当前位置:

CIS2008 International Conference


International Conference on Computational Intelligence and Security (CIS) is a major annual international conference to bring together researchers, engineers, developers and practitioners from academia and industry working in all areas of two crucial fields in information processing: computational intelligence (CI) and information security (IS), to share the experience, and exchange and cross-fertilize ideas. In particular, the series of CIS conference provides an ideal platform to explore the potential applications of CI models, algorithms and technologies to IS.
Following the great success of CIS'2005, CIS'2006, and CIS'2007, CIS'2008 serves as a forum for the dissemination of state-of-the-art research, development, and implementations of systems, technologies and applications in these two broad fields. CIS’2008 is co-organized by Southeast University and Soochow University. Also, it is co-sponsored by Guangdong University of Technology, Xidian University, and Harbin Institute of Technology, and in cooperation with IEEE Nanjing Section and IEEE (Hong Kong) Computational Intelligence Chapter. CIS’2008 will be at the Suzhou Dushu Lake Higher Education Town in Suzhou Industrial Park during December 13-17, 2008.

The topics include but are not limited to:

Computational Intelligence:Models, Theories and Algorithms

● Artificial Immune Systems
● Autonomy-Oriented Computing
● Biological Computing
● Data Mining
● DNA Computing
● Evolutionary Programming
● Image Understanding
● Knowledge Discovery
● Machine Learning
● Multi-Agent Systems
● Neural Networks
● Particle Swarm Optimization
● Probabilistic Reasoning
● Reinforcement Learning
● Statistical Data Analysis
● Supervised Learning
● Swarm Intelligence
● Probabilistic Learning
● Artificial Neural Systems
● Bayesian Learning
● Data Fusion and Mining
● Distributed Systems
● Evolutionary Algorithms
● Fuzzy Systems
● Intelligent Systems
● Learning Algorithms
● Molecular Computers
● Multi-Objective Evolutionary Algorithms
● Neural-Fuzzy Systems
● Pattern Recognition
● Quantum Computing
● Self-Organizing Maps
● Statistical Learning
● Support Vector Machines
● Self-Organizing Maps
● Unsupervised Learning

Information Security

Access Control
● Block/Stream Ciphers
● Cryptographic Protocols
● Cryptanalysis
● Information, Data and System Integrity
● Information Hiding
● Intrusion Detection
● Malicious Codes
● Mobile Code & Agent Security
● Public Key Cryptosystems
● Secret Sharing
● Security Management
● Steganography and Watermarking
● Authentication and Authorization
● Computer Forensics
● Cryptography and Coding
● Hash Functions
● Information Security Management
● Internet/Intranet Security
● Key/Identity Management
● Mobile Communications Security
● Network & Wireless Security
● Public Key Infrastructure
● Security Analysis Methodologies
● Security Models and Architectures
● Smart/Java Cards
● Zero Knowledge


Applications

Anti-Virus
● Communication Security
● Content Security
● Cryptography and Its Applications
● Database Security
● Digital Signatures
● Electronic Commerce Security
● Financial Security
● Mobile Device Security
● Software Encryption
● Web Authentication
● Web Security and Integrity
● Biometrics
● Computer Security
● Copyright Protection
● Data Privacy
● Detection of Abnormality
● Distributed Systems Security
● Elliptic Curve Cryptosystems
● Information Discovery
● Multimedia Security
● System Security
● Web Privacy and Trust

www.xidian.cc