posted by user: grupocole || 76 views || tracked by 1 users: [display]

NLPAICS 2026 : ๐—ฆ๐—ฒ๐—ฐ๐—ผ๐—ป๐—ฑ ๐—œ๐—ป๐˜๐—ฒ๐—ฟ๐—ป๐—ฎ๐˜๐—ถ๐—ผ๐—ป๐—ฎ๐—น ๐—–๐—ผ๐—ป๐—ณ๐—ฒ๐—ฟ๐—ฒ๐—ป๐—ฐ๐—ฒ ๐—ผ๐—ป ