Main tracks

PAIS’2025 solicits papers dealing with Smart Communications in (not limited to):

Track 1 : Artificial Intelligence and Data Sciences

  • Artificial Intelligence
  • Neural Networks
  • Machine learning
  • Deep learning
  • Reinforcement Learning
  • Agents and Multi-agent Systems
  • Robotics
  • Computer Vision
  • Algorithmic Game Theory
  • Large scale Machine Learning
  • AI-optimized Hardware
  • Decision Management
  • Fuzzy Logic
  • Expert Systems
  • Natural Language Processing
  • Data Mining
  • Computational Optimization
  • Sentiment Analysis
  • Biometrics

Track 2 : Ambient Intelligence

• Smart Cities
• Smart Grids and Energy Networks
• Sensing and Sensor Networks
• Ambient Assisted Living
• Smart Healthcare
• Intelligent Transportation
• Affective computing
• Agents and Multi-agent Systems
• Context-aware pervasive systems
• Human-Computer Interaction
• Computer Vision

• Geographic Information Systems (GIS)
• Video Analysis
• Medical Diagnosis
• Segmentation Techniques
• Augmented Reality
• Virtual Reality
• Pattern Recognition
• Image Processing and Artificial Vision Application
• Pattern Recognition: Fuzzy Clustering and Classifiers
• Fuzzy Image, Speech and Signal Processing
• Vision and Multimedia

Track 3 : Technology Trends

• Blockchain
• Big Data
• Deep learning
• Datamining
• Data Analytics
• Digital Transformation
• Social Computing
• Cloud Computing
• Grid Computing
• E-Learning
• Quantum Computing

• High-Performance Computing
• Distributed and parallel systems
• Cognitive Computing
• Optimization
• Embedded Computing
• Scalable Computing
• Human-centered Computing
• Mobile computing
• Distributed Testing
• Test Software
• Fault-Tolerant Control

• Adaptive Control
• Control Applications
• Control Design Methods
• Control Theory
• Diagnosis
• Discrete Event Systems
• Intelligent Control
• Predictive Control
• Process Control
• Robotics

Track 4. Networks and Security

  •  Access control and authorization
  • Accountability
  • Anonymity
  • Application security
  • Attacks and defenses
  • Authentication
  • Blockchain technologies
  • Censorship resistance
  • Cloud security
  • Distributed systems security
  • Economics of security and privacy
  • Embedded systems security
  • Forensics
  • Hardware security
  • Intrusion detection and prevention
  • Malware and unwanted software
  • Mobile and Web security and privacy
  • Language-based security
  • Network and systems security
  • Privacy technologies and mechanisms
  • Protocol security
  • Secure information flow
  • Security and privacy for the Internet of Things
  • Security and privacy metrics
  • Security and privacy policies
  • Security architectures
  • Usable Security and privacy
  • Steganography
  • Cryptography