Download The 2nd IEEE International Conference on Intelligent Data and

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Intelligent transportation system wikipedia , lookup

Transcript
The 2nd IEEE International Conference on Intelligent Data and Security
(IEEE IDS 2017)
May 26th-28th, 2017, Beijing, China
http://ids.2017.bigdata-security.org/
Recent rapid development of the intelligent data has enabled a dramatic influence of using big data in various domains,
such as smart city and smart cloud. The concept of the intelligent data has been remarkably paid attentions by both
academia and industries. The approach of gaining intelligent meta data processing is still at the exploring stage and the
research concentrations are varied, such as intelligent data modeling, energy-aware meta data processing, and intelligent
data mining. Moreover, the security issue is a critical concern of applying intelligent data from both data protection and
data correction perspectives. Gathering contemporary research achievements in the field is greatly significant for the
research.
We aim to collect the latest achievements and exchange research ideas in the domains of intelligent data and security at
this academic event. Joining IDS 2017 will be a great opportunity for your to reach academics, professionals, and vendors
who have the same research interests as yours. IEEE IDS 2017 is the next edition of a series of successful academic
events, including IDS 2015 (New York, USA) and IDS 2016 (New York, USA). IEEE IDS 2017 will be held at Peking
University.
Topics of particular interest include, but are not limited to:
•
•
•
•
•
•
•
•
•
•
•
•
Security in new paradigms of intelligent data
Cyber hacking, next generation fire wall of
intelligent data
Digital forensics in intelligent data
Big data security, Database security
Intelligent database and security
Intelligent data mining in security, optimization,
and cloud computing
Social engineering, insider threats, advance
spear phishing
Cyber threat intelligence and implementations
Security and fault tolerance for embedded or
ubiquitous systems
Cloud-based intelligent data and security issues
Tele-health security in intelligent data
Sensor network security and solutions
Important Dates
Paper Submission:
Author Notification:
Camera-Ready:
Author Registration:
Conference Date:
•
•
•
•
•
•
•
•
•
•
•
Embedded networks and sensor network
optimizations
Cloud computing and networking models
Heterogeneous architecture for cloud-based
intelligent data
Dynamic resource sharing algorithm for cloudbased intelligent data
Load balance for cloud-based intelligent data
Cloud-based audio/video streaming techniques
MapReduce techniques in intelligent data
Visualization and optimization in intelligent data
Cloud-based real-time multimedia techniques in
intelligent data
Mobile cloud computing and advanced
applications
etc
January 1st, 2017
March 1st, 2017
April 1st, 2017
April 1st, 2017
May 26th-28th, 2017
Organizations
Honored General Chair/ General Chair
Fuqing Yang, Peking University, China
Meikang Qiu, Pace University, USA
Program Chairs
Albert Zomaya, University of Sydney, Australia
Shikun Zhang, Peking University, China
Biao Wang, University of International Relations, China
For more information about the conference and paper submissions: http://ids.2017.bigdata-security.org/