2017 IEEE Symposium
on Computational Intelligence for Security and Defense Applications
(IEEE CISDA'17)
Click here for Symposium website
Given the current
global security environment, there has been increased interest within
the security and defense communities in novel techniques for solving
challenging problems. The genesis of this interest lies in the fact
that repeated attempts of using traditional techniques have left many
important problems unsolved, and in some cases, not addressed. New
problems have emerged within the broad areas of security and defense
that are difficult to tackle with conventional methods, thus requiring
new techniques for detecting and adapting to emerging threats.
The purpose of the symposium is to present current and ongoing efforts in computational intelligence (e.g., neural networks, fuzzy systems, evolutionary computation, swarm intelligence, and other emerging learning or optimization techniques) as applied to security and defense problems.
The purpose of the symposium is to present current and ongoing efforts in computational intelligence (e.g., neural networks, fuzzy systems, evolutionary computation, swarm intelligence, and other emerging learning or optimization techniques) as applied to security and defense problems.
Topics
ADVANCED ARCHITECTURES
FOR DEFENSE OPERATIONS
- Multi-Sensor Data Fusion
- Hard-Soft Data Fusion
- Context-Aware Data Fusion
- Employment of Autonomous Vehicles
- Intelligence Gathering and Exploitation
- Mine Detection
- Situational Assessment
- Impact Assessment
- Process and User Refinement
- Automatic Target Recognition
- Mission Weapon Pairing and Assignment
- Sensor Cueing and Tasking
- Self-Healing Systems
MODELING AND SIMULATION
OF DEFENSE OPERATIONS
- Logistics Support
- Mission Planning and Execution
- Resource Management
- Red Teaming
- Computational Red Teaming
- Course of Action Generation and Recommendation
- Models for War Games
- Risk-Aware Decision Support
- Multi-Agent Based Simulation
- Critical Infrastructure Protection
- Strategic Planning
- Counterterrorism and Counterinsurgency
- Behavioral or Cognitive Learning
- Human Modeling: Behavior, Emotion, Motion
SECURITY APPLICATIONS
- Surveillance
- Suspect Behavior Profiling
- Anomaly Detection
- Automated Handling of Dangerous Situations or People
- Stationary or Mobile Object Detection, Recognition and Classification
- Intrusion Detection Systems
- Cyber-Security
- Air, Maritime and Land Security
- Network Security
- Biometrics Security
- Forensics Security
- Authentication Technologies
Accepted
Special Sessions
- Computational Intelligence in Biometrics and Identity Management
- Organizers:
Svetlana Yanushkevich, University of Calgary, Canada
Ruggero Donida Labati, Universita' degli Studi di Milano, Italy
Éric Granger, École de technologie supérieure, Canada - More Information
Symposium Co-Chairs
Marco Cococcioni
University of Pisa, Italy
Email: m.cococcioni@gmail.com
James M. Keller
University of Missouri, USA
Email: KellerJ@missouri.edu
Suresh Sundaram
Nanyang Technological University
Email: ssundaram@ntu.edu.sg
Program
Committee
- Rafael Falcon
- Rami Abielmona
- Xiao Zhang
- Svetlana Yanushkevich
- Ruggero Donida Labati
- Eric Granger
- Maxwell Dondo
- Maikel Leon Espinosa
- Bao Nguyen
- Daniel Ashlock
- Timothy Havens
- Fred Petry
- Mark Rempel
- Stuart Rubin
- Slawomir Wesolkowski
- Gary Fogel
- George Yee
- Sansanee Auephanwiriyakul
- David Van-Veldhuizen
- Xiao Luo
- Nur Zincir-Heywood
- Jean Roy
- Derek Anderson
- Giuseppe Bombara
- Zhen Ding
- Khalid Shahbar
- Lam Thu Bui
- Gerry Vernon Dozier
- Jayadeva
- Phillip Curtis
- Mauro Tucci
- Lidong Wang