| 查看: 144 | 回复: 0 | |||
| 当前主题已经存档。 | |||
[交流]
【转贴】CFP:Special Session on IMACS'08 of CIS 2008【已搜无重复】
|
|||
|
CALL FOR PAPERS 2008 International Conference on Computational Intelligence and Security (CIS 2008) Special Session on Intelligent Multimedia Analysis for Communication Security (IMACS'08) http://www.ieee-cis.cn/cis/cis/moreinfo.aspx?CategoryNum=012 3-17, December,2008, Suzhou, China ------------------------------------------------------------------------- Submission deadline: 25 August, 2008 Notification date: 15 September, 2008 Camera-ready due: 25 September, 2008 -------------------------------------------------------------------------- Introduction Intelligent computing techniques, such as Neural Networks, Fuzzy Logic, Evolutionary Computing, Rough Sets, Chaos and other similar techniques, have been proved effective for various applications. Taking neural network for example, a neural network is a network composed of many simple units, while producing intelligent actions according to certain structure, dynamics and learning method. Till now, neural networks have been widely used in various applications, such as machine vision, pattern detection, data segmentation, data mining, adaptive control, information assurance, etc. Recently, multimedia communication system (Audio/Video Broadcasting, IPTV, Mobile TV, etc.) enriches human's daily life, and its prosperity also attracts malicious attackers and abusers with different motivations, such as political reasons or illegal financial benefits. The typical example is illegal intrusion, i.e., the multimedia application system is interfered by malicious activities. Another example is illegal copying and distribution, i.e., the media content is copied by one user and redistributed to other unauthorized users. To detect or track these illegal attacks, various methods have been reported. Among them, intelligent computing based methods obtain better performances in some aspects, which benefit from the intelligent techniques' learning ability. Additionally, intelligent techniques also show some good properties for confidentiality protection, integrity detection, ownership authentication, object tracing and surveillance, etc. This special session aims to bring together research work in the area of intelligent computing for secure multimedia communication, investigate the novel solutions and discuss the future trends in this field. Topics The paper may focus on architecture construction, algorithm designing or hardware implementation. Both review paper and technical paper are expected. The topics include but are not limited to Security in ubiquitous multimedia applications Secure user-interface based on intelligent computing Secure streaming based on intelligent computing Secure steganography and steganalysis in multimedia content Intelligent information forensics in multimedia network Intelligent copy detection and tracking in multimedia communication Intelligent intrusion detection and prevention in multimedia network Intelligent multimedia surveillance and security Intelligent and secure multimedia sensor network Multimedia forensics based on intelligent analysis Sensitive activity tracking based on multimedia analysis Sensitive object recognition based on multimedia analysis Bio-inspired multimedia protection and distribution Submission The submission should be done according to Author Instructions on http://www.ieee-cis.cn/cis/cis/default.aspx. The accepted papers will be published in the conference proceedings and indexed by EI. The revised or extended versions of the accepted and presented papers will be invited to special issues of SCI-indexed journal (http://www.wacong.org/autosoft/auto/pdf/si_2008.pdf) or the book " Intelligent Multimedia Analysis for Security Applications" to be published by Springer. Important Dates Submission deadline: 25 August, 2008 Notification date: 15 September, 2008 Camera-ready due: 25 September, 2008 Organizers Dr. Shiguo Lian France Telecom R&D (Orange Labs) Beijing, China E-mail: shiguo.lian@orange-ftgroup.com Dr. Xiaoyi Yu Graduate School of Engineering, Osaka University, Japan E-mail: xyyu@nanase.comm.eng.osaka-u.ac.jp Dr. Guangjie Liu Nanjing University of Science & Technology, China E-mail: guangj_liu@yahoo.com.cn Biographies of Organizers Dr. Shiguo Lian is now a research scientist with France Telecom R&D Beijing. He got his Ph.D. from Nanjing University of Science and Technology, China, in July 2005. He was a research assistant in City University of Hong Kong in 2004, and joined France Telecom R&D in July 2005. He has contributed more than 50 refereed international papers covering topics of network and multimedia security and intelligent services. He has contributed 8 book chapters and held 10 patents. He is the author of the book "Multimedia Content Encryption: Techniques and Applications" (CRC Press, 2008) and co-editor of "Intelligent Multimedia Analysis for Security Applications" (Springer, 2009). He is a member of IEEE Communications & Information Security Technical Committee (CIS TC) and IEEE Technical Committee on Nonlinear Circuits and Systems (TC NCAS). He is on the editor board of International Journal of Universal Computer Science and International Journal of Multimedia and Ubiquitous Engineering. He is also the Technical Committee Member of some refereed conferences, including ICC2009, ICC2008, GLOBECOM2008 MoMM'2008, MUSIC'08 and SecPri_WiMob 2008, etc. For some of his publications, see http://www.informatik.uni-trier. ... l/Lian:Shiguo.html. Dr. Xiaoyi Yu is now a researcher at the Graduate School of Engineering, Osaka University, Osaka, Japan. He got his Ph.D. from Institute of Automation, Chinese Academy of Science, China, in July 2005. He was a postdoctoral researcher in The Institute of Industrial Science, The University of Tokyo, Japan in 2005, and joined Graduate School of Engineering, Osaka University in September 2006. He has contributed more than 20 refereed international papers covering topics of multimedia security, visual surveillance and data mining. Dr. Guangjie Liu received his Ph.D. degree in control engineering from Nanjing University of Science and Technology, China, in July 2006. His is now with Nanjing University of Science and Technology. He has contributed more than 30 papers in digital watermarking, steganography and intelligent multimedia forensics. [ Last edited by sinapdb on 2008-9-8 at 13:28 ] |
» 猜你喜欢
导师想让我从独立一作变成了共一第一
已经有8人回复
博士读完未来一定会好吗
已经有23人回复
到新单位后,换了新的研究方向,没有团队,持续积累2区以上论文,能申请到面上吗
已经有11人回复
读博
已经有4人回复
JMPT 期刊投稿流程
已经有4人回复
心脉受损
已经有5人回复
Springer期刊投稿求助
已经有4人回复
小论文投稿
已经有3人回复
申请2026年博士
已经有6人回复













回复此楼