Track 1: Emerging Applications of AI and Informatics
- Adaptive Systems
- Adversarial learning
- Agents and Multi-agent Systems
- Bayesian Learning
- Context-aware Pervasive Systems
- Criteria for explainability (Interpretability, trustworthiness, transparency, faithfulness, stability, counter-factual)
- Data Mining
- Deep Learning
- Deep reinforcement learning
- Expectation, accumulated local effects plots
- Explainable Artificial Intelligence
- Fuzzy Logic
- Game Theoretic Methods: Shapley values
- Generative adversarial networks
- Graphics neural network
- Human in the loop, Interpretability and Usability
- Hybrid and Nonlinear system
- Hybrid intelligence System
- Inductive Learning
- Intelligent and Knowledge Based System
- Intelligent Control
- Intrusion Detection
- Local surrogate models: Linearity, Fidelity, Stability
- Material Informatics
- Meta-learning, end-to-end learning, life-long learning and (semi-/un-) supervised learning with weakly labelled data
- Model-agnosticity
- Natural Language Processing
- New informatics methods for AI
- Neuroinformatics
- Probabilistic Methods: Partial dependence plots, individual conditional
- Quantum Algorithms & Information
- Quantum Computing
- Robustness of Interpretability
- Salience maps, interpretability in vision
- Shallow Machine Learning
- Transfer learning
- xAI and interpretable machine learning models in manufacturing
Track 2: Application of AI and Informatics in Healthcare
- Applications of AI in Bio and Neuroinformatics
- Augmented AI for Biosignals and Biomedical Images
- Bioengineering
- Biomedical image processing
- Biomedical images (MRI, RX, PET, etc.)
- Biomedical signal processing
- Biosignals (EEG, ECG, EMG, etc.)
- Biotechnology
- Brain-Computer-Interface
- Cell Imaging and Microscopy
- Cell Therapy Processing
- Cell Therapy Research
- Chromatography
- Diagnostic Development
- DNA and RNA Research
- Drug Discovery and Development
- eHealth, mHealth and uHealth
- Electrophoresis
- Environmental Bioprocessing
- Explainability in biomedical applications
- Forensics and Human Identification
- Gene Editing
- Healthcare and Life Sciences
- Healthcare Services
- Interpretability in biomedical applications
- Managed Care
- Medical Devices and Diagnostics
- Medical robots and bio-robotics
- Nucleic Acid Blotting
- Pharmaceuticals and Biotechechnology
- Population Health Management
- Protein Research: Blotting and Purification
- Public Health Management
- Quantitative Molecular Imaging
- RNA Interference
- Stem Cell Research
- Surface Plasmon Resonance
- Telemedicine
Track 3: Application of AI and Informatics in Pattern Recognition
- Activity/behavior recognition
- Dexterous manipulation
- Face recognition
- Feature extraction, grouping and segmentation
- Human centered systems
- Human-computer interaction
- Image/video analysis
- Learning in vision
- Localization, navigation and mapping
- Mechanism design and applications
- Micro robots and micro-manipulation
- Mobile robotics
- Mobile sensor networks
- Modeling and identification
- Object recognition
- Pattern recognition
- Perception systems
- Robot control
- Robot sensing and data fusion
- Robotic and Automation
- Scene analysis
- Search, rescue and field robotics
- Space and underwater robots
- Tele-robotics
- Tracking and surveillance
- Visual servoing
Track 4: Application of AI and Informatics in Network, Security, and Analytics
- Application security, Malware, viruses, botnets, etc.
- Authentication, authorization, and accounting
- Big Data Analytics
- Blockchain
- Cloud Computing
- Cluster Computing
- Cross-layer Optimization and Control
- Cyber-physical Systems
- Cybersecurity
- Data mining and Information Retrieval
- Decentralization, scalability, and security tradeoff
- Delay Tolerant Networks
- Ecosystem & Infrastructure
- Embedded system security
- Information Security protocols and architectures
- Internet of Services
- Internet of Things (IoT) & Computing
- IoT for Smart Applications
- Localization and Location-based Services
- Mobile Computing
- Network and Internet Forensics Techniques
- Network Intrusion Detection and Prevention, Firewalls, Packet Filters
- Network Management
- Predictive Analytics
- Proof-of-work and consensus algorithms for blockchains
- Public Key Infrastructures, Key Management, Credential Management
- Quality of Service and Resource Management
- Quantum Communications, Sensing, Cryptography
- Secure Routing and Security Management
- Secure smart contract and chain code
- Security & privacy for e-commerce/m-commerce
- Security and Privacy policies
- Security in grid/cloud/pervasive computing
- Security in parallel and distributed systems
- Security in social networks
- Security in wired, mobile, and wireless communications
- Simulation and performance evaluation techniques
- Ubiquitous Network