About: The 5th International Conference on Artificial Intelligence and Security (ICAIS 2019), formerly called the International Conference on Cloud Computing and Security (ICCCS), will be held in July 26-28, 2019 at New York University, New York, USA. Over the past four years, ICCCS has become a leading conference on artificial intelligence and security, garnering comprehensive coverage in June 2018 by CCTV 4 China News. ICAIS is a highly selective and premier international forum on computer science and engineering research. In addition to the main sessions, the conference will include workshops, panels, demonstrations, and exhibits. The organizing committee is excited to invite you to take part in ICAIS 2019, to discuss issues at the technological frontier of society today as well as interdisciplinary technological trends.
1. Artificial Intelligence
Machine Learning
Natural Language Processing
Computer Vision
Data Mining
Artificial Neural Networks
Affective Computing
Multiagent Systems
Planning
Knowledge Representation
Reasoning
Robotics and Reception
Big Data Applications
Artificial Intelligence Applications in Science, Engineering, Healthcare and Medicine
2. Big Data
Techniques, Models and Algorithms for Big Data
Tools and Systems for Big Data
Big Data Analytics and Social Media
Hardware/Software Infrastructure for Big Data
Mobile Communications and Networks
Security and Privacy for Big Data
Copyright Protection for Big Data
Data Compression
Machine Learning and AI for Big Data
Big Data Persistence and Preservation
Big Data Quality and Provenance Control
Big Data Storage and Retrieval
3. Cloud Computing and Security
Cloud Computing Architecture and Systems
Cloud Computing Models, Simulations, Designs, and Paradigms
Cloud Management and Operations
Dynamic Resource Provision and Consuming
Cloud Computing Technologies, Services and Applications
Security Evaluation and Benchmarks Based on Cloud
Authentication, Authorization and Reliability Issues in Cloud
Security and Privacy in Cloud Computing
4. Information Hiding
Coverless Information Hiding
Steganography and Steganalysis
Digital Watermarking, Fingerprinting and Forensics
Multimedia Authentication and Encryption
Covert/Subliminal Channels
5. IoT Security
Data Security and Privacy in the IoT
Attacks and Countermeasures on IoT Systems
Trust Model, Data Aggregation and Information Sharing
Secure Hardware and Software for IoT
Application Security for IoT
6. Multimedia Forensics
Active and Passive Forensics
Big Data Forensics
Portable electronic device forensics
Network Forensics
Anti-forensics
7. Encryption and Cybersecurity
Measurements for Cybersecurity
Post Quantum Cybersecurity
Visualization for Security
Applied Cryptography
Language-based Security
Contact: http://2019.icaisconf.com/