<div dir="ltr"><div><font color="#0000ff">[Apologies if you receive multiple copies of this CFP]</font></div><div><font color="#0000ff"><br></font></div><p class="MsoNormal" align="center" style="margin:0cm;text-align:center;font-size:12pt;font-family:"Times New Roman",serif"><b><span style="font-size:14pt">The Global AI Summit 2024</span></b></p><p class="MsoNormal" align="center" style="margin:0cm;text-align:center;font-size:12pt;font-family:"Times New Roman",serif"><b><span style="font-size:14pt">International Conference on Artificial Intelligence and Emerging Technology</span></b><b><span style="font-size:14pt;font-family:Calibri,sans-serif"></span></b></p><p class="MsoNormal" align="center" style="margin:0cm;text-align:center;font-size:12pt;font-family:"Times New Roman",serif"><b><span style="font-size:14pt">4<sup>th</sup> – 6<sup>th</sup> September 2024</span></b></p><h1 style="margin:3pt 0cm 0.0001pt;text-align:justify;font-size:10pt;font-family:"Times New Roman",serif"><span style="font-size:14pt;color:rgb(192,0,0);letter-spacing:-0.05pt">Call for Papers (CFP) </span></h1><div><h1 style="margin:0cm;text-align:justify;font-size:10pt;font-family:"Times New Roman",serif"><a href="https://cmt3.research.microsoft.com/AISUMMIT2024/Track/17/Submission/Create" target="_blank" style="color:rgb(5,99,193)"><span style="letter-spacing:-0.05pt">https://cmt3.research.microsoft.com/AISUMMIT2024/Track/17/Submission/Create</span></a></h1></div><h1 style="margin:3pt 0cm 0.0001pt;text-align:justify;font-size:10pt;font-family:"Times New Roman",serif"><span style="font-size:14pt;color:rgb(192,0,0);letter-spacing:-0.05pt">Special Session on “</span><span style="font-size:14pt;color:rgb(192,0,0);letter-spacing:-0.05pt">Emerging Technologies and Artificial Intelligence for Secure IoT-enabled Computer Vision Applications”</span><span style="font-size:14pt;color:rgb(192,0,0)"></span></h1><h1 style="margin:3pt 0cm 0.0001pt 22.5pt;text-align:justify;font-size:10pt;font-family:"Times New Roman",serif"><span style="font-size:2pt"> </span></h1><p style="margin:0cm;text-align:justify;font-size:12pt;font-family:"Times New Roman",serif"><span lang="EN-US" style="font-size:9pt;color:rgb(13,13,13);background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial">    In contemporary years, the convergence of Artificial Intelligence (AI) and Emerging Technologies such as Blockchain, Artificial Intelligence (AI), Digital Twin (DT), and the Internet of Things (IoT) has catalyzed rapid advancements across various advanced applications. One promising application area is Computer Vision (CV), where AI-powered systems investigate visual data from IoT-enabled sensor devices to extract beneficial insights. However, as these technologies proliferate, ensuring the security and privacy of IoT-enabled Computer Vision Applications becomes essential. One of the primary objectives of this special session is to explore innovative solutions and strategies to ensure the security, privacy, and trustworthiness of Computer Vision Approaches (CVA) deployed in IoT Network Environments. Moreover, incorporating IoT-enabled Computer Vision Applications security measures within these technologies, including Blockchain, Federated Learning (FL), Digital Twin (DT), Artificial Intelligence (AI), and others, is imperative to safeguard sensitive vision data, maintain privacy preservation, and mitigate cybersecurity threats and facilitate the development of robust, trustworthy, and privacy-preserving computer vision applications. The motivation behind a special issue on “Emerging Technologies and Artificial Intelligence for Secure IoT-enabled Computer Vision Applications” derives from the urgent need to explore and comprehend the multifaceted implications of these cutting-edge innovations. With IoT sensor devices permeating various aspects of Computer Vision, from wearable IoT networks, the potential attack surface for cyber threats expands exponentially. By delving into this realm, we strive to foster a deeper acquaintance of how emerging technologies such as Artificial Intelligence (AI), Blockchain, and Advanced Encryption Algorithms (AEA) can be addressed to create secure, efficient, and IoT-enabled Computer Vision Applications paradigms. Therefore, this special session explores innovative solutions, advanced technologies, and best practices to fortify Secure IoT-enabled Computer Vision Applications </span><span style="font-size:9pt;color:rgb(13,13,13);background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial">(SICVA)</span><span lang="EN-US" style="font-size:9pt;color:rgb(13,13,13);background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial">. </span></p><p style="margin:0cm;text-align:justify;font-size:12pt;font-family:"Times New Roman",serif"><span style="font-size:9pt;color:rgb(13,13,13);background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial">    This special session explores the latest advancements in Emerging Technologies and Artificial