top of page

CALL FOR POSTER SUBMISSION Deadline: February 26 at 11:59 PM

Reminder: All poster presenters must complete event registration in order to submit and present their poster.

Once your poster is accepted, you are required to print it and submit a physical copy to the Computer Science front desk (Attn: Trey Castillo) by 5:00 PM on Friday, February 27.

Examples of The Research Topics: 

AI Ethics, Governance & Society

  • Ethical Decision-Making in Autonomous Systems

  • Bias, Fairness, and Transparency in AI Models

  • AI Governance, Regulation, and Global Policy

  • The Future of Work: How AI Will Transform Jobs

  • Digital Identity, Privacy, and AI Security

​

Advanced AI & Core Technologies

  • Multimodal AI Systems (Vision + Language + Action)

  • Reinforcement Learning Advancements for Real-World Tasks

  • Explainable AI (XAI): Making Models Interpretable

  • Neuro-symbolic AI: Hybrid Reasoning Models

  • AI for Low-Resource Languages & Cultures

​

AI in Healthcare & Biotech

  • AI-Assisted Medical Diagnosis

  • Personalized Medicine Driven by AI

  • Predictive Models for Disease Outbreaks

  • AI in Drug Discovery and Protein Folding

  • Healthcare Robotics (Surgical Robots, Assistive Robotics)

​

Robotics, Autonomous Systems & Embodied AI

  • Human-Robot Collaboration & Safety

  • Swarm Intelligence and Collective Robotics

  • Next-Generation Autonomous Vehicles (Cars, Drones, Delivery Bots)

  • Embodied AI for Real-World Learning

  • AI-Driven Smart Manufacturing

​

AI for Sustainability & Climate

  • Climate Modeling with AI

  • Smart Energy Systems and Grid Optimization

  • AI for Wildlife Conservation

  • Sustainable Agriculture & Precision Farming

  • AI-Enabled Natural Disaster Prediction

​

AI in Education & Learning Technologies

  • Intelligent Tutoring Systems

  • AI-Powered Learning Analytics

  • Adaptive Learning Technologies

  • Gamified Learning with AI-Generated Challenges

  • Automating Assessment & Feedback with AI

​

AI Security & Robustness

  • Adversarial Attacks and Defense Techniques

  • Secure Model Deployment & Monitoring

  • Deepfake Detection and Media Forensics

  • AI for Cyber Threat Prediction

  • Safety in Large-Scale Model Deployment

bottom of page