Call for Papers



ICCINS -2022 is soliciting original, previously unpublished and high quality research papers addressing research challenges and advances in the tracks mentioned below. The maximum allowable length of the paper is 8(+2) pages (including figures and references), 8.5 × 11 inch single-column template for publishing in AIP Book Series. Articles will be Double-Blind Peer-Reviewed by three experts to decide its suitability for publication in the conference. Acceptance of papers will be communicated to authors by email.

The theme of ICCINS 2022 is "Computational Intelligence and Network Security (ICCINS)-2022 ". The topics of the conference include, but are not limited to:



Computational Intelligence

  • Distributed Algorithms
  • Concurrency and Parallelism
  • System Specification and Verification: Formal Methods
  • Secure Computing and Communication
  • Cloud and P2P System
  • Cyber Physical Systems
  • Green Computing
  • Fog Computing
  • Edge Computing
  • Internet of Things Applications and Services
  • Grid Middleware, Grid Computing, Data and Networking Infrastructures
  • Distributed and Large-Scale Data Access and Management
  • Data Repositories, Distributed Resource Management and Scheduling
  • Supercomputer/cluster/grid integration issues
  • Grid Performance Evaluation, QoS and SLA Negotiation
  • User Development Env. and Programming Tools for Grid Computing.
  • Infrastructure as a service (IaaS)
  • Virtualization in data centers, Virtual networks, Virtual data, storage as a service
  • Virtualization for resource management and QoS assurance
  • Security aspects of using virtualization in a distributed environment
  • Fault tolerance in virtualized environments
  • Virtualization technologies, Virtualization in P2P systems
  • Virtualization-based adaptive/autonomic systems
  • The creation and management of environments/appliances
  • Performance modeling (applications and systems)
  • Virtualization techniques for energy/thermal management
  • Case studies of applications on IaaS platforms
  • Deployment studies of virtualization technologies
  • Tools relevant to virtualization


Network Security

  • Blockchain
  • Cryptography and Cryptanalysis
  • Code-based Cryptography
  • System Security/Secure OS
  • Data Hiding
  • Social Network Analytics/ Privacy preservation in social networks
  • Data Security and Privacy
  • Security and Privacy on COVID-19 Technologies
  • Distributed FinTech
  • Data Mining Methods for Security
  • Information Forensics
  • Biometric Identification and Recognition
  • Biometric Surveillance, Biometric Access Control
  • Extraction of Biometric Features (fingerprint, iris, face, voice, palm)
  • Cryptography, cryptographic primitives
  • Applied Cryptography and provably-secure cryptographic protocols
  • Economic fraud on the Internet: phishing, pharming, spam, and click fraud
  • Email and web security
  • Intellectual property protection: metering, watermarking, and digital rights management.


Information System

  • Machine Learning
  • Deep Learning
  • Supervised and Unsupervised Learning
  • Multi-Agent Learning
  • Ensemble Methods
  • Reinforcement Learning
  • Multi-Strategy Learning
  • Evolution-Based Methods
  • Learning in Integrated Architectures
  • Data Mining
  • Information Retrieval
  • Web Mining
  • Game Playing
  • Problem Solving and Planning
  • Natural Language Processing
  • Robotics and Control
  • Design and Diagnosis
  • Vision and Speech Perception
  • Artificial Intelligence
  • explainable Artificial Intelligence
  • Recommender Systems
  • Optimization Techniques
  • Agent and Multi-Agent Systems
  • Hybrid Systems
  • Machine Learning for Data Mining
  • Data Mining Methods for Security
  • Agent and Multi-Agent Systems
  • Hybrid Systems
  • Unsupervised Learning
  • Classification Methods
  • Novelty Detection
  • Intrusion Detection Systems
  • Log Correlation Methods
  • Adaptive Defense of Network Infrastructures
  • Adaptive Reasoning
  • Document Classification and Processing
  • Ontologies and Conceptual Information Processing
  • Semantic Information Representation
  • Natural Language Acquisition
  • Web Semantics in Intelligence and Law-Enforcement
  • Industrial and Commercial Applications of Intelligent Methods for Security
  • Intelligent Control and Monitoring of Critical Systems
  • Centralized Control Systems
  • Adaptive Planning for Strategic Reasoning
  • Intelligent Methods in Energy and Transportation
  • Planning and Automated Reasoning in Large System Control
  • Computer Science, namely on HPC and Grid computing issues
  • Computational Sciences, with requirements in HPC and Grid
  • Computational Engineering with a similar focus.
Templates is availbale at Here