Intelligence for Secure IoT-enabled Computer Vision Applications (SICVA). SI's main objective is to serve as a comprehensive resource for researchers, practitioners, and policymakers striving to navigate the complex landscape of Secure IoT-enabled Computer Vision Applications. By combining cutting-edge research and practical insights, we seek to advance knowledge and promote the adoption of secure and resilient IoT technologies that prioritize vision well-being and data integrity</span><span style="font-size:9pt">. </span><span lang="EN-US" style="font-size:9pt;color:rgb(13,13,13);background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial">This special session explores the intersection of AI, emerging technologies, and IoT-enabled Computer Vision Applications </span><span style="font-size:9pt;color:rgb(13,13,13);background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial">(SICVA)</span><span lang="EN-US" style="font-size:9pt;color:rgb(13,13,13);background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial">, explicitly focusing on security and privacy challenges and solutions.</span></p><p style="margin:0cm;text-align:justify;font-size:12pt;font-family:"Times New Roman",serif"><span lang="EN-US" style="font-size:2pt;color:rgb(13,13,13);background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial"> </span></p><p class="MsoNormal" style="margin:0cm;text-align:justify;font-size:12pt;font-family:"Times New Roman",serif"><span style="font-size:9pt">Topics of interest include, but are not limited to, the following:</span></p><p style="margin:0cm 0cm 10pt 25.1pt;text-align:justify;line-height:16.8667px;font-size:11pt;font-family:Calibri,sans-serif"><span lang="EN-US" style="font-size:9pt;line-height:13.8px;font-family:Symbol;color:rgb(13,13,13)">·<span style="font-variant-numeric:normal;font-variant-east-asian:normal;font-variant-alternates:normal;font-kerning:auto;font-feature-settings:normal;font-stretch:normal;font-size:7pt;line-height:normal;font-family:"Times New Roman"">       </span></span><span lang="EN-US" style="font-size:9pt;line-height:13.8px;font-family:"Times New Roman",serif;color:rgb(13,13,13);background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial">Machine Learning and AI for Secure IoT-enabled Computer Vision Applications</span></p><p style="margin:0cm 0cm 0cm 25.1pt;text-align:justify;line-height:16.8667px;font-size:11pt;font-family:Calibri,sans-serif"><span lang="EN-US" style="font-size:9pt;line-height:13.8px;font-family:Symbol;color:rgb(13,13,13)">·<span style="font-variant-numeric:normal;font-variant-east-asian:normal;font-variant-alternates:normal;font-kerning:auto;font-feature-settings:normal;font-stretch:normal;font-size:7pt;line-height:normal;font-family:"Times New Roman"">       </span></span><span lang="EN-US" style="font-size:9pt;line-height:13.8px;font-family:"Times New Roman",serif;color:rgb(13,13,13);background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial">Privacy-preserving Sharing Mechanisms for IoT-enabled Computer Vision Applications</span></p><p style="margin:0cm 0cm 0cm 25.1pt;text-align:justify;line-height:16.8667px;font-size:11pt;font-family:Calibri,sans-serif"><span lang="EN-US" style="font-size:9pt;line-height:13.8px;font-family:Symbol;color:rgb(13,13,13)">·<span style="font-variant-numeric:normal;font-variant-east-asian:normal;font-variant-alternates:normal;font-kerning:auto;font-feature-settings:normal;font-stretch:normal;font-size:7pt;line-height:normal;font-family:"Times New Roman"">       </span></span><span lang="EN-US" style="font-size:9pt;line-height:13.8px;font-family:"Times New Roman",serif;color:rgb(13,13,13);background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial">Threat Analysis in IoT-enabled Computer Vision Applications</span></p><p style="margin:0cm 0cm 0cm 25.1pt;text-align:justify;line-height:16.8667px;font-size:11pt;font-family:Calibri,sans-serif"><span lang="EN-US" style="font-size:9pt;line-height:13.8px;font-family:Symbol;color:rgb(13,13,13)">·<span style="font-variant-numeric:normal;font-variant-east-asian:normal;font-variant-alternates:normal;font-kerning:auto;font-feature-settings:normal;font-stretch:normal;font-size:7pt;line-height:normal;font-family:"Times New Roman"">       </span></span><span lang="EN-US" style="font-size:9pt;line-height:13.8px;font-family:"Times New Roman",serif;color:rgb(13,13,13);background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial">Cybersecurity Measures</span><b><span lang="EN-US" style="font-size:9pt;line-height:13.8px;font-family:"Times New Roman",serif"> </span></b><span lang="EN-US" style="font-size:9pt;line-height:13.8px;font-family:"Times New Roman",serif;color:rgb(13,13,13);background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial">for IoT-enabled Computer Vision Applications</span></p><p style="margin:0cm 0cm 0cm 25.1pt;text-align:justify;line-height:16.8667px;font-size:11pt;font-family:Calibri,sans-serif"><span