Submission Deadline: 15 October 2026 View: 197 Submit to Special Issue
Prof. Chin-Shiuh Shieh
Email: csshieh@nkust.edu.tw
Affiliation: Department of Electronic Engineering, National Kaohsiung University of Science and Technology, Kaohsiung, Taiwan
Research Interests: information security, computational intelligence, artificial intelligence, computer networking

Dr. Thanh-Tuan Nguyen
Email: tuannt@ntu.edu.vn
Affiliation: Department of Electronic and Automation Engineering, Nha Trang University, Nha Trang, Vietnam
Research Interests: information security, intelligent computation, heuristic optimization

Dr. Chun-Chih Lo
Email: georgelo@nkust.edu.tw
Affiliation: Department of Electronic Engineering, National Kaohsiung University of Science and Technology, Kaohsiung, Taiwan
Research Interests: information security, network technologies and applications, emerging areas in artificial intelligence, mobile networks and computing, cloud computing, machine learning

1) Introduction: In an era of exponential digital interconnectivity, conventional security frameworks increasingly struggle to mitigate the complexities of sophisticated cyber threats. Deep Learning (DL) has emerged as a transformative paradigm, offering the self-adaptive and robust capabilities necessary to process massive data streams, identify zero-day vulnerabilities, and automate real-time threat mitigation.
2) Aim and Scope: This Special Issue invites cutting-edge research and comprehensive review articles focusing on the intersection of Deep Learning and Cybersecurity. We seek submissions that address critical challenges in model accuracy, scalability, and resilience against evolving threats. Key areas of interest encompass novel neural architectures for intrusion detection, advanced malware analysis, and privacy-preserving frameworks. Furthermore, we encourage studies on the security of AI itself, specifically regarding adversarial attacks and defense strategies, to provide a holistic perspective on how deep learning can fortify next-generation cyber defense mechanisms.
3) Suggested themes:
· Deep Learning architectures for Network Intrusion Detection Systems (NIDS).
· Advanced Malware detection and classification using Deep Learning.
· Adversarial attacks and defense mechanisms in Deep Learning models.
· Privacy-preserving Deep Learning and Federated Learning for security.
· Deep Learning-based approaches for IoT and Industrial Control System security.
· Generative Adversarial Networks (GANs) for cyber threat intelligence.
· Deep Learning for phishing detection and social engineering prevention.


Submit a Paper
Propose a Special lssue