IEEE Symposium on Computational Intelligence for Security and Defense Applications (IEEE CISDA)

Given the current global security environment, there has been increased interest within the security and defense communities in novel techniques for solving challenging problems. The genesis of this interest lies in the fact that repeated attempts of using traditional techniques have left many important problems unsolved, and in some cases, not addressed. New problems have emerged within the broad areas of security and defense that are difficult to tackle with conventional methods, thus requiring new techniques for detecting and adapting to emerging threats.

The purpose of the symposium is to present current and ongoing efforts in computational intelligence (e.g., neural networks, fuzzy systems, evolutionary computation, swarm intelligence, and other emerging learning or optimization techniques) as applied to security and defense problems.

Scope

This symposium aims at publishing high-quality research efforts rooted in Computational Intelligence as applied to defense and security problems. First-class contributions addressing research challenges in these areas and their CI-based solutions (i.e., neural networks, fuzzy systems, evolutionary computation, swarm intelligence, rough sets, granular computing, and other emerging learning or optimization techniques) are solicited.

Topics

Topics for CISDA 21:

  1. Advanced Architectures for Defense Operations,  including:
  • Employment of Autonomous Vehicles
  • Process and User Refinement
  • Automatic Target Recognition
  • Mission Weapon Pairing and Assignment
  • Sensor Cueing and Tasking
  • Self-Healing Systems
  • Decision Support Systems
  • Deep Neural Networks and Deep Learning
  1. Situational Assessment, Intelligence Gathering and Exploitation, including:
  • Multi-Sensor Data Fusion
  • Physics-Based and Human-Derived Information FusionContext-Aware Data Fusion
  • Intelligence Gathering and Exploitation
  • Mine Detection
  • Situational Assessment
  • Impact Assessment
  • Anomaly Detection

3. Energy Aware Computational Intelligence, including:

  • Internet of things
  • Distributed surveillance and monitoring with small devices
  • Object detection and tracking
  • Machine Learning
  • Online learning
  • Federated learning systems
  • Swarm based systems
  1. Autonomy for Defense applications, including
  • Human Autonomy Teaming
  • Multi agent systems
  • Swarming UxV
  • Swarm Intelligence
  • Natural Language Processing
  • Automated Handling of Dangerous Situations or People
  • Stationary or Mobile Object Detection, Recognition and Classification
  • Physical Intrusion Detection Systems
  • Air, Maritime and Land Security
  • Face Recognition
  • Attack Prevention and Defense Systems
  • Threat Forecasting Systems
  • Critical Infrastructure Protection
  • Cyber-Security
  • Biometrics
  1. Modeling and Simulation of Defense Operations, including
  • Logistics Support
  • Mission Planning and Execution
  • Resource Management
  • Red Teaming
  • Computational Red Teaming
  • Course of Action Generation and Recommendation
  • Hybrid Approaches (CI & Operations Research, CI & Game Theory, etc.)
  • Models for War Games
  • Risk-Aware Decision Support
  • Risk Impact and Probability Estimation Systems
  • Multi-Agent Based Simulation
  • Critical Infrastructure Protection
  • Strategic Planning (Path Planning, Asset Allocation, etc.)
  • Counterterrorism and Counterinsurgency
  • Behavioral or Cognitive Learning
  • Human Modeling: Behavior, Emotion, Motion
  1. Defense and Security Applications
  • Operation in Contaminated Environments
  • Remote Undersea Surveillance
  • Disruptive Battlefield Effects
  • Agile Command and Control
  • Multi-Mission Space Operations
  • Cyber-Security
  • Surveillance
  • Suspect Behavior Profiling
  • Anomaly Detection
  • Automated Handling of Dangerous Situations or People
  • Stationary or Mobile Object Detection, Recognition and Classification
  • Physical Intrusion Detection Systems
  • Air, Maritime and Land Security
  • Face Recognition
  • Attack Prevention and Defense Systems
  • Threat Forecasting Systems
  • Critical Infrastructure Protection
  • Biometrics

Symposium Chairs

Rami Abielmona
rami.abielmona@larus.com
Larus Technologies, Canada
Robert Bolia
robert.bolia@dst.defence.gov.au
Defence Science & Technology Group, Australia
Robert Hunjet
robert.hunjet@dst.defence.gov.au
Defence Science & Technology Group, Australi