CALL FOR PAPERS | DOWNLOAD THE CFP FLYER

WCCCT 2024 will provide a premier interdisciplinary platform for researchers, practitioners and educators to present and discuss the most recent innovations, trends, and concerns as well as practical challenges encountered and solutions adopted in the fields of Computing and Communication Technologies.

投稿链接 Submission Links: https://www.zmeeting.org/submission/wccct2024

 
   - TRACK 1: COMPUTING AND INFORMATION SECURITY /  计算与信息安全 -  (Flyer)
    
Track Chairs: Prof. Krzysztof Szczypiorski, Warsaw University of Technology, Poland
                             Assoc. Prof. Jizhe Zhou, Sichuan University, China
                             Dr. Xia Du, Xiamen University of Technology, China

  - TRACK 2: PARALLEL COMPUTING AND EDGE COMPUTING / 并行计算与边缘计算  - (Flyer)
    
Track Chair: Assoc. Prof. Danyang Zheng, Southwest Jiaotong University, China
 
  - TRACK 3: HIGH PERFORMANCE COMPUTING AND MACHINE LEARNING / 高性能计算与机器学习 - (Flyer)
    
Track Chair: Prof. Huisheng Zhang, Dalian Maritime University, China
 
   - TRACK 5: WIRELESS COMMUNICATION TECHNOLOGY AND INTELLIGENT COMMUNICATION NETWORK  /  无线通信技术及智能化通信网络  -  (Flyer)
    
Track Chairs: Prof. Pascal Lorenz, University of Haute Alsace, France
                             Prof. Tianming Ma, Shanghai University of Engineering Science, China
                             Assoc. Prof. Liwei Yang, China Agricultural University, China
                             Assoc. Prof. Bo Li, Ningxia University, China
                             Prof. Yue Wu, Sichuan University, China

  - TRACK 6: SOCIAL COMPUTING / 社会计算 -  (Flyer)
     
Track Chair: Dr. Mervat Medhat Ali, Ajman University, UAE

Topics of interest for submission include, but are not limited to:

- TRACK 1: Computing and Information Security -
计算与信息安全

Artificial Neural Networks and Fuzzy Logic
Cloud Computing
Computational Algorithms
Hybrid Models and Fuzzy Systems
Data Mining
Machine Learning
Meta Heuristics and Swarm Intelligence
Neuro Fuzzy System
Self Organizing Maps
Soft Computing
Support Vector Machine
High Performance Computing
Parallel Processing
Distributed Data Systems
Big data & Data Analytics
Multicore and Cluster Computing
loT Security & Privacy
Mobile Platform & Application Security
Computer & Software Security
Cyber Crime
Secure Application Development
Security for Emerging Networks
Malware Analysis and Reverse Engineering
Securing IT System and Processes
Email and Web Security
Cryptography
Identity & Access Management


- TRACK 2: Parallel Computing and Edge Computing -
并行计算与边缘计算

Distributed Computation and Data Management in Sensor Network Applications
Edge and Fog Computing for Smart Environments
Mobile Edge Computing for Smart Environments
Optimization, Control, and Automation of Edge and Cloud Computing
Computing Continuum from Clouds to Edges
Sustainable and Smart Edge Systems
Artificial Intelligence and Machine Learning for Sensor Network Applications
Edge Intelligence in Smart Home, Smart buildings, and Smart Cities
Parallel and Edge Computing for Smart Manufacturing
Novel Applications, Experiences, and Field Trials with Parallel and Edge Computing
Parallel and Distributed System Architectures
Parallel and Distributed Algorithms
Web Services and Internet Computing
Grid and Cluster Computing
Pervasive/Ubiquitous Computing & Intelligence
Distributed AI and Soft/Natural Computing
Power-Efficient and Green Computing Systems
Multi-access Edge Computing
Parallel and Distributed Computing for AI
Security for Cloud and Edge Computing


- TRACK 3: High Performance Computing and Machine Learning -
高性能计算与机器学习

Fault Tolerance and Resilience in HPC Systems
Benchmarking and Performance Assessment in HPC
Artificial Intelligence and Machine Learning at Scale
Machine Learning on GPUs, TPUs, CPUs
Deep Learning Techniques
Machine Learning in Robotics and Automation
Open Source Tools for Artificial Intelligence
Neural Networks and Deep Learning
Ubiquitous Computing, Services and Applications (UCSA)
Artificial Neural Networks
Support Vector Machine
Convolutional Neural Networks
Deep Neural Network
K-nearest Neighbor
Linear Regression
Canonical Correlation Analysis


