Call for Papers
With the advancements in wireless communication systems like Fifth Generation (5G), beyond 5G (B5G) and the Sixth Generation (6G), new and unprecedent services will be available for users with nearly unlimited capacity. These services will be the core driver of the future digital transformation of our cities and communities. This will be accompanied by a ubiquities deployment of the Internet of Things (IoT) infrastructure and supported by computing capacity that will be available at the edge of the network and at the cloud. The computing infrastructure will be handling the processing of the data generated by the users and services. Such a complex and diverse system will require an efficient and sustainable applications running on the computing\Networking infrastructure and also a smart control and automation systems to integrate and manage its different components. Artificial Intelligence (AI) and its applications will play a significant role on the design, deployment, automation and management of the future services. This will include the applications that will be running on the edge and the cloud servers, the networking applications to handle the flow of data between the users and the computing system and the intelligent automation and management software operating on the system. The International Conference on Intelligent Computing, Networking and Services is aiming to provide an opportunity to present the state of the art research in the intersections of Computing, Networking and Services that is supported by Artificial Intelligence. Researchers from both the industry and academia are encouraged to submit their original research contributions in all major areas, which include, but not limited to:
- Track 1: Artificial Intelligence Fundamentals
- Artificial Intelligent Systems
- Artificial Intelligent Theory
- Artificial Intelligent applications in Computers and Communications
- Artificial Intelligent and Robotics Technologies
- Artificial Intelligent and cloud computing
- Artificial Intelligent for Economic paradigms and game theory
- Machine and Deep Learning of Knowledge
- Artificial Intelligent based Distributed Knowledge and Processing
- Artificial Intelligent for Human-Robot Interactions
- Track 2: Intelligent Internet of Things and Cyber-Physical Systems
- Intelligent IoT Applications and Services
- Intelligent security for the Internet of Things and cyber-physical systems
- Intelligent Internet of Things architectures and protocols
- Intelligent Cyber Physical Systems (CPS)
- Blockchain-based application in Intelligent Manufacturing: Industrial Internet of Things,
- Blockchain and Secure Critical Infrastructure with Industry 4.0
- Intelligent manufacture and management
- Consensus and mining algorithms suited for resource-limited IoTs
- Blockchain-based Controlled mobility and QoS
- Blockchain-based energy optimization techniques in WSN
- Blockchain-based Software defined networks
- Track 3: Edge Intelligence and Federated Learning
- Distributed and federated machine learning in edge computing
- Theory and Applications of Edge Intelligence
- Middleware and runtime systems for Edge Intelligence
- Programming models compliant with Edge Intelligence
- Scheduling and resource management for Edge Intelligence
- Data allocation and application placement strategies for Edge Intelligence
- Osmotic computing with edge continuum, Microservices and MicroData architectures
- ML/AI models and algorithms for load balancing
- Theory and Applications of federated learning
- Federated learning and privacy-preserving large-scale data analytics
- MLOps and ML pipelines at edge computing
- Transfer learning, interactive learning, and Reinforcement Learning for edge computing
- Modeling and simulation of EI and edge-to-cloud environments
- Security, privacy, trust, and provenance issues in edge computing
- Distributed consensus and blockchains at edge architecture
- Blockchain networking for Edge Computing Architecture
- Blockchain technology for Edge Computing Security
- Blockchain-based access controls for Edge-to-cloud continuum
- Blockchain-enabled solutions for Cloud and Edge/Fog IoT systems
- Forensic Data Analytics compliant with Edge Intelligence
- Track 4:Intelligent Networking in Beyond 5G (B5G) and 6G Wireless Communication
- Intelligent Networking in Beyond 5G/6G Network Architectures
- large-scale Internet of Things in B5G/6G
- Vehicular networks in B5G/6G
- Blockchain with lightweight computation
- Service and applications for vehicular clouds in B5G/6G
