Track – 1: Artificial Intelligence and Cognitive Systems
Evolutionary computing
Cognitive psychology and its applications
Multi agent systems
Social Robotics
Knowledge Representation
Natural Language Process Technology
Data Mining
AI & Society
Seminar Cognitive Neuroscience
Brain Imaging
Neural models of cognitive processes
Memory and Memory Disorders
Evolutionary computing
Cognitive psychology and its applications
Track – 2: Security, Trust, Privacy and Authentication
Big Data security and privacy
Data protection from ransomware
Data transparency and provenance
Digital identity management
Human and usability factors in Web security & privacy
Measurement of online crime/underground economics
Tracking, profiling, and countermeasures against them
Measurement, analysis, and circumvention of Web censorship
Browser security
Authentication and authorization for Web-based services
Social network security and privacy
Transparency, trustworthiness and accountability of social networks
Abusive content such as online harassment, spam, and fake reviews
Privacy-enhancing technologies for the Web
Legal, ethical, policy issues of Web security and privacy
Security for Web services
Applications of cryptography to the web
Security in Web-based electronic commerce
Security and privacy for intelligent assistants
Blockchain in the context of web security
Trust models
Artificial Intelligence in the context of web security
Federated learning with LLMs
Zero Trust and CTI
Sharing of CTI
Track – 3: Cloud, Parallel, Distributed and High Performance Computing
Cloud Security
Cloud Computing for IoT Applications
Architectural Models for Cloud Computing
Virtualization of the infrastructure
Serverless Computing
Elasticity in clouds
Storage virtualization
Green computing models for clouds
Programming models for clouds
Cloud computing for the mobile world
Enterprise Applications on the cloud
QoS for applications on clouds
Optimization and performance issues on clouds
Communication protocols for clouds
Databases for clouds
Security as a service
Big data management and analytics
Cloud Storage and Big data analytics
Literature Study on parallel computing
Parallel System Architectures
High Performance Computing
Supercomputing
Cluster Architecture
Track – 4: Software Engineering
Systems engineering & software engineering
Software Development Process Models
Component-Based Software Engineering
Rapid software development
Computer Aided Software Engineering (CASE)
Software Requirement Analysis and Specification
Elicitation and analysis of requirements
Requirement validation
Requirement specification
Software Design
Design of input and Control
Design of User Interface design
Software Testing and Quality Assurance
Verification and validation
Design of test cases
Quality management activities
Product and process quality
Managing Software Projects
Software Size Estimation and Cost Estimation
Project scheduling, Risk management
Current trends in Software Engineering
Track – 5: Computer Vision and Image Processing
Biometrics, Forensics, Content Protection
Medical Image Analysis
3D Image/ Video Processing
Image Enhancement /Super Resolution / Restoration
Image/ Video Processing for Autonomous Vehicles
Activity Detection/ Recognition
Segmentation and Shape Representation
Human Computer Interaction
Computational Imaging
Visual Sensor Hardware
Document Image Analysis
Motion and Tracking
Image/ Video Scene Understanding
Image/ Video Retrieval
Image/ Video Security
Vision based Human GAIT Analysis
Document and Synthetic Visual Processing
Remote Sensing, Hyperspectral Image Processing
Compressed Image/ Video Analytics
Face, Iris, Emotion, Sign Language and Gesture Recognition
Track – 6: Networking, IOT and Sensors
Network Hardware
WANs and Remote Connectivity
Wireless Networking
Network Operating Systems
Voice and Video Over IP
Network Security
Troubleshooting Network Problems
Ensuring Integrity and Availability
Network Management
IOT Architecture and protocols
Platforms for IoT
Analog and Digital Sensors
Interfacing of Temperature, Humidity, Motion, Light and Gas Sensor
Virtualization concepts and Cloud Architecture
Submission Guidelines
Prospective authors are invited to submit their original research articles to any of the technical tracks.
Submission Website: https://cmt3.research.microsoft.com/AICAPS2026/Submission/Index. (The Microsoft CMT service was used for managing the peer-reviewing process for this conference. This service was provided for free by Microsoft and they bore all expenses, including costs for Azure cloud services as well as for software development and support.)
The paper should be written in IEEE double-column conference format and restricted to a maximum of 6 pages only
The paper should present original work not previously published or currently under review elsewhere
Publication
All registered and presented papers will be submitted to IEEE Xplore for possible publication subject to fulfilling the IEEE eligibility criteria.