Sign for Notice Everyday    注册| 登陆| 友情链接| English|

Our Sponsors


    ACEC-26 2026 - 49th PARIS International Conference on “Advanced Computing, Engineering and Cybersecurity” (ACEC-26) April 15-17, 2026 Paris (France)

    View: 17

    Website https://fenp.org/conference/336 | Want to Edit it Edit Freely

    Category Advanced Computing, Engineering and Cybersecurity

    Deadline: March 20, 2026 | Date: April 15, 2026-April 17, 2026

    Venue/Country: Paris, France

    Updated: 2025-12-17 19:02:54 (GMT+9)

    Call For Papers - CFP

    Call for papers/Topics

    Topics of interest for submission include any topics related to:

    Here is a comprehensive list of Call for Papers (CFP) topics and subtopics related to this domain, organized by the three core pillars:

    1. Advanced Computing (AI, HPC, Quantum)

    This pillar focuses on the innovation of algorithms, hardware, and computational models.

    Advanced AI & Computational Intelligence

    Deep Learning (DL) & Neural Networks: CNNs, RNNs, Transformer models, Generative AI (GenAI).

    Explainable AI (XAI): Feature importance, LIME, SHAP, and ensuring transparency in complex models.

    AI Ethics and Governance: Bias, fairness, accountability, and the societal impact of AI.

    Computational Methods: Fuzzy logic, evolutionary computation, genetic algorithms, and multi-objective optimization.

    High-Performance & Distributed Computing

    HPC Architectures: Exascale computing, post-exascale architectures, and heterogeneous computing (CPU-GPU, FPGA).

    Parallel and Distributed Systems: Grid, cluster, and parallel computing algorithms.

    Cloud, Edge, and Fog Computing: Serverless computing (FaaS), containerization (Docker, Kubernetes), hybrid cloud strategies, and real-time edge intelligence.

    Big Data & Data Analytics: Real-time stream processing, predictive/prescriptive analytics, and data visualization for large-scale systems.

    Emerging Computing Paradigms

    Quantum Computing: Quantum algorithms (e.g., optimization, materials design), quantum hardware, and quantum error correction.

    Trusted Computing: Secure hardware, secure enclaves, and trusted execution environments.

    Computational Biology/Bioinformatics: Algorithms for sequence analysis, structure prediction, and computational medicine.

    2. Engineering (Systems, Software, and Architecture)

    This pillar focuses on the design, development, integration, and reliability of complex systems.

    Software Engineering and Development

    Secure Software Development Lifecycle (SSDLC): DevSecOps, secure coding practices, and vulnerability detection.

    Software Architecture: Microservices, cloud-native applications, and resilient system design.

    Quality Assurance: Automated testing, formal methods, and software reliability/reengineering.

    Programming Languages and Theory: Type systems, formal specification, and verification of programs.

    Computer and Network Engineering

    Computer Architecture: Embedded systems, System-on-Chip (SoC) design, FPGA/ASIC, and approximate computing.

    Networking and Communications (5G/6G): Software-Defined Networking (SDN), Network Function Virtualization (NFV), and vehicular networks (V2X).

    Mobile and Pervasive Computing: Wearable devices, wireless sensor networks, and mobile security.

    Cyber-Physical Systems (CPS) and IoT

    Industrial IoT (IIoT) & Smart Cities: Design, control, and real-time processing for connected infrastructure.

    Autonomous Systems: Software for drones (sUAS), autonomous vehicles, and robotics.

    Engineering Reliability: Predictive maintenance, fault tolerance, and resilience in integrated systems.

    3. Cybersecurity (Defense, Offense, and Privacy)

    This pillar focuses on securing assets, managing threats, and ensuring privacy across digital and physical domains.

    Core Cryptography and Security Foundations

    Cryptography & Cryptanalysis: Cryptographic algorithms, post-quantum cryptography, and cryptographic protocols.

    Access and Usage Control: Zero-Trust architectures, Identity and Access Management (IAM), and micro-segmentation.

    Hardware Security: Side-channel attacks, secure computer architectures, and physical security for embedded systems.

    Security Models and Architectures: Security frameworks (NIST, ISO), and security architecture analysis.

    Cyber Threat Intelligence and Defense

    Network Security: Advanced network defense mechanisms, intrusion detection and response systems (IDS/IPS).

    Malware Analysis & Detection: Advanced persistent threats (APTs), threat hunting, and reverse engineering.

    Vulnerability Management: Ethical hacking, penetration testing, and vulnerability analysis.

    Cyber Resilience: Incident response, disaster recovery, and strengthening an organization's ability to withstand disruptions.

    Privacy and Governance

    Privacy-Enhancing Technologies (PETs): Homomorphic encryption, differential privacy, and secure multi-party computation.

    Data Protection: Compliance with regulations (GDPR, CCPA), data leakage prevention, and digital forensics.

    Legal and Ethical Aspects: Cybersecurity policy, governance, compliance, and the legal implications of cybercrime and electronic evidence.


    Keywords: Accepted papers list. Acceptance Rate. EI Compendex. Engineering Index. ISTP index. ISI index. Impact Factor.
    Disclaimer: ourGlocal is an open academical resource system, which anyone can edit or update. Usually, journal information updated by us, journal managers or others. So the information is old or wrong now. Specially, impact factor is changing every year. Even it was correct when updated, it may have been changed now. So please go to Thomson Reuters to confirm latest value about Journal impact factor.