The ICIC 2019 Program Committee is inviting proposals for special sessions to be held during the conference (http://www.ic-icc.cn/2019/index.htm), taking place on August 3-6, 2019, in Nanchang,China.
Each special session proposal should be well motivated and should consist of 8 to 12 papers. Each paper must have the title, authors with e-mails/web sites, and as detailed an abstract as possible. The special session organizer(s) contact information should also be included. All special session organizers must obtain firm commitments from their special session presenters and authors to submit papers in a timely fashion (if the special session is accepted) and, particularly, present them at the ICIC 2019. Each special session organizer will be session chair for their own special sessions at ICIC 2019 accordingly. All planned papers for special sessions will undergo the same review process as the ones in regular sessions. All accepted papers for special sessions will also be published by Springer's Lecture Notes in Computer Sciences (LNCS)/ Lecture Notes in Artificial Intelligence (LNAI)/ Lecture Notes in Bioinformatics (LNBI).
All the authors for each special session must follow the guidelines in CALL FOR PAPERS to prepare your submitted papers.
Proposals for special sessions should be submitted in
ELECTRONIC FORMAT to
Special Session Chair:
Abir Hussain
Liverpool John Moores University, UK
A.Hussain@ljmu.ac.uk
orders |
Title |
Organizers |
Nationality |
Machine Learning and Deep Learning approaches in applied computing to support Industry for real-world problems. |
Dr. Alexei Lisitsa and Dr Mohammed Khalaf |
UK and Iraq |
|
Information Security. |
Dr. Yunxia Liu and Dr. DeGang Xu |
China |
|
Special Session on Intelligent Computing in Scheduling for Smart Systems. |
Dr. Ling Wang, and Dr. DeGang Xu |
China |
|
Special Session on Water Wave Optimization. |
Dr. Yujun Zheng, and Dr. Minxia Zhang |
China |
|
Special Session on Intelligent Computing for Cybersecurity . |
Prof. Michal Choras and Dr Rafal Kozik |
Poland |
|
Special Session on Artificial Intelligence in Biological and Medical Information Procession
Proposed
. |
Dr Wenzheng Bao and Dr Bin Yang |
China |
Organizers:
Dr. Alexei Lisitsa,
University of Liverpool, UK
Email:A.Lisitsa@liverpool.ac.uk
Dr Mohammed Khalaf
Almaraf University College, Iraq
Email: M.I.Khalaf@auc-edu.org
Scope and Topics:
The main aims of calling for this special session is to gather the state-of -art solutions to provide robust system with the ability to operate in dynamic and changing environments, including methods for industry and real-world problems. All the submitted papers should addressing either a theoretical or application-oriented perspective are highly recommended and welcome, as well as contributions presenting relevant applications. The special session also welcomes papers addressing other challenges related to applied computing to support industry for innovation and technology such as artificial intelligence, machine learning, and big data. The special session topics include, but are not limited to:
- Machine learning and deep learning methods in Healthcare and real-world problem
- Data Mining and Bioinformatics
- Multi-dimensional Big Data
- Computational Intelligence methods
- Extraction of Biometric Features (fingerprint, face, gait)
- Convolutional Neural Networks CNN
- Deep Reinforcement Learning
- Supervised and Unsupervised Machine learning for dimensionality reduction and clustering
- Machine learning in forecasting models
- Time series modelling in weather field
- Reinforcement learning
- Evolutionary optimization, machine vision, pattern recognition for supporting industry
- Real-world problem solving using swarm intelligence
- Evolutionary ensemble systems
- Evolutionary feature selection and construction for machine learning
- Kernels and Support Vector Machines
Organizer:
Dr. Yunxia Liu
College of information science and technology
Zhengzhou normal university, Zhengzhou, China
Email:liuyunxia0110@hust.edu.cn
Dr. DeGang Xu
Computer o school
Hubei university of arts and science, Xiangyang, China
Email: dgx.hust@gmail.com
Scope and Topics:
Information security has become a crucial need for almost all information transaction applications due to the large diversity of the hackers and attacks, Traditional techniques such as cryptography, watermarking, and data hiding are basic notions and play an important role in developing information security algorithms and solutions. In spite of the large development in the information security techniques, there are still several challenges that need to be addressed in terms of time, accuracy and reliability. The special session targets the information security research area with respect to trends, advanced techniques and applications, which attracts researchers and practitioners from academia and industry, and provides a discussion environment in order to share their experiences in information security.
