• IEEE.org
  • IEEE CS Standards
  • Career Center
  • About Us
  • Subscribe to Newsletter

0

IEEE-CS_LogoTM-orange
  • MEMBERSHIP
  • CONFERENCES
  • PUBLICATIONS
  • EDUCATION & CAREER
  • VOLUNTEER
  • ABOUT
  • Join Us
IEEE-CS_LogoTM-orange

0

IEEE Computer Society Logo
Sign up for our newsletter
IEEE COMPUTER SOCIETY
About UsBoard of GovernorsNewslettersPress RoomIEEE Support CenterContact Us
COMPUTING RESOURCES
Career CenterCourses & CertificationsWebinarsPodcastsTech NewsMembership
BUSINESS SOLUTIONS
Corporate PartnershipsConference Sponsorships & ExhibitsAdvertisingRecruitingDigital Library Institutional Subscriptions
DIGITAL LIBRARY
MagazinesJournalsConference ProceedingsVideo LibraryLibrarian Resources
COMMUNITY RESOURCES
GovernanceConference OrganizersAuthorsChaptersCommunities
POLICIES
PrivacyAccessibility StatementIEEE Nondiscrimination PolicyIEEE Ethics ReportingXML Sitemap

Copyright 2026 IEEE - All rights reserved. A public charity, IEEE is the world’s largest technical professional organization dedicated to advancing technology for the benefit of humanity.

  • Home
  • /Digital Library
  • /Journals
  • /Tq
  • Home
  • / ...
  • /Journals
  • /Tq

CLOSED Call for Papers: Special Issue on AI for Cybersecurity and Cybersecurity for AI

Important Dates

    • Submissions Deadline: 15 September, 2023
    • Notification of first Review: 15 November, 2023
    • Submission of Revised Manuscript: 15 January, 2024
    • Notification of Final Decision: 28 February, 2024

Publication: Late 2024


In the past decades, cybersecurity vulnerabilities and threats have been among the most  significant challenges for social development resulting in financial loss, violation of privacy,  damages to infrastructures, and many more. Organizations, governments, and cyber  practitioners tend to leverage state-of-the-art Artificial Intelligence (AI) technologies to analyze,  prevent, and protect their data and services against cyber threats and attacks. Due to the  complexity and heterogeneity of security systems, cybersecurity researchers and practitioners  have shown increasing interest in applying AI methods to mitigate cyber risks in many security  areas, such as malware detection and essential player identification in an underground forum.  On the other hand, adversaries may use AI for offensive purposes, making it difficult to defend  against the attacks. For example, adversaries may target and attack AI algorithms deployed in  critical functions and services by organizations, and successful attacks may cause more severe  consequences, as mentioned above. Therefore, to protect the cyber world, we need more  effective and efficient AI algorithms and tools capable of automatically and intelligently analyzing and classifying the massive amount of data in complex cybersecurity scenarios while protecting these AI algorithms from interference, compromise, or misuse. 

Scope of the Special Issue 

We believe this special issue will give a timely collection of research updates to benefit the  researchers and practitioners working in improving cybersecurity and safety for artificial  intelligence. 

Topics of interest include but are not limited to: 

  • AI applications for cybersecurity 
  • Data-driven cybersecurity innovation 
  • Modelling and simulation of cyber systems and system components 
  • AI approaches to make cyber systems secure and resilient 
  • Human behaviour models with application to cybersecurity 
  • AI tools and techniques, mental resilience, and cybersecurity 
  • AI for cybersecurity software verification and validation 
  • Automation of heterogeneous security tools 
  • Decision making with uncertainty in cyber systems 
  • Security and privacy 

We are interested in the new applications of AI for cybersecurity and Cybersecurity for AI.  Submitted papers will be evaluated based on criteria such as technical originality, creativity, and  applicability. Methodological topics of interest include, but are not limited to:

  •  Graph convolution networks and graph attention networks 
  • Interpretable deep learning 
  • Real-time and/or streaming deep learning 
  • Multi-view deep learning paradigms 
  • Deep adversarial learning (e.g., generative adversarial networks) 
  • Deep transfer learning 
  • Deep Bayesian learning
  • Deep reinforcement learning 

Application areas of interest include, but are not limited to: 

  • Malware evasion and detection 
  • IP reputation services 
  • Event correlation and anomaly detection 
  • Internet of Things (IoT) analysis (e.g., fingerprinting, network telescopes, etc.) • Threat modelling (e.g., mapping exploits to MITRE ATT&CK) 
  • Security data fusion (e.g., event correlation) across multiple data sources • Cybersecurity information sharing and automation 
  • Smart and large-scale vulnerability assessment and management systems • Security Intelligence Augmentation (e.g., human-in-the-loop systems) • Dark Web Analytics for CTI applications 
  • Vulnerability detection 


Submission Guidelines

For author information and guidelines on submission criteria, please visit the TDSC's Author Information page. Please submit papers through the ScholarOne system, and be sure to select the special-issue name. Manuscripts should not be published or currently submitted for publication elsewhere. Please submit only full papers intended for review, not abstracts, to the ScholarOne portal.


Questions?

Contact the guest editors:

  • Yang Liu, Nanyang Technological University, Singapore 
  • Sanjay Jha, University of New South Wales, Australia 
  • Ruitao Feng, University of New South Wales, Australia
  • Sin G. Teo, Agency for Science, Technology and Research, Singapore

LATEST NEWS
Episode 2 | Grow Your Career in Hardware Engineering
Episode 2 | Grow Your Career in Hardware Engineering
Computing’s Top 30: Hariharan Rogothaman
Computing’s Top 30: Hariharan Rogothaman
Computing’s Top 30: Amod Agrawal
Computing’s Top 30: Amod Agrawal
IEEE Quantum Week 2026 to Unveil the Latest in Quantum Computing
IEEE Quantum Week 2026 to Unveil the Latest in Quantum Computing
Creating the Next Generation of Connected Autonomous Systems: an Interview with Weisong Shi on Edge Computing, Autonomous Driving, and the Future of Mobility
Creating the Next Generation of Connected Autonomous Systems: an Interview with Weisong Shi on Edge Computing, Autonomous Driving, and the Future of Mobility
Read Next

Episode 2 | Grow Your Career in Hardware Engineering

Computing’s Top 30: Hariharan Rogothaman

Computing’s Top 30: Amod Agrawal

IEEE Quantum Week 2026 to Unveil the Latest in Quantum Computing

Creating the Next Generation of Connected Autonomous Systems: an Interview with Weisong Shi on Edge Computing, Autonomous Driving, and the Future of Mobility

Call for Nominations: IEEE Computer Society Opens Submissions for the “AI’s 10 to Watch” Award

Episode 1 | Interview with Michelle Tomes

Celebrating Excellence: 2025 IEEE Transactions on Mobile Computing Awards

Get the latest news and technology trends for computing professionals with ComputingEdge
Sign up for our newsletter