ASSIC 2022 technical tracks span original research in the field of smart enabled systems, secure computing and intelligent technologies for applications in all fields of science and technology.
Full Paper Submission-15/06/2022
Notification Of Acceptance-15/07/2022
Camera Ready Paper Submission-30/07/2022
Paper Submission Link
TRACK I:
AI Enabled Computing
- Artificial Immune Systems.
- Bio Sensors.
- Agent based modeling and fuzzy logic.
- Nature driven models and paradigms in computer vision.
- Bioinformatics models and machine vision.
- Bio-inspired Fuzzy Clustering, Image Classification.
- Biologically inspired imaging and sensing.
- Cellular and Molecular Automata.
- Cognitive learning with big data.
- Computational Neuroscience.
- Bio Security.
- Data Fusion, Knowledge Discovery and Data Mining.
- DNA Nanotechnology.
- Evolutionary Computing and Genetic Algorithms.
- Biometric recognition systems.
- Neuro-fuzzy and Hybrid evolutionary techniques.
- Granular computing.
- Human Computer Interaction.
- Machine Learning and Decision Science.
- Neuro-fuzzy technologies for medical and bioengineering applications.
- Biologically inspired image processing.
- Visual-based interactive robotics.
- Image processing in IoT.
- Bio-Inspired Artificial Intelligence.
- Bio-Inspired Data Analytics.
- Bio-inspired cluster analysis.
- Distributed Knowledge discovery on bio-inspired methods.
- Bio-inspired computation for social-based knowledge.
TRACK II:
AI Enabled Smart Healthcare
- Assistive Technologies, Home Monitoring
- eHealth Applications
- Electronic Health Records and Standards
- Evaluation and Use of Healthcare IT
- Healthcare Management Systems
- Human-Machine Interfaces
- ICT, Ageing and Disability
- Interoperability and Data Integration
- Application of Health Informatics in Clinical Cases
- Medical Informatics
- Mobile Technologies for Healthcare Applications
- Pattern Recognition and Machine Learning
- Pervasive Health Systems and Services
- Physiological and Behavioral Modeling
- Software Systems in Medicine
- Therapeutic Systems and Rehabilitation Technologies
- Cognitive Informatics
- Telemedicine
- Medical robots
- Wearable Health Informatics
- Big Data in Healthcare
- Wellbeing Informatics
- Confidentiality and Data Security
- Data Mining and Data Analysis
- Data Visualization
- Databases and Data warehousing
- Decision Support Systems
- Design and Development of Methodologies for Healthcare IT
- Patient Portals
- Bio-inspired Robotics
- Biologically Inspired Context-Aware Smart computing
- Intelligent bio-inspired agent for IoT-enabled WSNs
TRACK III:
Intelligent Data Analysis and Secure Computing
- Security in new paradigms of intelligent data
- Cyber hacking and Cyber monitoring
- Digital forensics in intelligent data
- Big data security and Database security
- Intelligent data mining in security, optimization, and cloud computing
- Social engineering, insider threats, advance spear phishing
- Security and fault tolerance for embedded or ubiquitous systems
- Cloud-based intelligent data and security issues
- Tele-health security in intelligent data
- Sensor network security and solutions
- Quality of Service (QoS) improvements techniques
- Case studies for various applications
- Cyber Security in emergent technologies, infrastructures and applications
- Trade-offs between decentralization, scalability, performance and security
- New models, practical solutions and technological advances related to Blockchain
- Authentication and authorization in Blockchain.
- Security, Privacy, Attacks, Forensics
- Vulnerabilities on smart contract
- Implementation challenges facing Blockchain technologies
- Blockchain-based threat intelligence and threat analytics techniques
- Application and service cases of DLT and Smart-Contracts
- Finance and payment
- Internet of Things (IoT) and cyber-physical systems
- Blockchain for Artificial intelligence
- Security and Privacy aspects for Real-world applications using Blockchain
- Security and Privacy aspects of Blockchain for Information Systems
- Blockchain-based security applications and challenges
- Innovative Information Security
- Assessment of Threat and Security Models for Wireless Robotics
- Secure Computing in Wireless Robotics
- Access Control in Wireless Robotics
- Security and Privacy in Sensor Data Mining and Data Analytics
- Artificial Intelligence-based security and privacy-preserving techniques
- Artificial Intelligence for Cyber-related areas
- Bio-inspired Privacy preserving
- Bio-inspired communication and blockchain technology
- Bio-inspired models for cybersecurity in 5G wireless communication
- Bio-inspired cyber systems for smart city securityrelated areas
- Bio-inspired algorithms for secure parallel processing