International Conference on System Safety and Security on December 12-14, 2025 in Hangzhou, China

International Conference on System Safety and Security on December 12-14, 2025 in Hangzhou, China

Publication:

Accepted papers of ICSSS 2025 (after proper registration and presentation) will be collected in the conference proceedings.

 

Submission Guideline:

♢ English is the official language. Paper should be prepared in English.

♢ Abstract submission is for presentation only without publication.

♢ Full paper submission is for both presentation and publication. (No less than 4 pages)

♢ Submission Methods:

- By online submission system: http://www.easychair.org/conferences/?conf=icsss2025

- Or Submit to [email protected] as attachment

For more details, please visit: https://www.icsss.net/submission.html

 

Contact Us:

Conference Secretary: Ms. Yolanda Dong

Email: [email protected]

Tel: +86-18080013977

Website: https://www.icsss.net/index.html

 

 

Topics:

Topics of interest for submission include, but are not limited to:

Track 1: Content Generation and Tampering Content Detection

▪ Media Manipulation Detection and Localization

▪ Deepfake Forgery Detection and Mitigation

▪ Authenticity Assessment of AI-Generated Media (Images, Videos, Audio, Text)

▪ Approximate Reasoning

 

Track 2: Traceability and Provenance Analysis of Synthetic Content

▪ Source Device Attribution of Synthetic Media

▪ Generative Model Attribution (GANs, Diffusion Models)

▪ Identity Provenance in AI-Generated Content

 

Track 3: Security of Large Language Models

▪ Adversarial Attacks and Defense Strategies for LLMs

▪ Jailbreaking Attacks and Prompt Injection Mitigation

▪ Security Risks in Knowledge Distillation Pipelines

▪ Monitoring Malicious Adaptation of Open-Source LLMs

▪ Detection and Mitigation of Hallucinations in LLMs

▪ Content Integrity Assurance in Multimodal LLMs

 

Track 4: Data Privacy Protection

▪ Privacy Leakage in Federated Learning Systems

▪ Privacy-Preserving Data Anonymization Techniques

▪ Secure Multi-Party Computation Frameworks

▪ Ethical Implications of Synthetic Data Generation

▪ Countermeasures Against AI-Driven Data Reconstruction

 

Track 5: AI-Driven Cybersecurity

▪ AI-Powered Threat Detection and Incident Response

▪ Automated Vulnerability Discovery and Exploitation

▪ AI in Offensive and Defensive Network Operations

For more topics, please visit: https://www.icsss.net/cfp.html

Name: International Association of Computer Science and Information Technology
Website: http://www.iacsit.org/

Related Events