about

About ISPPAI

2026 International Conference on Information Security, Privacy Protection and Artificial Intelligence (ISPPAI 2026)


ISPPAI 116×160.png

2026 International Conference on Information Security, Privacy Protection and Artificial Intelligence (ISPPAI 2026) will be held in Guangzhou, China, from May 15 to May 17, 2026. As digital transformation accelerates globally, the interplay between cybersecurity, data privacy, and AI ethics has become a critical area of focus. This conference aims to unite leading experts, researchers, and policymakers from academia, industry, and government to address the pressing challenges and opportunities at the nexus of these fields.

ISPPAI 2026 will delve into key themes such as cybersecurity threats and countermeasures, privacy-preserving technologies, ethical AI governance, regulatory compliance, and the societal impact of intelligent systems. Through keynote speeches, panel discussions, technical workshops, and collaborative sessions, participants will explore innovative solutions to safeguard digital ecosystems while ensuring responsible AI development.

By fostering interdisciplinary dialogue, ISPPAI 2026 seeks to advance knowledge, promote best practices, and shape policies that balance technological progress with ethical considerations. Join us as we work toward a secure, privacy-aware, and ethically aligned digital future.

We look forward to welcoming you to Guangzhou for this pivotal exchange of ideas!

重要时间

Important Dates

Submission Date

March 5, 2026

Notification Date

April 10, 2026

Registration Date

April 25, 2026

Conference Date

May 15 - 17, 2026

other

Call For Papers

hot.gif The topics of interest include, but are not limited to:

Artificial Intelligence

AI Algorithms

Natural Language Processing

Fuzzy Logic

Computer Vision and Image Understanding

Signal and Image Processing

Speech and Natural Language Processing

Computational Theories of Learning

Information Retrieval and Fusion

Hybrid Intelligent Systems

Intelligent System Architectures

Knowledge Representation

Knowledge-based Systems

Mechatronics

Multimedia & Cognitive Informatics

Artificial Neural Networks Parallel Processing

Pattern Recognition

Pervasive Computing and Ambient Intelligence

Soft Computing Theory and Applications

Software & Hardware Architectures

Automatic Programming

Machine Learning

Automatic Control

Data Mining and Machine Learning Tools

Robotics

Artificial Intelligence Tools & Applications

Recent Trends and Developments

Information Security

Programming and Problem Solving

Discrete Mathematics

Data Structures and Algorithms

Computer Network

Introduction to Information Security

Cryptography

Cyber Security Technology

Computer Virus and Prevention

Cryptography Experiment

Cyber Security Technology

Computer Virus and Prevention

Data structures and Algorithms

Computer Principle

Principles of Database Systems

Computer Network

Operating System

Information Security and Other related topics

Privacy Protection

Science and Technology Ethics

Information Ethics

Philosophy of Technology

Digital Ethics

Proxy Rush

Data Sovereignty

Technical Tools

Regulation and User Rights Balance

Privacy Enhancement Technologies (PETs)

Application of Differential Privacy in Medical Scenarios

Differential Privacy in Financial Scenarios

Decentralized Identity (DID)

Self-Sovereign Identity (SSI)

Privacy Regulations

Development of a Privacy Impact Assessment (PIA) Automation Tool

User-Side Privacy Control

Privacy Preference Management Platform

Application Permission Abuse Monitoring

User Education and Other Related Topics

For more information, please click:

Learn More

Submission

news.gif Please send the full paper(word+pdf) to Submission System: 

Submission System (Chinese)

Submission System  (English)

news.gif Templates:Download

For more information, please click: 

Learn More

Publication

Publication

Submitted paper will be peer reviewed by conference committees, and accepted papers after registration and presentation will be published in the conference proceedings , which will be submitted for indexing by IEEE Xplore, EI Compendex, Scopus.

Note: All submitted articles should report original results, experimental or theoretical, not previously published or being under consideration for publication elsewhere. Articles submitted to the conference should meet these criteria. We firmly believe that ethical conduct is the most essential virtue of any academic. Hence, any act of plagiarism or other misconduct is totally unacceptable and cannot be tolerated.

单位

Sponsor By

广州计算机学会.jpg

样式(勿删勿保存)