Call for Papers
Conference Tracks
ICDSI-2025 invites submissions across a diverse set of tracks designed to showcase cutting-edge research in data science and intelligence. Authors are encouraged to submit original work that advances theoretical foundations, proposes novel methodologies, or demonstrates significant practical applications within each track.
Each track focuses on a critical area that drives interdisciplinary collaboration: Artificial Intelligence and Intelligent Systems explores reasoning, planning, and autonomous agents; Machine Learning and Deep Learning covers algorithmic innovations and model interpretability; Cyber Security addresses network protection, privacy, and threat detection; Internet of Things examines sensor networks, edge analytics, and smart infrastructure.
By spanning these interconnected themes, ICDSI-2025 aims to foster a comprehensive dialogue among researchers, practitioners, and industry experts, accelerating innovation and impacting emerging technologies.
Intelligent Systems: AI, Machine Learning & Deep Learning
- Supervised Learning & Regression Models
- Unsupervised Learning & Clustering Techniques
- Reinforcement Learning & Markov Decision Processes
- Deep Neural Architectures (CNNs, RNNs, GNNs)
- Transformer Models & Attention Mechanisms
- Generative Models (GANs, VAEs, Diffusion Models)
- Representation Learning & Embedding Techniques
- Meta learning, Few Shot & Transfer Learning
- Neural Architecture Search & Model Compression
- Explainable AI, Interpretability & Fairness
Natural Language, Computer Vision & Multimodal Analytics
- Language Modeling & Transformer Architectures
- Machine Translation & Cross lingual Learning
- Text Summarization & Information Extraction
- Question Answering & Conversational AI
- Sentiment Analysis & Opinion Mining
- Image Classification & Convolutional Models
- Object Detection, Semantic & Instance Segmentation
- Video Analytics & Action Recognition
- Vision Language Fusion & Multimodal Representation
- Speech Recognition, Synthesis & Audio Processing
Data Science, Big Data & Knowledge Discovery
- Data Preprocessing & Feature Engineering
- Statistical Modeling & Hypothesis Testing
- Distributed Data Processing Frameworks (Hadoop, Spark)
- Scalable Data Warehousing & ETL Pipelines
- Streaming Analytics & Real Time Data Processing
- Data Visualization & Interactive Dashboards
- Graph Analytics & Knowledge Graph Construction
- Anomaly Detection & Outlier Analysis
- Time Series & Sequential Data Mining
- Text Mining & Knowledge Discovery
Internet of Things & Edge Intelligence
- IoT Architectures, Protocols & Standards (MQTT, CoAP)
- Sensor Networks & Data Acquisition Techniques
- Edge/Fog Computing Frameworks & Middleware
- Federated & Distributed Learning on Edge Devices
- Energy Efficient & Lightweight AI Models
- Edge Hardware Accelerators & Neuromorphic Chips
- Real Time Edge Analytics & Stream Processing
- Resource Management, Orchestration & Scheduling
- Digital Twins & Cyber Physical Systems
- Interoperability, Standardization & Gateway Design
Ethics, Privacy & Security in Data and AI
- Algorithmic Fairness, Bias Detection & Mitigation
- Differential Privacy & Privacy Preserving ML
- Adversarial Robustness & Secure Model Training
- Ethical Frameworks, Governance & Accountability
- Data Anonymization, De identification & Consent Models
- Explainability, Transparency & Auditability Tools
- Legal, Regulatory & Compliance Issues (GDPR, CCPA)
- Trustworthy AI Certification & Standards
- Human AI Interaction & Societal Impacts
- Responsible Data Governance & Stewardship
Cybersecurity
- Network & Infrastructure Security Architectures
- Cryptographic Algorithms, Protocols & Key Management
- Intrusion Detection & Prevention Systems (IDS/IPS)
- Malware Analysis, Reverse Engineering & Sandboxing
- Vulnerability Assessment & Penetration Testing
- Secure Software Development & DevSecOps Practices
- Cloud Security & Container/VM Hardening
- Identity & Access Management (IAM)
- Threat Intelligence, Security Analytics & SOC Operations
- Blockchain, Distributed Ledger Technologies & Security
*The Microsoft CMT service is used for managing the peer-review process for this conference. This service has been provided for free by Microsoft and they bore all expenses, including cost for Azure cloud services as well as for software development and support.
Important Dates
Event | Date |
---|---|
Last date for paper submission | 15th August 2025 |
Paper Acceptance notification deadline | 15th September 2025 |
Paper registration deadline | 25th September 2025 |
Camera Ready Paper submission deadline | 25th September 2025 |
Conference | 4-5 December 2025 |