posted by user: Kraiden || 4287 views || tracked by 2 users: [display]

AMSNAICC 2019 : Advanced Methods for Social Network Analysis and Inappropriate Content Counteraction

FacebookTwitterLinkedInGoogle

Link: https://idc2019.ru/advanced-methods-for-social-network-analysis-and-inappropriate-content-counteraction-(amsnaicc).html
 
When Oct 7, 2019 - Oct 9, 2019
Where St.Petersburg, Russia
Submission Deadline May 6, 2019
Notification Due May 31, 2019
Final Version Due Jun 4, 2019
Categories    security   social network   information space   inappropriate content
 

Call For Papers

13th International Symposium on Intelligent Distributed Computing (IDC 2019)

7-9 October 2019, Saint-Petersburg, Russia

Advanced Methods for Social Network Analysis and Inappropriate Content Counteraction (AMSNAICC)

Topics of interest:
Information counteraction between states, companies and people
Formal models and techniques for information interaction analysis
Modeling and simulation
Optimization methods
Black PR in social media
Social networks and mental health
Social network analysis and its challenges
Advanced analytics
Artificial intelligence
Big Data
Machine learning
Legal regulation in information space
Data storages
Data visualization
Social network analysis
Psychological aspects of inappropriate content counteraction
Political aspects of inappropriate content counteraction
Medical aspects of inappropriate content counteraction
Technical aspects of inappropriate content counteraction

Call for papers:

IDC-2019 Special Session on Advanced Methods for Social Network Analysis and Inappropriate Content Counteraction (AMSNA) aims to serve as a platform for multi-disciplinary discussions on problems, challenges and perspectives of social network analysis, including graph analysis, natural text mining, distributed data processing, Big data methods, sentiment analysis. Topics of interest of the special session include, but not limited to the following ones: information counteraction between states, companies and people; formal models and techniques for information interaction analysis; modeling and simulation; optimization methods; black pr in social media; social networks and mental health; social network analysis and its challenges; artificial intelligence; big data; machine learning; legal regulation in information space; data storages; data visualization. Also topics of special session will cover various aspects of inappropriate content counteraction, including legal, psychological, political, medical, technical, sociological, and other areas.

Potential authors are invited to submit original papers. Papers should be at most 10 pages long and must be formatted accordingly. Papers must not be under review by any other conference or publication during the review cycle, and must not be previously published or accepted for publication elsewhere.

Submissions and reviews will be handled via EasyChair system: https://easychair.org/conferences/?conf=idc2019

All submissions will be reviewed by at least 2 members of the Technical Program Committee.

All accepted papers will be included in the IDC-2019 Symposium Proceedings, which will be published by Springer as part of their series Studies in Computational Intelligence.

Related Resources

AI in Social Sciences 2026   AI in Social Sciences (working title)
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
Springer; Methods in Molecular Biology 2026   Digital Pathology - Methods and Protocols
EI/Scopus-PCDI 2026   2026 International Conference on Perception, Control and Decision Intelligence-EI/Scopus
ICCT 2026   2026 IEEE 26th International Conference on Communication Technology (IEEE ICCT 2026)
BIO 2026   8th International Conference on Bioscience & Engineering
ICHSS 2026   2026 12th International Conference on Humanity and Social Sciences (ICHSS 2026)
SNLP 2026   7thInternational Conference on Semantic & Natural Language Processing
ICRE--EI 2026   2026 10th International Conference on Reliability Engineering (ICRE 2026)
CNSA 2026   19th International Conference on Network Security & Applications