Special lssues
Table of Content

Applications of Artificial Intelligence for Information Security

Submission Deadline: 30 December 2024 Submit to Special Issue

Guest Editors

Dr. Shaozhang Niu, Beijing University of Posts and Telecommunications, China
Dr. Zhenguang Gao, Framingham State University, USA
Dr. Jiancheng Zou, North China University of Technology, China

Summary

Artificial intelligence (AI) and information security are two hot research areas today. AI is profoundly influencing and changing the patterns of our lives, work, and learning. It is widely used in various fields such as autonomous driving, medical diagnosis, and smart home, providing more accurate and efficient solutions. With the development of information technology, especially the breakthrough progress of next-generation AI technologies such as large models, information security issues are becoming increasingly prominent, and the data security of governments and enterprises and personal privacy protection are facing huge challenges. AI and information security technology are mutually penetrating, promoting, and constraining their respective development. Faced with a large number of key challenges emerging in the fields of AI and information security, researchers and technology developers are diligently working to provide proper solutions within these domains. This special issue aims to delve into the evolving landscape of AI and security concerns.  We invite academic and industrial communities to present their cutting-edge research, offering innovative solutions to meet these challenges. Together, let's embrace the AI promising future, fortify against various security threats, and unlock boundless opportunities.


Keywords

Machine learning algorithms.
Natural language processing (NLP).
Computer vision and pattern recognition.
Robotics.
Reinforcement learning.
Deep learning.
Explainable AI.
AI ethics and fairness.
Knowledge representation and reasoning.
AI in healthcare.
Threat detection and prevention.
Anomaly detection.
Intrusion detection and response.
Vulnerability assessment and management.
Authentication and access control.
Security analytics.
Threat intelligence and information sharing.
Privacy protection.
Cybersecurity risk assessment.
Secure network communication.

Share Link