{"id":2824,"date":"2025-07-27T12:05:21","date_gmt":"2025-07-27T12:05:21","guid":{"rendered":"https:\/\/irict.co\/irict2025\/?p=2824"},"modified":"2025-07-27T12:05:21","modified_gmt":"2025-07-27T12:05:21","slug":"special-session-on-next-gen-ai-paradigms-for-secure-internet-of-everything-ioe-from-quantum-ai-to-federated-intelligence","status":"publish","type":"post","link":"https:\/\/irict.co\/irict2025\/?p=2824","title":{"rendered":"Special Session on Next-Gen AI Paradigms for Secure Internet of Everything (IoE): From Quantum-AI to Federated Intelligence"},"content":{"rendered":"\n<h4>Co-Chairs: \u00a0<\/h4>\n\n\n\n<h5>Dr. Shahid Latif, University of the West of England, Bristol, United Kingdom<br>Muhammad Shahbaz Khan, Edinburgh Napier University, United Kingdom<br>Professor Tamara Zhukabayeva, L.N. Gumilyov Eurasian National University, Astana, Kazakhstan<br>Dr. Jawad Ahmad, Prince Mohammad Bin Fahd University, Saudi Arabia<\/h5>\n\n\n\n\n\n<strong>Submission Deadline:<\/strong> 15 September 2025<br><strong>Acceptance Notification:<\/strong> 15 October 2025\n\n\n\n\n\n<h4><strong>Scope of the Special Session:<\/strong><\/h4>\n\n\n\n<p>The growth of the Internet of Everything (IoE) has increased the complexity and scale of cybersecurity threats. While traditional AI-based security methods are vital, they are becoming less effective against the evolving threat landscape, which features distributed systems, zero-trust models, and more sophisticated attackers. This special session aims to explore advanced and innovative AI techniques that go beyond traditional machine learning and rule-based methods to safeguard IoE ecosystems.<br>We invite research using advanced AI techniques, such as quantum machine learning for threat detection, federated and swarm intelligence for decentralized defense, neuro-symbolic AI for context-aware anomaly detection, self-evolving AI agents, and zero-shot learning for addressing zero-day threats. We also seek interdisciplinary approaches combining bio-inspired algorithms, edge-aware AI, and AI-driven cryptography to create adaptable security solutions.<br>This session provides a platform for researchers, practitioners, and innovators to showcase new architectures, algorithms, and frameworks that lead to a secure-by-design IoE future.<\/p>\n\n\n\n<h4><strong>Topics of interest include, but are not limited to:<\/strong><\/h4>\n\n\n\n\nQuantum AI techniques for real-time intrusion detection\n\n\n\nFederated and swarm learning for collaborative IoE security\n\n\n\nBio-inspired and evolutionary algorithms for threat prediction\n\n\n\nNeurosymbolic AI for contextual threat reasoning\n\n\n\nZero-shot and few-shot learning for novel attack identification\n\n\n\nSelf-healing and self-evolving AI-based security agents\n\n\n\nPrivacy-preserving AI for multi-entity IoE networks\n\n\n\nAI-augmented blockchain and cryptographic innovations\n\n\n\nSecure multi-modal data fusion using deep hybrid models\n\n\n\nAdversarial robustness in AI for autonomous IoE systems\n\n\n\nAI-driven autonomous response and remediation systems\n\n\n\nExplainable AI (XAI) for high-stakes IoE security operations\n\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The growth of the Internet of Everything (IoE) has increased the complexity and scale of cybersecurity threats. While traditional AI-based security methods are vital, they are becoming less effective against the evolving threat landscape, which features distributed systems, zero-trust models, and more sophisticated attackers. This special session aims to explore advanced and innovative AI techniques that go beyond traditional machine [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":2777,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"pagelayer_contact_templates":[],"_pagelayer_content":"","footnotes":""},"categories":[8],"tags":[],"class_list":["post-2824","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-special-session"],"_links":{"self":[{"href":"https:\/\/irict.co\/irict2025\/index.php?rest_route=\/wp\/v2\/posts\/2824","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/irict.co\/irict2025\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/irict.co\/irict2025\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/irict.co\/irict2025\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/irict.co\/irict2025\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=2824"}],"version-history":[{"count":1,"href":"https:\/\/irict.co\/irict2025\/index.php?rest_route=\/wp\/v2\/posts\/2824\/revisions"}],"predecessor-version":[{"id":2825,"href":"https:\/\/irict.co\/irict2025\/index.php?rest_route=\/wp\/v2\/posts\/2824\/revisions\/2825"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/irict.co\/irict2025\/index.php?rest_route=\/wp\/v2\/media\/2777"}],"wp:attachment":[{"href":"https:\/\/irict.co\/irict2025\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=2824"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/irict.co\/irict2025\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=2824"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/irict.co\/irict2025\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=2824"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}