News and Announcements

Welcome to the WCCI 2014 Special Session on Computational Intelligence for Security, Surveillance and Defence (CISSD)! This year, the special session (coded EC39) is colocated with the 2014 IEEE World Congress on Computational Intelligence (WCCI 2014) on July 6-11, 2014 in Beijing, China. The 2014 version is being organized by the IEEE CIS Security, Surveillance and Defence Applications Task Force under the Intelligent Systems Applications Technical Committee (ISATC).

The paper submission deadline has been extended to January 20, 2014!

Also, please feel free to check the previous editions of this special session:

Best regards, 

Rami Abielmona
Slawo Wesolkowski
Rafael Falcon

Overview

Given the rapidly changing and increasingly complex nature of global security, we continue to witness a remarkable interest within the security and defense communities in novel, adaptive and resilient techniques that can cope with the challenging problems arising in this domain. These challenges are brought forth not only by the overwhelming amount of data reported by a plethora of sensing and tracking modalities, but by the emergence of innovative classes of decentralized, mass-scale communication protocols and connectivity frameworks such as cloud computing, vehicular networks and the Internet of Things. Realizing that traditional techniques have left many important problems unsolved, and in some cases, not addressed, further efforts have to be undertaken in the quest for algorithms and methodologies that can detect and easily adapt to emerging threats.

The purpose of this Special Session is to provide a forum for the exchange and discussion of current solutions in Computational Intelligence (e.g., neural networks, fuzzy systems, evolutionary computation, swarm intelligence, and other emerging learning or optimization techniques) as applied to security, surveillance and defense problems. High-quality technical papers addressing research challenges in these areas are solicited. Papers should present original work validated via analysis, simulation or experimentation, including but not limited to the following topics:

Advanced Architectures for Defense Operations

  • Multi-Sensor Data Fusion
  • Employment of Autonomous Vehicles
  • Intelligence Gathering and Exploitation
  • Mine Detection
  • Situation Assessment
  • Automatic Target Recognition
  • Mission Weapon Pairing and Assignment
  • Sensor Cueing and Tasking

Modeling and Simulation of Defense Operations

  • Logistics Support
  • Mission Planning and Execution
  • Resource Management
  • Course of Action Generation
  • Models for War Games
  • Multi-Agent Based Simulation
  • Strategic Planning

Security Applications

  • Human Modeling: Behavior, Emotion, Motion
  • Surveillance
  • Suspect Behavior Profiling
  • Automated Handling of Dangerous Situations or People
  • Stationary or Mobile Object Detection, Recognition and Classification
  • Intrusion Detection Systems
  • Cyber-Security
  • Air, Maritime and Land Security
  • Network Security, Biometrics Security and Authentication Technologies

For a comprehensive list of areas covered by the term computational intelligence please see IEEE CIS Technical Activities.