文章详情
您所在位置:首页 > 学术交流 > CIS2008 International Conference

CIS2008 International Conference

2008-06-16来源: 电院网络中心浏览次数:

 

    International Conference on Computational Intelligence and Security (CIS) is a major annual international conference to bring together researchers, engineers, developers and practitioners from academia and industry working in all areas of two crucial fields in information processing: computational intelligence (CI) and information security (IS), to share the experience, and exchange and cross-fertilize ideas. In particular, the series of CIS conference provides an ideal platform to explore the potential applications of CI models, algorithms and technologies to IS.
    Following the great success of CIS'2005, CIS'2006, and CIS'2007, CIS'2008 serves as a forum for the dissemination of state-of-the-art research, development, and implementations of systems, technologies and applications in these two broad fields. CIS’2008 is co-organized by Southeast University and Soochow University. Also, it is co-sponsored by Guangdong University of Technology, Xidian University, and Harbin Institute of Technology, and in cooperation with IEEE Nanjing Section and IEEE (Hong Kong) Computational Intelligence Chapter. CIS’2008 will be at the Suzhou Dushu Lake Higher Education Town in Suzhou Industrial Park during December 13-17, 2008.

 

The topics include but are not limited to:
 
  Computational Intelligence:Models, Theories and Algorithms

●  Artificial Immune Systems
●  Autonomy-Oriented Computing
●  Biological Computing
●  Data Mining
●  DNA Computing
●  Evolutionary Programming
●  Image Understanding
●  Knowledge Discovery
●  Machine Learning
●  Multi-Agent Systems
●  Neural Networks
●  Particle Swarm Optimization
●  Probabilistic Reasoning
●  Reinforcement Learning
●  Statistical Data Analysis
●  Supervised Learning
●  Swarm Intelligence
●  Probabilistic Learning
●  Artificial Neural Systems
●  Bayesian Learning
●  Data Fusion and Mining
●  Distributed Systems
●  Evolutionary Algorithms
●  Fuzzy Systems
●  Intelligent Systems
●  Learning Algorithms
●  Molecular Computers
●  Multi-Objective Evolutionary Algorithms
●  Neural-Fuzzy Systems
●  Pattern Recognition
●  Quantum Computing
●  Self-Organizing Maps
●  Statistical Learning
●  Support Vector Machines
●  Self-Organizing Maps
●  Unsupervised Learning

  Information Security 
 
●  Access Control
●  Block/Stream Ciphers
●  Cryptographic Protocols
●  Cryptanalysis 
●  Information, Data and System Integrity
●  Information Hiding 
●  Intrusion Detection 
●  Malicious Codes
●  Mobile Code & Agent Security 
●  Public Key Cryptosystems 
●  Secret Sharing 
●  Security Management 
●  Steganography and Watermarking
●  Authentication and Authorization
●  Computer Forensics
●  Cryptography and Coding
●  Hash Functions
●  Information Security Management
●  Internet/Intranet Security
●  Key/Identity Management
●  Mobile Communications Security
●  Network & Wireless Security
●  Public Key Infrastructure
●  Security Analysis Methodologies
●  Security Models and Architectures
●  Smart/Java Cards
●  Zero Knowledge

  
  Applications 
 
●  Anti-Virus
●  Communication Security
●  Content Security
●  Cryptography and Its Applications
●  Database Security
●  Digital Signatures
●  Electronic Commerce Security 
●  Financial Security 
●  Mobile Device Security 
●  Software Encryption    
●  Web Authentication    
●  Web Security and Integrity    
●  Biometrics
●  Computer Security
●  Copyright Protection
●  Data Privacy
●  Detection of Abnormality
●  Distributed Systems Security
●  Elliptic Curve Cryptosystems
●  Information Discovery
●  Multimedia Security
●  System Security
●  Web Privacy and Trust

 

http://www.ieee-cis.cn

  • 上一篇文章:ADI公司董事会主席Ray Stata博士率团访问我校
  • 下一篇文章:天线微波重点实验室成功举办Ansoft软件高级培训班
  • 返回顶部