Call for Papers
The ICICSA-2025 solicits outstanding original research papers to be submitted in the following tracks but not limited to:
Track 1: Artificial Intelligence & Robotics
- AI based Decision Support System
- Artificial Intelligence & Robotics
- Computational Neural Models & Neuroscience
- Supervised and Unsupervised Learning Methods
- Applications of Machine Learning in medicine, health, security, smart cities, game playing and problem solving
- Natural Language Processing
- Cognitive and Biologically Inspired Vision
- Big Data Management
- Platforms and Technologies for Big Data
- Data Mining and Warehouse
- Distributed Access of Big Data
- Web Mining, Text Mining
- Social Network Analysis
- Sentiment Analysis
Track 2: Computer Vision and Image Processing
- Novel Image Processing Applications and Case Studies
- Restoration, Enhancement, Super-Resolution
- Fuzzy and Neural Techniques in Image Processing
- Document and Synthetic Visual Processing
- Computational Imaging and Video Processing
- Deep Learning for Images and Video
- Image and Video Analysis for the Web
- Image Processing for Autonomous Vehicles
- Multimedia Systems and Applications
- Multi-resolution Imaging Techniques
- Soft Computing Methods in Image Processing and Vision
- Object Detection and Tracking
- Audio and Speech Processing
- Information Retrieval
Track 3: Internet of Things and Embedded Systems
- Machine Learning for IoT
- Intelligent Embedded Systems
- Wearable Technology
- UAVs
- Intelligent Transportation
- Affective Computing
- Sensing and Sensor Networks
- Smart Homes/Cities/Healthcare/Grid
Track 4: Computer Networking and Communications
- Network Performance Analysis
- Computer Networking and Communication
- Optical Communication
- Routing Protocol and Architecture
- Satellite Communication
- Grid and Cluster Computing
- Wireless Sensor Networks
- Ubiquitous Computing
- Network Optimization
- Network Performance Analysis, and related topics
Track 5: Security and Cryptography
- Hash Algorithms
- Public Key Cryptosystem and Key-exchange Algorithms
- Homomorphic Encryption
- Network Security
- Blockchain
- Privacy-Preserving Computation
- Lattice-Based Encryption
- Intrusion Detection System
- Machine Learning Approach to Security
- Biometrics
- Wireless and Network Security
- Data Privacy, Cryptanalysis
- Applied Cryptography
- Cyber Forensic
- And other related domains of the conference theme
Please visit author's guideline before submission.