The International Research Conference Aims and Objectives
The International Research Conference is a federated organization dedicated to bringing together a significant number of diverse scholarly events for presentation
within the conference program. Events will run over a span of time during the conference depending on the number and length of the presentations.
With its high quality, it provides an exceptional value for students, academics and industry researchers.
International Conference on Data Intelligence and Security
aims to bring together leading academic scientists, researchers and research scholars to exchange and share their experiences and research results on all aspects of
Data Intelligence and Security.
It also provides a premier interdisciplinary platform for researchers, practitioners and educators to present and discuss the most recent innovations,
trends, and concerns as well as practical challenges encountered and solutions adopted in the fields of Data Intelligence and Security.
Call for Contributions
Prospective authors are kindly encouraged to contribute to and help shape the conference through submissions of their research abstracts, papers and e-posters.
Also, high quality research contributions describing original and unpublished results of conceptual, constructive, empirical, experimental, or
theoretical work in all areas of Data Intelligence and Security are cordially invited for presentation at the conference.
The conference solicits contributions of abstracts, papers and e-posters that address themes and topics of the conference, including figures, tables and references of
novel research materials.
Guidelines for Authors
Please ensure your submission meets the conference's strict guidelines for accepting scholarly papers.
Downloadable versions of the check list for
Full-Text Papers and
Abstract Papers.
Please refer to the
Paper Submission Guideline,
Abstract Submission Guideline and
Author Information
before submitting your paper.
Conference Proceedings
All submitted conference papers will be blind peer reviewed by three competent reviewers.
The peer-reviewed conference proceedings are indexed in the Open Science Index,
Google Scholar,
Semantic Scholar,
Zenedo,
BASE,
WorldCAT,
Sherpa/RoMEO,
and other index databases. Impact Factor Indicators.
Special Journal Issues
19. International Conference on Data Intelligence and Security has teamed up with the Special Journal Issue on
Data Intelligence and Security.
A number of selected high-impact full text papers will also be considered for the special journal issues.
All submitted papers will have the opportunity to be considered for this Special Journal Issue.
The paper selection will be carried out during the peer review process as well as at the conference presentation stage.
Submitted papers must not be under consideration by any other journal or publication.
The final decision for paper selection will be made based on peer review reports by the Guest Editors and the Editor-in-Chief jointly.
Selected full-text papers will be published online free of charge.
Conference Sponsor and Exhibitor Opportunities
The Conference offers the opportunity to become a conference sponsor or exhibitor.
To participate as a sponsor or exhibitor, please download and complete the
Conference Sponsorship Request Form.
Selected Papers
-
A Study on the Application of Machine Learning and Deep Learning Techniques for Skin Cancer Detection
Hritwik Ghosh, Irfan Sadiq Rahat, Sachi Nandan Mohanty, J. V. R. Ravindra, Abdus Sobur
-
Impact of Similarity Ratings on Human Judgement
Ian A. McCulloh, Madelaine Zinser, Jesse Patsolic, Michael Ramos
-
Contextual SenSe Model: Word Sense Disambiguation Using Sense and Sense Value of Context Surrounding the Target
Vishal Raj, Noorhan Abbas
-
RV-YOLOX: Object Detection on Inland Waterways Based on Optimized YOLOX through Fusion of Vision and 3+1D Millimeter Wave Radar
Zixian Zhang, Shanliang Yao, Zile Huang, Zhaodong Wu, Xiaohui Zhu, Yong Yue, Jieming Ma
-
Safe and Efficient Deep Reinforcement Learning Control Model: A Hydroponics Case Study
Almutasim Billa A. Alanazi, Hal S. Tharp
-
Unveiling the Mathematical Essence of Machine Learning: A Comprehensive Exploration
Randhir Singh Baghel
-
Harnessing the Power of AI: Transforming DevSecOps for Enhanced Cloud Security
Ashly Joseph, Jithu Paulose
-
Enhancing IoT Security: A Blockchain-Based Approach for Preventing Spoofing Attacks
Salha Alshamrani, Maha Aljohni, Eman Aldhaheri
-
Enhancing Word Meaning Retrieval Using FastText and NLP Techniques
Sankalp Devanand, Prateek Agasimani, V. S. Shamith, Rohith Neeraje
-
Methods and Algorithms of Ensuring Data Privacy in AI-Based Healthcare Systems and Technologies
Omar Farshad Jeelani, Makaire Njie, Viktoriia M. Korzhuk
-
Adding Security Blocks to the DevOps Lifecycle
Andrew John Zeller, Francis Pouatcha
-
An Architecture Based on Capsule Networks for the Identification of Handwritten Signature Forgery
Luisa Mesquita Oliveira Ribeiro, Alexei Manso Correa Machado
-
Data Privacy and Safety with Large Language Models
Ashly Joseph, Jithu Paulose
-
Detecting Fake News: A Natural Language Processing, Reinforcement Learning, and Blockchain Approach
Ashly Joseph, Jithu Paulose
-
Automated Fact-Checking By Incorporating Contextual Knowledge and Multi-Faceted Search
Wenbo Wang, Yi-fang Brook Wu
Conference venue information will be released soon.
Data Management
Data warehousing, OLAP, SQL analytics
Data integration and data cleaning
Information retrieval
Storage, indexing, and physical database design
Distributed and parallel databases
Image and video processing and analysis
Natural language processing
Graph data management
Social networks visualization and analysis
Web data management and analysis
Health data management and analysis
Semi-structured data
Data feature extraction
Data dimension reduction
Data visualization
Data Intelligence
Big Data Intelligence
Small-samples machine learning
Deep learning
Unsupervised learning and clustering
Supervised learning and classification
Reinforcement learning
Case-based reasoning
Statistical learning
Conceptual learning
Frequent pattern mining
Association rules mining
Learning/adaption of recognition and perception
Learning for handwriting recognition
Artificial neural network
Optimization techniques for learning
Data-driven evolutionary optimization
Data-driven fuzzy systems design
Data Security and Privacy
Big data security
Biometrics
Access control
Authorization
Intrusion detection
Anomaly detection
Fraud detection
Information assurance
Network security
Secure cloud computing
Secure multi-party computation
System security
Information hiding
Data privacy
Sensitive data collection
Privacy-preserving data mining
Privacy-preserving data publishing
Abstracts/Full-Text Paper Submission Deadline |
|
November 28, 2024 |
Notification of Acceptance/Rejection |
|
December 12, 2024 |
Final Paper (Camera Ready) Submission & Early Bird Registration Deadline |
|
April 27, 2025 |
Conference Dates |
|
August 26-27, 2025 |