25

 DAY | 

55

 HOUR | 

22

 MINUTE | 

05

 SECONDS

Scopes

Theme1 security management network security Encrypted communication Privacy protection risk assessment Wireless security Applied cryptography Applied cryptography Identity Access Management Infrastructure security Operating System Security Intellectual property protection Distributed System Security Cloud and edge computing security Available security and privacy Blockchain Security and Privacy Information Physical System Security Data and System Integrity Privacy protection data mining Internet of Things security and privacy Key management and key recovery Trusted computing and trusted computing Security protocols and authentication Software defined network security Mobile computing security and privacy Key management and key recovery Trusted computing and trusted computing Security models, standards, and policies Theme2 Optical network Sound source location Underwater communication wireless communication Blockchain integration Multimedia network distributed system Media Access Control Security scheme design The Application of Cryptography Technology Information system security radar signal processing Speech signal processing Intelligent signal processing Interference management and mitigation Integrated sensing and communication Introduction to Computer Security Encoding Theory and Applications Innovative Internet architecture Computer and Network Security Memory signal processing system MIMO based network Internet of Things/Information Physical Systems Adaptive equalization and echo cancellation Signal processing of mixed signal technology Attack methods for networks and computer systems Image, video, and multimedia signal processing

Submission Portal

Mail Address: icspcn@sub-paper.com

If you have any questions or need any help about the conference, please feel free to contact our conference experts on the right:

张老师

TEL:19980545614

QQ:2130572537

E-mail:icspcn@sub-paper.com

About Plagiarism Check

Crosscheck Powered by iThenticate will be used for plagiarism check. The amount of duplication from previously published content should be less than 20%; If the amount of duplication is 20% - 35%, modification maybe required; if the amount of duplication exceeds 35%, the article will be rejected. Please note that there will be no refund for no-shows.