CyberC promotes in-depth exploration of the most recent research and developments in the fields of AI/ML & Intelligence, Distributed Computing, Computer vision/Image Processing, Cyber Security, Communications, Metaverse, etc. Professors, scientists, engineers, and students in these areas are encouraged to participate. CyberC also welcomes industrial participations.
Track 1: NLP, knowledge discovery, computational semantics
- NLP, lexical semantics, compositional semantics
- Semantic parsing, textual inference, entailment
- Question answering, event learning, causal and temporal relations,
- Knowledge mining and acquisition
- Text & data streaming, scalable computing, task deployments
- Information extraction, retrieval, and learning
- Multilingual and cross-lingual semantics
- Word sense disambiguation and induction
- Formal approaches to semantics
- Semantics in NLP applications and higher level NLP applications
- Text and speech processing
- Morphological analysis, syntactic analysis, lexical semantics, and discourse
- High performance computing, and intensive data networks
- Discourse, pragmatics, and dialogue
- Social media and social network analytics
- NLP computing security and information assurance
- Graph learning, mining, and opinion mining
- Cloud and high performance computing for big data
Track 2: AI, Machine Learning, Deep Learning, Autonomy, and Intelligence
- AI & machine learning theory, architecture, and system
- Soft computing, neural network, convolutional neural network, and deep learning
- Intelligence computing, inductive learning, reasoning
- Ensemble and evolutionary computation
- Data analytics, social media, and web mining
- Fuzzy set theory, fuzzy controls and systems
- Feature engineering, feature learning, and feature fusion
- Web computing, intelligent and knowledge based systems
- Distributed and parallel systems & algorithms
- Database and data mining and analytics
- Pattern recognition and multimedia
- Data streaming and storage, and data analytics
Track 3: Cloud computing, information system, and distributed computing
- Parallel and distributed algorithms, resource allocation, and load-balance
- Public and private cloud, mobile cloud, mobility-aware cloud data/streams
- SOA, web services, and mobile services (software, infrastructure)
- Cloud resource management and allocation
- Cloud utility models and service pricing
- New parallel / concurrent programming models for cloud computing
- Scientific computation and other applications in the cloud
- Mobility modeling, management and measurement for mobile clouds
- Mobile multimedia content delivery, transferring, and migration
- Content delivery networks using storage clouds
- User experience and cyber security
- Performance evaluation, measurement and optimization
- Communications and network security
- Information security, software security, system security, or cryptography
- Cloud tools, test-bed, simulations, and experimental environments
- Collaborative and cooperative environments
- Cloud QoS, autonomic, reliability, and fault-tolerance
- Web services and internet computing
- Web-caching, content delivery systems and data distribution systems
- Distributed applications, modeling language, and software engineering
- Pervasive/ubiquitous computing and intelligence
Track 4: Computer Vision and Image Processing
- AI for computer vision and image processing
- NLP, image, vision learning, and deep learning
- Texture image representation and classification
- Image filtering and enhancement
- Image segmentation
- Object detection and recognition
- Tracking and motion analysis
- Image synthesis, 3D reconstruction and modeling
- Stereo vision and depth estimation
- Face recognition and biometrics
- Scene understanding and semantic segmentation
- Image and video compression
- Image and video restoration and super-resolution
- Optical character recognition
- Medical image analysis and processing
- Document analysis and recognition
- Video analysis and summarization
- Augmented reality and virtual reality
- Color, multispectral, and hyperspectral imaging
- Medical image computing
- Sensing, representation, modeling, and registration
- Stereoscopic, multiview, and 3D processing
- Biometrics, forensics, and security
Track 5: Mobile Computing, Communications, 5G and Beyond
- Spectrum sensing, fusion, decision-making and allocation
- Signaling process, PHY/link layer protocols and optimization
- Resource optimization, network, and distributed network computing
- Dynamic spectrum access, spectrum sharing, spectrum management
- AI/ML for cognitive radio network
- VNF/SDN (NFV, VIM, VNFs, service function chaining, network slicing, and Open Flow)
- Quantum communications, and network computing resources
- Sensor networks, mesh networks, MIMO and 6G
- Edge computing, IoT connectivity, and energy harvesting
- Industrial IoT, e.g., manufacturing, logistics, and supply chain
- Industry control network, networking theory and algorithms
- Wireless embedded sensor systems, body sensor, smart cities & security
- Cognitive radio and Soft defined radio
- Future generation communications and pervasive computing
- Peer-to-peer network computing and overlaying networks
- Directional antenna and networking
- FDMA/OFDMA modulations, synchronization, and power optimization
- Security & privacy, attacking models, confidentiality & security in communications
- Services, middleware, and multimedia on wireless networks
- QoS, reliability, performance, and communication theory
- Wireless network simulations, implementation, and applications
Track 6: Privacy, Security, and Cybersecurity
- Privacy enhancing, policy, access control, and regulation
- Privacy with surveillance, big data, machine learning, and IoT
- Privacy for healthcare, human-computer interaction, and other applications
- Network security, cybersecurity risk assessment, malware analysis
- Cryptography, cryptographic algorithm, post-quantum cryptography
- Attacks, DDoS, ransomware, and cybersecurity attacks and detection
- Cyber network, configuration, cloud, IoT, and wireless communications
- Multistage attacks, data security, AI and intrusion detection
- Risk assessment, management, and network monitoring
- Blockchain, cryptocurrency, smart contracts, identity management, and voting
- Blockchain applications, e.g., smart grid, healthcare, industrial control systems
- Cyber authentication and access control
- Deep learning for attack behavior, prediction, and game theory
- AI/ML and deep learning for security and privacy
- Cybersafety and privacy, standardization, compliance and forensics