2022 International Symposium on Signal Processing and Communication Security (ICSPCS 2022) will bring together leading researchers, engineers and scientists in the domain of interest from around the world.
| Signal Processing | |
Signal processing and detection Radar and sonar signal processing Signal processing for communications Audio and acoustic signal processing Sensor array and multichannel signal processing Multimedia signal processing Speech and language processing Image and video processing Signal processing for computer vision and robotics Optimization methods Computational imaging/ Spectral imaging Machine learning | Signal processing over graphs and networks Compressed sensing and sparse modeling Nonlinear signal processing Statistical signal processing Signal processing for the internet of things Information forensics and security Signal processing for education Signal processing for big data Signal processing for power systems Design/implementation of signal processing systems |
| Communication Security | |
Access control cyber security Computer and Digital Forensics Social Network Security, Privacy and Trust language-based security Security Protocol and Authentication Intrusion detection Software Defined Network Security Anonymity Safety management Web security Embedded System Security Security Models, Standards and Policies Fraud and Cybercrime Trust and reputation system Authentication and Authorization Big Data Security and Privacy Mobile Computing Security and Privacy Applied Cryptography Hardware security | Key Management and Key Recovery Identity Access Management Infrastructure security Cloud and Edge Computing Security Available Security & Privacy Blockchain Security and Privacy Trusted Computing and Trusted Computing Operating system security Insider threat detection Cyber-Physical System Security Privacy protection Intellectual Property Protection Risk assessment Data and System Integrity Privacy Protection Data Mining Database security IoT Security and Privacy Distributed System Security Malware and Confrontation Wireless security |
Manuscripts passed the peer-review process by expert reviewers from the conference organizing committee will be accepted and published in the Conference Proceedings. The published papers will then be submitted to EI Compendex, Scopus for abstracting/indexing.
Submission Guidelines
1.The submitted papers must not be previously published or currently under consideration for publication elsewhere.
2.Please send the full paper(Word+pdf) to the conference SUBMISSION SYSTEM
3.Please submit the full paper, if presentation and publication are both needed.
4.Please submit the abstract only, if you just want to make presentations.
5.Templates download: Templates
6.Should you have any questions, or you need any materials in English, please contact us at icspcs@163.com
Note:
1) Both Abstracts and Full Papers are welcomed. The author can make an oral presentation after the Abstract is accepted and the payment is made.
2) All submitted articles should report original results, experimental or theoretical, not previously published or under consideration for publication elsewhere. All articles submitted to the conference should meet these criteria. We firmly believe that ethical conduct is the most essential virtue of any academics. Hence, any act of plagiarism or other misconduct is totally unacceptable and cannot be tolerated.