reinforcement learning
AI applications in communication and Internet of Things
Trustworthy AI and ethical governance
Track 2: Communication Security
Cybersecurity
Computer and digital forensics
Social network security, privacy and trust
Language-based security
Security protocols and verification
Software-defined network security
Web security
Embedded system security
Big data security and privacy
Mobile computing security and privacy
Applied cryptography
Trusted computing and trustworthy computing
Privacy protection
Data and system integrity
Privacy protection data mining
Database security
Internet of Things security and privacy
Distributed system security
Track 3: Intelligent Internet of Things
C-V2X vehicle networking communication
NB-IoT/LoRa low-power communication
Space-ground integrated communication
Massive MIMO networking technology
Wi-Fi 6/7 protocol adaptation
Edge-cloud collaborative communication
IoT end-to-end encryption
Blockchain IoT traceability
IoT zero-trust protection
RFID/NFC security protection
Industrial IoT communication security
C-V2X communication encryption
IoT intrusion detection technology
Edge node security protection
Internet of Things privacy protection ......
Track 1: Artificial Intelligence
Electronic Information Science and Technology
Communication Engineering
Artificial Intelligence Technology and Applications Algorithm
Deep Learning
Natural Language Processing Software Engineering
Computer Vision
Machine learning and deep learning
Computer vision and pattern recognition
Natural language processing and speech technology
Intelligent decision-making and reinforcement learning
AI applications in communication and Internet of Things
Trustworthy AI and ethical governance
Track 2: Communication Security
Cybersecurity
Computer and digital forensics
Social network security, privacy and trust
Language-based security
Security protocols and verification
Software-defined network security
Web security
Embedded system security
Big data security and privacy
Mobile computing security and privacy
Applied cryptography
Trusted computing and trustworthy computing
Privacy protection
Data and system integrity
Privacy protection data mining
Database security
Internet of Things security and privacy
Distributed system security
Track 3: Intelligent Internet of Things
C-V2X vehicle networking communication
NB-IoT/LoRa low-power communication
Space-ground integrated communication
Massive MIMO networking technology
Wi-Fi 6/7 protocol adaptation
Edge-cloud collaborative communication
IoT end-to-end encryption
Blockchain IoT traceability
IoT zero-trust protection
RFID/NFC security protection
Industrial IoT communication security
C-V2X communication encryption
IoT intrusion detection technology
Edge node security protection
Internet of Things privacy protection ......
Important Dates/重要日期
- Submission Deadline: 2026.3.5
- Registration Deadline: 2026.3.12
- Conference Date: 2026.3.20
- Notification Date: About a week after the submission
Submission Portal/投稿方式
Mail Address: contact_pc@163.com
If you have any question or need any assistance regarding the conference, please feel free to contact our conference specialists:
徐老师
+86-15680829715(微信同号)
1347638002
--
+86---(微信同号)
--
