CIS'2005: 2005 International Conference on Computational Intelligence and Security... 2005.

International Conference on Computational Intelligence and Security (CIS) is an annual international conference to bring together researchers, engineers, developers and practitioners from academia and industry to share the experience, and exchange and cross-fertilize ideas on all areas of computati...

THEMES: CIS'2005
YEAR: 2005
Login Login
User: Anonymous


LABEL: Intelligence | Security
ORGANIZATIONS: IEEE | University - Xidian University
PLACES: China | Xian
 

Open

Post comment
2005 International Conference on Computational Intelligence and Security...16.05.2005 15:49
 



Call for Papers

2005 International Conference on Computational Intelligence and Security
(CIS'2005)

Co-organized by IEEE (Hong Kong) Computational Intelligence Chapter and
Xidian University, China

Co-sponsored by IEEE (Hong Kong) Computational Intelligence Chapter, Hong
Kong Baptist University, Xidian University, and Guangdong University of
Technology

December 15-19, 2005, Xi'an, China

URL: http://www.comp.hkbu.edu.hk/~cis05

(Paper Submission Due date: July 31, 2005)
=====================================================================================================

International Conference on Computational Intelligence and Security (CIS) is
an annual international conference to bring together researchers, engineers,
developers and practitioners from academia and industry to share the
experience, and exchange and cross-fertilize ideas on all areas of
computational intelligence and information security. This conference serves
as a forum for the dissemination of state-of-the-art research, development,
and implementations of systems, technologies and applications in these two
broad fields. CIS is co-sponsored by IEEE (Hong Kong) Computational
Intelligence Chapter, Hong Kong Baptist University, Xidian University, and
Guangdong University of Technology.

The technical areas include, but are not limited to:

Computational Intelligence
--------------------------

- Artificial Immune Systems
- Autonomy-Oriented Computing
- Biological Computing
- Coevolutionary Algorithms
- Evolutionary Computation
- Fuzzy Systems
- Intelligent Agents and Systems
- Machine Learning
- Molecular Computing
- Neural Computing
- Probabilistic Reasoning
- Reinforcement Learning
- Swarm Intelligence
- Support Vector Machine
- Unsupervised Learning


Information Security
----------------------

- Cryptography and Coding
- Cryptographic Protocols
- Detection of Abnormality
- Electronic Commerce Security
- Intrusion Detection
- Information, Data and System Integrity
- Information Hiding
- Information Security Management
- Information Storage and Retrieval System
- Mobile Code & Agent Security
- Media Data Authentication
- Security Models and Architectures
- Security Analysis Methodologies
- Steganography and Watermarking
- Web and Wireless Security


Applications
--------------------------

- Bioinformatics and Medical Diagnosis
- Copyright Protection
- Cryptography and Its Applications
- Data Mining
- Data Privacy
- Detection of Hidden Communication Channels
- Digital Signatures
- Electronic Commerce Security
- Identity Recognition
- Image and Signal Processing
- Intelligent Information Retrieval
- Pattern Recognition
- Web and Network Applications
- Other Applications


Important Dates
-------------------

Submission of Papers:         July 31, 2005
Notification of Acceptance:   September 1, 2005
Final Camera-Ready Papers:    September 25, 2005


Paper Submission and Publication
---------------------------------

Prospective authors are invited to submit high-quality manuscripts written
in English. The submission of a paper implies that the paper is original and
has not been submitted to elsewhere for possible publication. All
submissions will be peer-reviewed by experts in the field based on
originality, significance, quality and clarity. Authors should use the Latex
style files or MS-Word templates provided by the Spring Lecture Notes to
format their papers. The length of a submitted paper should not exceed 10
pages in the Lecture Notes format. All accepted papers will be appeared in
the conference proceedings, published by Springer as ** Lecture Notes in
Artificial Intelligence **(http://www.springeronline.com/lncs) that are
indexed by SCI-Expanded. Furthermore, selected papers will be considered for
publication in an international journal, after expansion and/or revision.

Authors should submit a soft copy of their manuscripts with the pdf format
only to the conference via the online submission system. For more details,
please visit the conference web site at: http://www.comp.hkbu.edu.hk/~cis05.


General Co-Chairs:

Yue Hao          China
Jiming Liu       Hong Kong


Program Committee Co-Chairs:

Yiu-ming Cheung  Hong Kong
Licheng Jiao     China
Yuping Wang      China
Hujun Yin        UK


Organizing Committee:

Jianfeng Ma      Chair
Yongchang Jiao   Vice Co-Chair
Hailin Liu       Tutorial Chair
Yibo Hu          Treasurer
Lixia Han        Publicity Chair
Liang Ming       Registration Chair
Yuanyuan Zuo     Local Arrangement Chair
Shuguang Zhao    Publication Chair
Kapluk Chan      Asia Liaison
Yan Wu           Secretary
Jingxuan Wei     Secretary
Rongzu Yu        Secretary


Further Information
-----------------------

Any enquiry and comment please contact the Secretariat of CIS-05:

Secretariat of CIS-05
Department of Computer Science,
7/F, Sir Run Run Shaw Building,
Hong Kong Baptist University,
Kowloon Tong,
Hong Kong
Email: cis05@comp.hkbu.edu.hk