IEEE ICM 2020 - Virtual
IEEE 32nd International Conference on Microelectronics (IEEE ICM 2020)
The International Conference on Microelectronics has already been held numerous times in different countries across the MiddleEast, Southern Europe, and Asia for the past 31 years. The 32nd edition of the conference will take place in Aqaba-Jordan. Jordan is home to one of the world's 7 wonders; Petra. Aqaba is a coastal harbor which serves as a launch point for visitors to Petra and Wadi Rum. The 2020 version of ICM will foster oral and poster sessions, industrial panel discussions, and tutorials given by experts on state-of-the-art topics. The regular technical program will run for three days. In addition, tutorial sessions will be held on the first day of the conference. Papers are solicited in, but not limited to, the following topics
- RFID, RFIC and antenna
- Virtual reality
- IoT Circuits and security
- Testing,reliability,and verification
- Neuromorphic Computing
- Biomedical circuits and systems
- Memristor circuits and systems
- AI and Neural Networks circuits
- Reconfigurable systems
- Hardware Software Co-design
- CAD tools
- NoC, SoC, SiP, and Packaging
- MEMS and NEMS
- Optical Circuits and systems
- Design for testability
- Emerging technology
- Device and Circuit modelling
- Analog circuit design
- Digital signal processing
- Low power circuits and systems
- Power management
- Nonlinear circuits
- VLSI systems and applications
Cyber-physical Systems Security track
It is comprehensive and covers a broad spectrum of topics. The topics of interest include, but limited to:
- Physical attacks including side-channel and fault attacks
- Trusted platform modules (TPM)
- Automative security
- Digital forensics and crime science
- Security of reconfigurable and adaptive hardware
- Cryptography and cryptanalysis
- Efficient implementations for HW security
- Reverse engineering
- Security Analysis of cyber-physical systems
- Industrial systems security
- Computer network security
- Biometric security
- Intellectual property protection and content protection
- Security of wireless sensor networks
- Machine learning applications in cybersecurity
- Cloud and big data security