International Conference on Frontiers in Cyber Security on October 24-26, 2025 in Guiyang, China

International Conference on Frontiers in Cyber Security on October 24-26, 2025 in Guiyang, China

About Conference:

The Eighth International Conference on Frontiers in Cyber Security (FCS 2025) will be co-organized by School of Big Data and Computer Science, Guizhou Normal University and School of Mathematics, Southwest Minzu University. It will be held in Guiyang, P.R. China, from October 24 to October 26, 2025. Cyber security is being paid more and more attention by industry and academia. New cyber security technologies are emerging. Many universities and institutions have set up research centers or schools for cyber security. Both government and enterprises strongly support teaching and research in cyber security. However, how to conduct research and education on cyber security is inexperienced and how to run a center for cyber security is also worth exploring since it involves many departments. The FCS conference provides a good platform for researchers and practitioners to exchange the latest research results in cyber security. The conference proceedings will be published by Springer Communications in Computer and Information Science (CCIS), which is indexed by EI.

 

Co-organizers:

School of Big Data and Computer Science, Guizhou Normal University

School of Mathematics, Southwest Minzu University

 

Conference Committee:

(In Alphabet Order of Last Name)

1) Steering Chairs

Fagen Li, University of Electronic Science and Technology of China, China

Daiyuan Peng, Southwest Jiaotong University, China

Hongxia Wang, Sichuan University, China

Yonghui Zhou, Guizhou Normal University, China

 

2) General Chairs

Weihua Ou, Guizhou Normal University, China

Changgen Peng, Guizhou University, China

Ying Tan, Southwest Minzu University, China

Xiaohu Tang, Southwest Jiaotong University, China

Xiaosong Zhang, University of Electronic Science and Technology of China, China

 

3) Program Chairs

Yanli Chen, Guizhou Normal University, China

Xiaoguang Liu, Southwest Minzu University, China

Yong Ma, Jiangxi Normal University, China

Neal N. Xiong, Southern New Hampshire University, USA

 

4) Local Chairs

Lunzhi Deng, Guizhou Normal University, China

Jinrong Mo, Guizhou Normal University, China

Anzhi Wang, Guizhou Normal University, China

 

5) Publicity Chairs

Shuanggen Liu, Xi'an University of Posts & Telecommunications, China

Hanzhou Wu, Shanghai University, China

Ling Xiong, Xihua University, China

 

6) Publications Chairs

Donghong Cai, Jinan University, China

Zhaoyang Li, Zhengzhou University of Light Industry, China

Huan Wang, Guizhou University of Finance and Economics, China

 

7) Financial Chairs

Weian Li, Guizhou Normal University, China

Yongrong Wang, Guizhou Normal University, China

 

8)Program Committee Members

Yi Chen, Guizhou University, China

Minquan Cheng, Guangxi Normal University, China

Yunhe Cui, Guizhou University, China

Mingze He, Sichuan Police College, China

Chunhua Jin, Huaiyin Institute of Technology, China

Yue Li, Huaqiao University, China

Yong Liu, Hubei University of Automotive Technology, China

Zhenghui Liu, Xinyang Normal University, China

Qing Qian, Guizhou University of Finance and Economics, China

Canghong Shi, Xihua University, China

Xiangguang Xiong, Guizhou Normal University, China

Zheng Yang, Fujian Normal University, China

Limengnan Zhou, University of Electronic Science and Technology of China, Zhongshan Institute, China

Weixi Zhou, Sichuan Normal University, China

Hui Zhu, Hainan University, China

 

Contact Us:

Official Website: https://icfcs.org

Phone: +86 19136140052

Email: [email protected]

 

Call For Papers:

Topics:

Access control

Key management and key recovery

Anonymity

Language-based security

Applied cryptography

Malware and anti-malware

Authentication and authorization

Mobile computing security and privacy

Biometrics security

Network security

Blockchain security and privacy

Cloud computing and edge computing security

Operating systems security

Computer and digital forensics

Cyber-physical systems security

Privacy protection

Data and system integrity

Privacy-preserving data mining

Database security

Wireless security

Multimedia security

Distributed systems security

Social networks security, privacy and trust

Software defined networking security

Embedded systems security

Security management

Security models, metrics, and policies

Fraud and cyber-crime

Security and privacy of Big Data

Hardware security

Security of critical Infrastructures

Identity access management

Trust and reputation systems

Trusted and trustworthy computing technologies

Usable security and privacy

Insider threat detection

Underground economy

Intellectual property protection

Verification of security protocols

Intrusion detection

Web security

IoT security and privacy

AI security

Others

 

Name: PCO

Related Events