CISDA 2013

2013 IEEE Symposium on Computational Intelligence for Security and Defense Applications

Given the current global security environment, there has been increased interest within the security and defense communities in novel techniques for solving challenging problems. The genesis of this interest lies in the fact that repeated attempts of using traditional techniques have left many important problems unsolved, and in some cases, not addressed.
New problems have emerged within the broad areas of security and defense that are difficult to tackle with conventional methods, thus requiring new techniques for detecting and adapting to emerging threats. The purpose of the symposium is to present current and ongoing efforts in computational intelligence (e.g., neural networks, fuzzy systems, evolutionary computation, swarm intelligence, and other emerging learning or optimization techniques) as applied to security and defense problems.

 

Topics

  • A. Advanced Architectures for Defense Operations
    • Multi-Sensor Data Fusion
    • Employment of Autonomous Vehicles
    • etc. Intelligence Gathering and Exploitation
    • Mine Detection
    • Situation Assessment
    • Automatic Target Recognition
    • Mission Weapon Pairing and Assignment
    • Sensor Cueing and Tasking
  • B. Modeling and Simulation of Defense Operations
    • Logistics Support
    • Mission Planning and Execution
    • Resource Management
    • Course of Action Generation
    • Models for War Games
    • Multi-Agent Based Scenarios
    • Strategic and Tactical Planning
    • Human Behavior Modeling
    • Human Emotion Modeling
    • Human Motion Modeling
    • Mission Scheduling
    • Serious Games
  • C. Security Applications
    • Video Surveillance
    • Non-video surveillance methods
    • Suspect Behavior Profiling
    • Automated handling of dangerous situations or people in a security application
    • Stationary or Mobile Object Detection
    • Stationary or Mobile Object Recognition
    • Stationary or Mobile Object Classification
    • Air Security
    • Maritime Security
    • Land Security
    • Joint Security
    • Network Security
    • Biometrics Security
    • Authentication Technologies
  • D. Special Sessions
    • Applied Computational Intelligence in Biometrics
    • Military Operational Logistics Modeling and Simulation
    • Adaptive Network Security and Management
    • Advanced Information Systems, Intelligence Exploration and
    • Utilization, and Computer Architectures for Military and Security
    • Applications
    • Complex Systems Engineering: Defence and Security Applications
  • E. Other Security and Defence Applications
  • F. Evolutionary Computation
    • Ant colony optimization
    • Artificial life
    • Autonomous mental & behaviour development
    • Coevolution & collective behaviour
    • Cultural algorithms
    • Differential evolution
    • Dynamic & uncertain environments
    • Evolving fuzzy systems
    • Evolving neural networks
    • Hybrid evolutionary algorithms
    • Multi-objective optimization
    • Swarm intelligence
  • G. Adaptive Statistical Methods and Neural Netowrks
    • Adaptive Dynamic Programming
    • Reinforcement Learning
    • Computational neuroscience
    • Neuro-engineering
    • Brain-machine interfaces
    • Data mining
    • Pattern recognition
    • Time series analysis
    • Hybrid neural-symbolic
    • Hybrid neuro-fuzzy
    • Hybrid neuro-evolutionary systems
    • Bayesian models
    • Statistical machine learning methods
    • Support vector machines
    • Kernel methods
    • Supervised Learning methods
    • Unsupervised Learning Methods
    • Neural dynamics, complex systems, and chaos
    • Hardware implementations of neural networks and related systems
    • Expert systems
    • Multi-agent systems
  • H. Fuzzy Systems
    • Fuzzy image, speech and signal processing
    • Fuzzy control
    • Fuzzy optimization and design
    • Fuzzy decision analysis and support
    • Fuzzy systems design, modeling, and identification
    • Fuzzy clustering and classifiers
    • Fuzzy information extraction and retrieval
    • Fuzzy information fusion
    • Fuzzy text mining
    • Type-2 fuzzy sets
    • Computing with words
    • Granular computing
    • Rough sets
    • Fuzzy human computer interaction
    • Multi-criteria decision making
  • I. Other Computational Intelligence Methods

Keynote, Tutorial and Panel Sessions

Please forward your proposals with detailed abstract and bio-sketches of the speakers to Symposium Co-Chairs and SSCI Keynote-Tutorial Chair, Dr S Das.

Accepted Special Sessions


Special Session Title:
Computational Intelligence in Unmanned Aerial Vehicle
Special Session Organizer
:Sundaram Suresh, Nanyang Technological University, Singapore
                                         Wang Jianliang, Nanyang Technological University, Singapore
                                          P. B. Sujit, University of Porto, Portugal

Contact
: Ssundaram@ntu.edu.sg, ejlwang@ntu.edu.sg, and sujit@fe.up.pt
(To submit a paper to this session, please select "25s1" as the main research topic)

 

Special Session Title: Autonomy for sensor networks, communication networks, and cyber operations
Special Session Organizer
: Dr. Misty Blowers, Dr. Bryant Wysocki; Air Force Research Laboratory, Rome, NY USA
Contact
: Misty.Blowers@rl.af.mil Bryant.Wysocki@rl.af.mil
(To submit a paper to this session, please select "25s2" as the main research topic)

Special Sessions

Please forward your special session proposals to Symposium Co-Chairs.

Symposium Chair

Akira Namatame, Japan   nama@nda.ac.jp  

Symposium Program Co-Chairs


Nur Zincir-Heywood, Dalhousie University, Canada    zincir@cs.dal.ca
Rami Abielmona, Larus Technologies, Canada    rabielmo@ieee.org

 

Program Committee

(to be announced)

Slawo Wesolkowski, DRDC, Canada