Track 1. Communication and Information Engineering
- 通信与信息工程
Ad hoc & sensor networks
Embedded networks
High-speed access networks
Home and SOHO networks
IPv6 deployment & migration
Local area networks
Optical networks
Peer-to-peer networks
Personal and wearable networks
Routing and Scheduling
Ubiquitous networking
Wireless networks
Multimedia & real-time communication
Network management
Cross-layer Design and Optimization
Communication and Information Theory
Protocol and Algorithms for Communications
Broadband Wireless Access
Pervasive Computing and Grid Networking |
Track 2. Information and Network Security
- 信息与网络安全
Network Intrusion Detection and Prevention
Malware and botnets
Communication Privacy and Anonymity
Distributed denial of service
Public Key Infrastructures and key management
Web security
Secure Routing and Network Management
Security & Privacy in Pervasive Computing
Security for emerging technologies (VoIP, P2P)
Information leakage and theft
Data tampering and deletion
Computer virus and security breach
Attack monitoring
Encrypted communication
Email security
Network segmentation
Behavioral analytics for security
Mobile device security
Security information and event management
Wireless security |
- Track 3. Data Security
- 数据安全
Cryptography and Encryption Techniques
Data Integrity and Authenticity
Network Security Protocols
Machine Learning for Threat Detection
Application Security
Incident Response and Management
Security in IoT Devices
Data Backup and Recovery Solutions
Regulatory Compliance
Homomorphic Encryption for Data Processing
Zero-Knowledge Proofs and Applications
Post-Quantum Cryptography and Migration
Secure Multi-Party Computation
Data Security in Edge Computing
Data Loss Prevention (DLP) Technologies
Database Security and Auditing
Secure Data Deletion and Sanitization
Digital Forensics and Data Recovery
Security Metrics and Risk Assessment
|
Track 4. Privacy Protection
- 隐私保护
Data Anonymization Techniques
User Consent and Data Collection
Privacy by Design
Surveillance and Data Privacy
Privacy Enhancing Technologies (PETs)
Blockchain for Privacy Protection
Ethical Considerations in Data Handling
Cross-Border Data Transfers
Consumer Privacy Rights
Impact of AI on Privacy
Differential Privacy and its Applications
Federated Learning for Privacy Preservation
Privacy-Preserving Data Publishing
Decentralized Identity and Self-Sovereign Identity
Privacy Regulations and Global Compliance
Location Privacy and Mobility Tracking
Biometric Data Privacy
Privacy in Social Networks |
Track 5. AI, Future Networks and Trusted Systems
- 人工智能、未来网络与可信系统
AI/ML for Network Security
AI-Powered Security Analytics
Security of AI Systems
Explainable and Trustworthy AI for Security
6G and Next-Generation Network Security
Quantum-Safe Networks
Security in SDN and NFV
Zero Trust Architecture (ZTA)
Secure Access Service Edge (SASE)
Trusted Execution Environments (TEEs)
Blockchain for Secure Systems
CPS and ICS Security
Metaverse and Immersive Technology Security
Sustainable and Green Security
Security Measurement, Metrics, and Benchmarking
Hardware Security
Distributed Ledger Technologies for Security
|
|