- Future internet architectures for B5G/6G
- Intelligent networking services
- Emerging networks in B5G/6G
- Byzantine-tolerant FL
- Churn-tolerant FL
- FL for NGN and 6G
- B5G/6G based IoT healthcare systems
- Track 5: Intelligent Big Data Management and Processing
- Intelligent Data Fusion
- Intelligent Analytics and Data mining
- Intelligent Distributed data management
- Distributed transaction for blockchain
- Intelligent Data Science and Data Engineering
- Protocols for management and processing of data
- Track 6: Intelligent Security and Privacy
- Authentication and authorization
- Applications of blockchain technologies in digital forensic
- Privacy technologies
- Blockchain-based threat intelligence and threat analytics techniques
- Blockchain-based open-source tools
- Forensics readiness of blockchain technologies
- Blockchain Attacks on Existing Systems
- Blockchain Consensus Algorithms
- Blockchain-based Intrusion Detection/Prevention
- Security and Privacy in Blockchain and Critical Infrastructure
- Attacks on Blockchain and Critical Infrastructure
- Blockchain and Secure Critical Infrastructure with Smart Grid
- Track 7: Blockchain Research & Applications for Intelligent Networks and Services
- State-of-the-art of the Blockchain technology and cybersecurity
- Blockchain-based security solutions of smart cities infrastructures
- Blockchain in connected and autonomous vehicles (CAV) and ITS)
- Blockchain Technologies and Methodologies
- Recent development and emerging trends Blockchain
- New models, practical solutions and technological advances related to Blockchain
- Theory of Blockchain in Cybersecurity
- Applications of blockchain technologies in computer & hardware security
- Implementation challenges facing blockchain technologies
- Blockchain in social networking
- Performance metric design, modeling and evaluation of blockchain systems
- Network and computing optimization in blockchains
- Experimental prototyping and testbeds for blockchains
- Blockchain networking for Edge Computing Architecture
- Blockchain technology for Edge Computing Security
- Blockchain-based access controls for Edge-to-cloud continuum
- Blockchain-enabled solutions for Cloud and Edge/Fog IoT systems
- Forensic Data Analytics compliant with Edge Intelligence
Submission Guidelines:
Paper format
All papers should be in PDF format. Please make use of the appropriate IEEE template for conference proceedings to prepare your revised manuscript. Failur to do so may result in excluding your paper from the conference proceedings.
- The needed IEEE Word template can be found her (IEEE Conference Word Template).
- The needed IEEE Latex template can be found her (IEEE Conference Latex Template).
Length
A full paper must be of maximum length of 8 pages (including all figures, tables and references). The reference pages must only contain references. Up to 2 aditional pages can be added for extra cost. Overlength papers will be rejected without review.
Originality
Papers submitted to ICCNS must be the original work of the authors. The may not be simultaneously under review elsewhere. Publications that have been peer-reviewed and have appeared at other conferences or workshops may not be submitted to ICCNS. Authors should be aware that IEEE has a strict policy with regard to plagiarism https://www.ieee.org/publications/rights/plagiarism/plagiarism-faq.html The authors' prior work must be cited appropriately.
Author list
Please ensure that you submit your papers with the full and final list of authors in the correct order. The author list registered for each submission is not allowed to be changed in any way after the paper submission deadline.
Proofreading:
Please proofread your submission carefully. It is essential that the language use in the paper is clear and correct so that it is easily understandable. (Either US English or UK English spelling conventions are acceptable.)
IMPORTANT: No-Show Policy
At least one author of each accepted paper is required to register to the conference and present the paper. Only registered and presented papers will be published in the conference proceedings. A paper not presented or presented by a non-author without prior written approval by the TPC Chair will be removed from the final conference proceedings and no registration refund can be made to the authors of these papers.
Publication:
Accepted papers will be submitted for inclusion into IEEE Xplore subject to meeting IEEE Xplore’s scope and quality requirements.
Earlier versions of the proceedings can be found on: IEEEXplore