- TRACK 4: Communication Integrated Circuit Design -
通信集成电路设计

Audio Subsystem Chip
the Fundamentals of RFIC Design for Wireless Communication Systems
Wireless Transceiver IC Designs
Low-noise-amplifier
Radio-frequency Integrated Circuit
Micro/nano Satellite Integrated Electronic Technology
Design of Integrated Circuits for Optical Communications
RF/millimeter-wave/terahertz Integrated Circuits Design for Imaging, Sensing, and Wireless Communications
Integrated Transceivers in CMOS Technology
Design of Microwave / millimeter Wave Filter
Design of Voltage Controlled Oscillator
Power Amplifier Design
Design of New Generation Beidou Series IC


- TRACK 5: Wireless Communication Technology and Intelligent Communication Network -
无线通信技术及智能化通信网络

High Performance Computing and Machine Learning
Parallel and Distributed Computing and Systems
Cluster and Grid Computing
Virtualization and Virtual Machines
Learning and Intelligence Algorithms
Federated Learning
Cloud Computing for Sensor Data Processing
Big Data Technologies, Frameworks, Systems, and Platforms for Parallel Computing
Edge Computing in Sensor Networks
Energy-efficient Computation, Communication, and Caching at the Edge
Edge Intelligence in Energy-efficient Internet of Things
Resource Management in Edge and Cloud Computing
Computational Models of Social Phenomena
Social Network Analysis
Security, Privacy, Trust in Social Contexts
Social Recommendation
New Theories, Methods, and Objectives in Computational Social Science
Intelligent Applications of Social Computing in Public Health, Sustainability, Environment, Equality, Justice, Education, Cultural Heritage, Peace, Economics, Public Welfare, etc
Data Security & Privacy
Blockchain
Network Security
Security and Privacy of Systems based on Machine Learning and Al
Cloud Security
Security for Cloud and Edge Computing
Satellite Communication
Wireless Channels and Cellular Networks
5G/6G Technology
Satellite Navigation and Space Communication
Mobile Sensing and Applications
Intelligent Reflecting Surface
Deep Reinforcement Learning in Intelligent Wireless Communications
Intelligent Network Services 
Intelligent Network Architecture
Virtual Networks and Artificial Intelligence
Computation and Caching Resources for 6G Wireless Systems
AI-based Network Design and Resource Allocation for Wireless Systems
Analog Integrated Circuit
Digital Integrated Circuit
low-cost Radio-frequency Integrated Circuit
Modeling and Design of Communication Integrated Circuit
Smart IC Design Techniques for Wireless Communications
Microwave / millimeter Wave Antenna Design


- TRACK 6: Social Computing -
社会计算

Social Behavior
Semantic Web
Collective Intelligence
Social Influence and Social Contagions
Quantifying Offline Phenomena through Online Data
Forecasting of Social Phenomena
Science and Technology Studies Approaches to Computational Social Science
Social Media and Health Behaviors
Social Psychology and Personality

Policies of WCCCT

Review Process:
By submitting a paper to WCCCT, the authors agree to the review process and understand that papers undergo a peer-review process. Manuscripts will be reviewed by appropriately qualified experts in the field selected by the Conference Committee, who will give detailed comments and — if the submission gets accepted — the authors submit a revised ("camera-ready") version that takes into account this feedback. All papers are reviewed using a single-blind review process: authors declare their names and affiliations in the manuscript for the reviewers to see, but reviewers do not know each other's identities, nor do the authors receive information about who has reviewed their manuscript. The Committees of WCCCT 2024 invest great efforts in reviewing the papers submitted to the conference and organising the sessions to enable the participants to gain maximum benefit.


Plagiarism:

WCCCT is utterly intolerant of plagiarism. Submitted papers are expected to contain original work executed by the authors with adequate, proper and scholarly citations to the work of others. It is the job of the authors to clearly identify both their own contribution(s) and also published results / techniques on which they depend or build. Reviewers are charged to ensure these standards are met.
If the author is found to commit an act of plagiarism, the following acts of sanction will be taken:
1. Reject the article submitted or delete the article from the final publications.
2. Report the authors violation to his/her supervisor(s) and affiliated institution(s)
3. Report the authors violation to the appropriate overseeing office of academic ethics and research funding agency.
4. Reserve the right to publish the authors name(s), the title of the article, the name(s) of the affiliated institution and the details of misconduct, etc. of the plagiarist”.


Dual/Double Submissions:

By submitting a manuscript to WCCCT, authors acknowledge that it has not been previously published or accepted for publication in substantially similar form in any peer-reviewed venue with publicly accessible papers, including journals, conferences, workshops, or other peer-reviewed, archival forums. Furthermore, no paper substantially similar in content has been or will be submitted to another peer-reviewed conference or workshop with publicly accessible papers during the review period. The authors also attest that they did not submit a substantially similar submission to WCCCT 2024 As a rule of thumb, the WCCCT submission should contain no more than 20 percent of material from previous publications. Violation of any of these conditions will lead to rejection.