25

 DAY | 

55

 HOUR | 

22

 MINUTE | 

05

 SECONDS

Scopes

Image processing: Image Enhancement and Restoration Computer Vision and Object Detection Image segmentation and region recognition Deep Learning and Neural Networks Medical image processing Remote Sensing and Geographic Information Systems Image Encoding and Compression Image synthesis and virtual reality Facial recognition Range image processing three-dimensional reconstruction Network security: Active defense system Adaptive Defense System Security system analysis, benchmark Applied cryptography Authentication method Biometric Security Complex System Security Database and system security data protection Data/System Integrity Distributed Access Control Distributed Attack System Denial of Service High performance network virtualization High performance security system Security in Cloud and Grid Systems Security in E-commerce Security in ubiquitous/ubiquitous computing Security and Privacy in Smart Grid Security and Privacy in Wireless Networks Secure Mobile Agents and Mobility Moving code Security simulation and tools Trusted computing

Submission Portal

Mail Address: iacipc@sub-paper.com

If you have any questions or need any help about the conference, please feel free to contact our conference experts on the right:

杨老师

TEL:18582881690

QQ:3965998409

E-mail:iacipc@sub-paper.com

About Plagiarism Check

Crosscheck Powered by iThenticate will be used for plagiarism check. The amount of duplication from previously published content should be less than 20%; If the amount of duplication is 20% - 35%, modification maybe required; if the amount of duplication exceeds 35%, the article will be rejected. Please note that there will be no refund for no-shows.