Authors are encouraged to submit both theoretical and applied papers on their research in information security. Topics of interest include, but are not limited to:
- applied cryptography
- data protection
- formal methods in security
- information dissemination control
- information hiding and watermarking
- network security
- privacy
- secure group communications
- security in social networks
- embedded security
Organizer:
Ling Wang, Professor, Ph.D
Department of Automation, Tsinghua University, China
Email:wangling@tsinghua.edu.cn
Dr. Minxia Zhang,
College of Computer Science and Technology, Zhejiang University of Technology, China
Email: bin.qian@vip.163.com
Scope and Topics:
This special session intends to present the state-of-the-art of intelligent scheduling research for smart systems. Interdisciplinary methodologies on advanced intelligent computing and scheduling techniques may provide effective and efficient solution algorithms for complex scheduling problems. The aim of this special session is to reflect the most recent developments of metaheuristics, evolutionary algorithms, swarm intelligence and other intelligent computing techniques used for scheduling in a variety of smart systems.
The topics include but are not limited to:
- Intelligent computing in production scheduling
- Intelligent computing in project scheduling
- Intelligent computing in transportation scheduling
- Intelligent computing in timetabling
- Intelligent computing in nursing scheduling
- Intelligent computing in other scheduling problems
- Intelligent computing in multi-objective scheduling
- Intelligent computing in dynamic/uncertain/fuzzy scheduling
- Intelligent scheduling in practical systems
- Related topics
Organizers:
Dr. Yujun Zheng,
College of Information Engineering, Hangzhou Normal University, China
Email: zyj@hznu.edu.cn
Dr. Minxia Zhang,
College of Computer Science and Technology, Zhejiang University of Technology, China
Email: zmx@zjut.edu.cn
Scope and Topics:
Water wave optimization (WWO) is a novel nature-inspired algorithm that mimics the principle of shallow water wave motion models to solve optimization problems. The algorithmic framework of WWO, regardless of its simplicity and the metaphor used, is sufficiently generic and flexible, and thus can be applicable to a broad range of continuous and combinatorial optimization problems. That is why WWO has aroused great research interest since it was proposed in 2015.
The purpose of this special session is to bring together both researchers and practitioners to present and discuss the recent advances of WWO. Papers related with (but not limited to) the following topics are welcomed:
- Improved WWO algorithms
- WWO for combinatorial, constrained, and/or multiobjective optimization
- Theoretical analysis of WWO
- Hybridization of WWO with other metaheuristics
- Engineering applications of WWO in areas such as transportation, manufacturing, and big data
- Other algorithms that use similar ideas of WWO
Organizers:
Prof. Michal Choras ,
University of Science and Technology, UTP Bydgoszcz, Poland
Email:chorasm@utp.edu.pl
Dr Rafal Kozik
University of Science and Technology, UTP Bydgoszcz, Poland
Email:rafal.kozik@utp.edu.pl
Scope and Topics:
Biological and medical information mining and procession can be regarded as one of the most significant issues in the field of artificial intelligence and machine learning. In this special session, we want to discuss the latest and novel artificial intelligence and machine learning approaches to deal with the information of medical information and biological data.
It is indeed of great interest for the scientific community to discover and mine the potential information of such huge data. The aim of this session is therefore to draw a picture of the recent advances and challenges in evolving artificial intelligence in biological and medical information mining and procession.
Topics for this session include, but are not limited to:
-
Gene Expression Data Mining
- Gene Regulatory Network Inference
- Swarm Intelligence Algorithm and Its Application
- Post Translational Modification Identification
- Protein-Protein Interaction
- Protein Structure Recognition
- Medical Image Procession
Organizers:
Dr Wenzheng Bao,
Xuzhou University of Technology, China
Email:baowz55555@126.com
Dr Bin Yang
Zaozhuang University, China
Email:batsi@126.com
Scope and Topics:
Cybersecurity is currently the vivid problem not only in computer science and digital world, but for societies in general, ranging from children to elderly, from single citizens to governments, critical infrastructures and homeland security. Intelligent computing methods are believed to be able to solve some of the problems of cyberattacks, cyber-crime/terrorism, resilience etc.
Therefore authors are encouraged to submit both theoretical and applied papers about intelligent computing methods to solve cybersecurity related problems. Topics of interest include, but are not limited to:
- Cyber-attacks detection
- Machine learning for cybersecurity
- Deep learning for cybersecurity
- Malware, badware, ransomware detection
- Stegomalware detection
- Network security
- Cloud and grid security
- Intelligent computing for solving cyber crime/terrorism problems
- Granular computing for cybersecurity