Skip to main content

International Conference on Artificial Intelligence and Cyber Security
"Empowering the World with Artificial Intelligence and Cyber Security towards Smart Solutions"
14 - 15 September 2026

Call for Papers


AICS 2026 invites researchers, scientists, and industry professionals to submit their original research for presentation and publication.

As we move toward an increasingly automated society, the dual forces of Artificial Intelligence and Cyber Security have become the bedrock of sustainable progress. AICS 2026 focuses on the integration of these fields to create "Smart Solutions" that enhance human capability while safeguarding the digital frontier.

We invite submissions in the following thematic areas, though not limited to:

Computational Intelligence

  • Artificial Intelligence
  • Cognitive Computing
  • Ambient Computing
  • Evolutionary Computing
  • Parallel Computing
  • Big Data and Data Mining
  • Grid and Cloud Computing
  • Cluster Computing
  • Quantum and Probabilistic Computing
  • Approximate and Inexact Computing
  • Dynamic Knowledge Based System
  • Soft Computing and Hybrid Soft Computing

Biological Computing

  • Brain Computing
  • Neural Computing
  • Computational Neuroscience
  • Biological-inspired architecture
  • DNA Computing
  • Optical Computing
  • Molecular Computing
  • Bio-informatics, Bio-medical and Bio-engineering

Robotics and Automation

  • Intelligent Mobile Robotics
  • Intelligent Human Assistive Robotics
  • Intelligent Manufacturing System
  • Hybrid Intelligent Systems
  • Control of Intelligent Systems
  • Intelligent Image, Speech and Signal Processing
  • Intelligent Remote Sensing
  • Blockchain Technologies

Data analytics, machine learning and knowledge discovery

  • Learning for streaming data
  • Learning for structured and relational data
  • Latent semantics and insight learning
  • Mining multi-source and mixed-source information
  • Mixed-type and structure data analytics
  • Cross-media data analytics
  • Big data visualization, modeling and analytics
  • Multimedia/stream/text/visual analytics
  • Relation, coupling, link and graph mining
  • Personalization analytics and learning
  • Web/online/social/network mining and learning
  • Structure/group/community/network mining
  • Cloud computing and service data analysis

Cyber Security

  • Artificial Intelligence and Machine Learning in Cybersecurity
  • OT, ICS, and IIoT Security
  • Cloud & Network Security
  • Digital Forensics & Cybercrime
  • Risk Management, Governance, and Compliance
  • Emerging Technologies in Cybersecurity
  • Mobile/Ad hoc Wireless Networks, Sensor Placement, Target Tracking
  • Cyber Threat Intelligence & Incident Response

Data Governance, Privacy and Social Responsibility

  • Data science meets social science
  • Security, trust and risk in big data
  • Data integrity, matching and sharing
  • Privacy and protection standards and policies
  • Privacy preserving big data access/analytics
  • Social impact and social good
  • Methodologies, Tools and Operations Research