lang="EN-US" style="font-size:9pt;line-height:13.8px;font-family:Symbol;color:rgb(13,13,13)">·<span style="font-variant-numeric:normal;font-variant-east-asian:normal;font-variant-alternates:normal;font-kerning:auto;font-feature-settings:normal;font-stretch:normal;font-size:7pt;line-height:normal;font-family:"Times New Roman"">       </span></span><span lang="EN-US" style="font-size:9pt;line-height:13.8px;font-family:"Times New Roman",serif;color:rgb(13,13,13);background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial">Edge Computing Security for IoT-enabled Computer Vision Applications</span></p><p style="margin:0cm 0cm 0cm 25.1pt;text-align:justify;line-height:16.8667px;font-size:11pt;font-family:Calibri,sans-serif"><span lang="EN-US" style="font-size:9pt;line-height:13.8px;font-family:Symbol;color:rgb(13,13,13)">·<span style="font-variant-numeric:normal;font-variant-east-asian:normal;font-variant-alternates:normal;font-kerning:auto;font-feature-settings:normal;font-stretch:normal;font-size:7pt;line-height:normal;font-family:"Times New Roman"">       </span></span><span lang="EN-US" style="font-size:9pt;line-height:13.8px;font-family:"Times New Roman",serif;color:rgb(13,13,13);background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial">Blockchain-based Secure Scheme for IoT-enabled Computer Vision Applications</span></p><p style="margin:0cm 0cm 0cm 25.1pt;text-align:justify;line-height:16.8667px;font-size:11pt;font-family:Calibri,sans-serif"><span lang="EN-US" style="font-size:9pt;line-height:13.8px;font-family:Symbol;color:rgb(13,13,13)">·<span style="font-variant-numeric:normal;font-variant-east-asian:normal;font-variant-alternates:normal;font-kerning:auto;font-feature-settings:normal;font-stretch:normal;font-size:7pt;line-height:normal;font-family:"Times New Roman"">       </span></span><span lang="EN-US" style="font-size:9pt;line-height:13.8px;font-family:"Times New Roman",serif;color:rgb(13,13,13);background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial">Digital Twin-based Virtual Environment for IoT-enabled Computer Vision Application</span></p><p style="margin:0cm 0cm 0cm 25.1pt;line-height:normal;text-align:justify;font-size:11pt;font-family:Calibri,sans-serif"><span lang="EN-US" style="font-size:9pt;font-family:Symbol;color:rgb(13,13,13)">·<span style="font-variant-numeric:normal;font-variant-east-asian:normal;font-variant-alternates:normal;font-kerning:auto;font-feature-settings:normal;font-stretch:normal;font-size:7pt;line-height:normal;font-family:"Times New Roman"">       </span></span><span lang="EN-US" style="font-size:9pt;font-family:"Times New Roman",serif;color:rgb(13,13,13);background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial">Secure communication protocols for IoT devices transmitting visual data.</span></p><p class="MsoNormal" style="margin:0cm;text-align:justify;font-size:12pt;font-family:"Times New Roman",serif"><span lang="EN-US" style="font-size:2pt;color:rgb(13,13,13);background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial"> </span></p><h1 style="margin:0cm;text-align:justify;font-size:10pt;font-family:"Times New Roman",serif"><span style="font-size:12pt;color:rgb(192,0,0);letter-spacing:-0.05pt">Manuscript Submission Process: </span><span style="color:black;letter-spacing:-0.05pt;font-weight:normal">Open your </span><span style="color:black;letter-spacing:-0.05pt">Microsoft CMT Account Login</span><span style="color:black;letter-spacing:-0.05pt;font-weight:normal">, choose the AISUMMIT2024 conference, select the Session </span><span style="color:black;letter-spacing:-0.05pt">“</span><span style="color:black;background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial">Emerging Technologies and Artificial Intelligence for Secure IoT-enabled Computer Vision Applications (SICVA)</span><span style="color:black;letter-spacing:-0.05pt;font-weight:normal">”, and submit the manuscript or choose the following link for the submission manuscript</span><span style="color:black;letter-spacing:-0.05pt"> </span><a href="https://cmt3.research.microsoft.com/AISUMMIT2024/Track/17/Submission/Create" target="_blank" style="color:rgb(5,99,193)"><span style="letter-spacing:-0.05pt">https://cmt3.research.microsoft.com/AISUMMIT2024/Track/17/Submission/Create</span></a><span style="font-size:12pt;color:rgb(192,0,0);letter-spacing:-0.05pt"></span></h1><h1 style="margin:0cm;text-align:justify;line-height:15.3333px;font-size:10pt;font-family:"Times New Roman",serif"><span style="font-size:4pt;line-height:6.13333px;color:rgb(192,0,0);letter-spacing:-0.05pt"> </span></h1><h1 style="margin:0cm;text-align:justify;font-size:10pt;font-family:"Times New Roman",serif"><span style="font-size:12pt;color:rgb(192,0,0);letter-spacing:-0.05pt">Guest</span><span style="font-size:12pt;color:rgb(192,0,0);letter-spacing:-0.6pt"> </span><span style="font-size:12pt;color:rgb(192,0,0)">Session Chairs</span><span style="letter-spacing:-0.05pt">                                                                                  </span><span style="font-size:12pt;color:rgb(192,0,0)"></span></h1><p class="MsoNormal" align="left" style="margin:0cm;background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial;font-size:12pt;font-family:"Times New Roman",serif"><b><span style="font-size:9pt;color:rgb(112,48,160);background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial">Dr. Sushil Kumar Singh</span></b><b><span style="font-size:9pt;color:black;background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial">, Marwadi University, Rajkot, Gujarat, India</span></b><b><span style="font-size:9pt;color:rgb(112,48,160)">, </span></b><span style="font-size:8pt;color:black;background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial"><a href="mailto:sushilkumar.singh@marwadieducation.edu.in" target="_blank">sushilkumar.singh@marwadieducation.edu.in</a> </span><span style="font-size:8pt;color:black"></span></p><p class="MsoNormal" align="left" style="margin:0cm;background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial;font-size:12pt;font-family:"Times New Roman",serif"><b><span style="font-size:9pt;color:rgb(112,48,160);background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial">Dr. Himanshu Gupta,  </span></b><b><span style="font-size:9pt;color:black;background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial">Marwadi University, Rajkot, Gujarat, India, </span></b><span style="font-size:8pt;color:black;background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial"><a href="mailto:himanshu.gupta@marwadieducation.edu.in" target="_blank">himanshu.gupta@marwadieducation.edu.in</a></span><b><span style="font-size:9pt;color:black;background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial"></span></b></p><p class="MsoNormal" style="margin:0cm;background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial;text-align:justify;font-size:12pt;font-family:"Times New Roman",serif"><b><span style="font-size:9pt;color:rgb(112,48,160);background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial">Dr. Dinesh Kumar, </span></b><b><span style="font-size:9pt;color:black;background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial">Bennett University, Greater Noida, U.P., India, </span></b><span style="font-size:8pt;color:black;background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial"><a href="mailto:dineshkr@ieee.org" target="_blank" style="color:rgb(5,99,193)">dineshkr@ieee.org</a></span></p><p class="MsoNormal" align="left" style="margin:0cm;background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial;font-size:12pt;font-family:"Times New Roman",serif"><b><span style="font-size:9pt;color:rgb(112,48,160);background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial">Dr. Rajesh Kumar Shrivastava</span></b><b><span style="font-size:9pt;color:black;background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial">, Bennett University, Greater Noida, U.P., India, </span></b><span style="font-size:8pt;color:black;background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial"><a href="mailto:rajesh.shrivastava@bennett.edu.in" target="_blank" style="color:rgb(5,99,193)">rajesh.shrivastava@bennett.edu.in</a></span></p><p class="MsoNormal" align="left" style="margin:0cm;background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial;font-size:12pt;font-family:"Times New Roman",serif"><b><span style="font-size:9pt;color:rgb(112,48,160);background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial">Er. Habib Khan, </span></b><b><span style="font-size:9pt;color:black;background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial">Gachon University, Seoul, South Korea</span></b><b><span style="font-size:9pt;color:rgb(112,48,160);background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial">, </span></b><span style="font-size:8pt;color:black;background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial"><a href="mailto:habibkhan@gachon.ac.kr" target="_blank">habibkhan@gachon.ac.kr</a></span><b><span style="font-size:9pt;color:rgb(112,48,160);background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial"></span></b></p><p class="MsoNormal" align="left" style="margin:0cm;background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial;font-size:12pt;font-family:"Times New Roman",serif"><b><span style="font-size:9pt;color:black;background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial"> </span></b></p><h1 style="margin:0cm;text-align:justify;font-size:10pt;font-family:"Times New Roman",serif">Key<span style="letter-spacing:-0.4pt"> </span>Dates<span style="letter-spacing:-0.05pt"></span></h1><p style="margin:0cm 279.55pt 0.0001pt 0cm;font-size:10pt;font-family:"Times New Roman",serif"><span style="letter-spacing:-0.05pt">Abstract Submission Deadline: <b>June 25, 2024</b><br>Full paper submission: June 30, 2024<br>Notification of Paper Acceptance: July 31, 2024<br>Final Paper Submission: August 15, 2024<br>Conference: September 04-06, 2024</span></p></div>