At present, advanced computing and endogenous security technologies have entered a new era of revolution and development. Constantly, new concepts, new ideas, new methods and new technologies are emerging, such as Mimic Computing, Brain-like Computing, Graph Computing, Memory Computing, Biological Computing, Quantum Computing, as well as new computing and security technologies such as Cyberspace Mimic Defense, Trusted Computing 3.0 and Zero Trust. The 4th "Advanced Computing and Endogenous Security" academic conference focuses on new concepts, new theories, new methods and new technologies of advanced computing and endogenous security technology. The latest progress of technology development in related fields will be discussed, and the latest scientific research and academic research achievements will be shown. Experts and scholars from home and abroad are invited to make special reports, so as to accelerate the development of global advanced computing and endogenous security technology, enabling a new generation of information technology.

Call for paper

Important date

Abstract submission deadline

Advanced Computing

Z-level computing architecture and key technologies

Mimi computing, memory computing, graph computing, cloud computing, quantum computing, brain-like computing, superconducting computing and other new computing architectures and application systems

Software and hardware collaborative computing platform and innovative application system based on new architecture

New operating systems, runtime systems, data management systems, compilation and programming languages, programming environments, etc

Software/hardware co-design technology and ecological environment based on new computing architectures

New large-scale scientific and engineering software

Instruction sets for new processors and accelerators, microstructure, memory structure, interconnection and transmission technologies, programming mode,etc

RISC-V-based architecture design, hardware accelerator design

Soft and hard collaborative computing chip design based on Chiplet and wafer scale integration

Artificial intelligence chip brain, software defined chip, architecture for open source field, a heterogeneous system on a chip, saving calculation integration chip, perception fusion, lightweight edge intelligent chip, etc

Full-process EDA/IP tools, logic manufacturing technology, memory-specific manufacturing technology, power and analog chip technology, etc

Innovative technologies such as non Von Neumann computing architecture, software-defined chips, and AI-supported design automation (EDA), etc

New application technologies and systems such as photoelectric sensing and communication, photoelectric computing and storage, photoelectric imaging and display, etc

Intelligent computing systems and applications based on technologies such as software and hardware collaborative processing, dynamic resource combination, and network component reconstruction, etc

Endogenous Security

Mimic defense technology, moving target defense technology, design security technology, customized trusted space

Software defined security technology, AI-driven security technology, zero-trust security technology, secure multi-party computation technology

Next-generation network endogenous security technology, 5G endogenous security technology, Space-Ground Integrated Network endogenous security technology, artificial intelligence endogenous security technology, industrial Internet endogenous security technology, etc

Chip endogenous security technology, information system endogenous security technology, cloud computing and data center endogenous security technology

Application endogenous security design and implementation technology, network service endogenous security technology implementation technology

Design and implementation technology for industry specific applications and services endogenous security, such as telecommunications, IDC, finance, medical, special trade, etc

Key software and hardware components of endogenous security technology, such as I / O proxy, arbiter and scheduler that used mimic technology to enhance security, also include mimic acceleration and performance optimization technology and endogenous security co-design method of software and hardware

Endogenous security supported technology, endogenous security programming language, endogenous security tool chains and tool libraries, endogenous security compiler and development environment

Endogenous security open sources and platform construction technology

Measurement and evaluation model, performance quantitative design method, and test evaluation method of endogenous security technology

Endogenous security white box injection test and black box confrontation test method, endogenous security technology test site construction technology, etc

Submit Comment
Verify Code Change Another
All Comments
Important Date
  • Conference Date

    Oct 30



    Oct 31


  • Aug 01 2021

    Abstract Submission Deadline

Sponsored By
Southeast University
Supported By
China Industry and Information Technology Publishing & Media Group
Contact Information
Scan the QR code×