posted by user: Terppy || 3450 views || tracked by 7 users: [display]

CyberC 2022 : The 14th Int. Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery


Conference Series : Cyber-Enabled Distributed Computing and Knowledge Discovery
When Nov 17, 2022 - Nov 18, 2022
Where China
Submission Deadline Sep 30, 2022
Notification Due Oct 20, 2022
Final Version Due Nov 1, 2022
Categories    wireless communications   machine learning   security   computer vision

Call For Papers

The 14th Int. Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery
Suzhou, China, November 17 - 18, 2022
Sponsor: IEEE TCCC (
Publication: IEEE (EI & Explore)
Paper Submission: EDAS ( or PDF to
Submission deadline: Sep. 10, 2022

2022 Theme: Cyber Computing of AI/ML, Cybersecurity, Image Processing, and Beyond 5G

Organizer: Xi’an Jiaotong-Liverpool University
Co-hosted by: Nanjing University of Posts & Telecommunications, Zhengzhou University, Guangzhou University, Chongqing University of Posts and Telecommunications, and Computer and Communication Special Committee of Jiansu Computer Society

Financially Sponsored by: Huawei, ZTE, Xi’an Jiaotong-Liverpool University

Scopes: CyberC promotes in-depth exploration of the most recent research and developments in the fields of AI, big data, distributed computing, clouds, cybersecurity, Blockchain, image computing, mobile computing, Internet of Things, and other cyber-based technologies. Professors, scientists, engineers, and students in these areas are encouraged to participate. CyberC welcomes industrial participations.

Summit: CyberC 2022 co-hosts Emerging Technology Summit (AI, Blockchain, Big Data, Image, 6G) forum that emphasizes innovative and state-of-art R&D, industry products, specifications, showcases, tutorial, technical transitions, and markets.

Cyber network and cybersecurity
• Cyber network, configuration, cloud, IoT, and wireless communications
• DDoS, Ransomware, and cybersecurity attacks and detection
• Multistage attacks, data security, AI and intrusion detection
• Risk assessment, management, and network monitoring
• Authentication and access Control
• Learning model for attack behavior, prediction, and game theory
• IoT and security
• Deploying machine learning and AI to enhance security and privacy
• Cybersafety and privacy
• Blockchain theory and its applications (smart grid, healthcare, ICS, etc.)
• Deploying machine learning and AI to enhance security and privacy
• Cybersafety and privacy, standardization, compliance and forensics
• Moving target defensing, image and target detection

Big Data, AI & ML
• Blockchain and Blockchain Applications
• Big data algorithms, models, and systems for big data
• AI, Neural Network, Deep Learning
• Machine learning, and big data architecture and analytics
• Big data software design, middleware and analytics
• High performance computing, and intensive data networks
• Massive data streaming, scalable computing, big data task deployments
• Cloud and high performance computing for big data
• Data retrieval, storage, query, communications, and database
• Data preservation, filter, provenance, and assurance
• Data security, protection, integrity and privacy standards and policies
• Graph mining and opinion mining, and distributed data mining
• Data streaming, multimedia, stream, or web mining
• Social media and social network analytics
• Security and information assurance for Big Data

Distributed Computing and HPC
• Authentication, trust, privacy and other Cyber security issues
• Parallel and distributed algorithms, resource allocation, and load-balance
• Cloud computing, mobile cloud, mobility-aware cloud data/streams
• SOA, web services, and mobile services (software, infrastructure)
• Web services and internet computing
• Web-caching, content delivery systems and data distribution systems
• Distributed applications, modeling language, and software engineering
• Pervasive/ubiquitous computing and intelligence

Image Processing and Surveillance
• Texture Image Representation and Classification
• Computational Imaging
• Image Processing
• Image & Video Systems and Applications
• Deep Learning for Images and Videos
• Color, Multispectral, and Hyperspectral Imaging
• Medical Image Computing
• Deep learning models for medical image analysis
• Image Computing
• Sensing, Representation, Modeling, and Registration
• Stereoscopic, Multiview, and 3D Processing
• Biometrics, Forensics, and Security

Mobile Computing, 5G and Beyond
• Wireless networks, mesh networks, MIMO and 6G
• Industry control network, networking theory and algorithms
• Wireless embedded sensor systems, body sensor, smart cities & security
• Cognitive radio and SDR
• Future generation communications and pervasive computing
• Peer-to-peer network computing and overlaying networks
• Directional antenna and networking
• FDMA/OFDMA modulations, synchronization, and power optimization
• Mobile IP and Internet technology
• Key, attacking models, privacy, confidentiality & security in mobile networks
• Communication, services, middleware, and multimedia on wireless networks
• QoS, reliability, performance, and communication theory
• Wireless network simulations, implementation, and applications

Cyber Computing and Clouds
• Autonomic, real-time and self-organizing clouds
• Architectural models for public and private cloud computing
• Cloud resource management and allocation
• Utility models and service pricing
• New parallel / concurrent programming models for cloud computing
• Scientific computation and other applications in the cloud
• Mobility modeling, management and measurement for mobile clouds
• Mobile multimedia content delivery, transferring, and migration
• Content delivery networks using storage clouds
• User Experience and Cyber Security
• Performance evaluation, measurement and optimization
• Communications and network security
• Information security, software security, system security, or cryptography
• Tools, test-bed, simulations, and experimental environments
• Collaborative and cooperative environments
• QoS, Autonomic, reliability, and fault-tolerance

The CyberC 2022 Proceedings will be published by IEEE CPS. Full papers for CyberC 2022 must not exceed 10 pages of IEEE 2-column format, while short papers must not exceed 4 pages. Please visit the conference web site at for precise formatting and submission instructions.

Submission deadline for full (10-page) and/or short (4-page) papers: September. 10, 2022
Notification of acceptance: October 20, 2022
Registration and Camera-ready: November 1, 2022

CyberC 2022 provides a special channel for you to submit your extended version to Journal of Sensors by MDPI.

David Lu, AT&T, USA
Eng Gee Lim, Xi'an Jiaotong-Liverpool University, China

Chih-Lin I, China Mobile, China
Angelos Stefanidis, Xi'an Jiaotong-Liverpool University, China

Chi-Ming Chen, AT&T Labs, USA
Lejun Zhang, Guangzhou University, China
Jionglong Su, Xi'an Jiaotong-Liverpool University

Anup Kumar (Chair), University of Louisville, USA
Suryadip Chakraborty, Johnson C. Smith Univ., USA
Chi-Ming Chen, AT&T Labs, USA
Chih-Lin I, China Mobile, China
Yang Yang, ShanghaiTech, China
Jiangzhou Wang, University of Kent, UK
Tzyh-Jong (TJ) Wang, AT&T Labs, USA



Related Resources

PCDS 2024   The 1st International Symposium on Parallel Computing and Distributed Systems
ECAI 2024   27th European Conference on Artificial Intelligence
FMEC 2024   The 9th International Conference on Fog and Mobile Edge Computing
CCVPR 2024   2024 International Joint Conference on Computer Vision and Pattern Recognition (CCVPR 2024)
ECCV 2024   European Conference on Computer Vision
ECML-PKDD 2024   European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Databases
CVIV 2024   2024 6th International Conference on Advances in Computer Vision, Image and Virtualization (CVIV 2024) -EI Compendex
ICANN 2024   33rd International Conference on Artificial Neural Networks
DMKD 2024   2024 International Conference on Data Mining and Knowledge Discovery(DMKD 2024)
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust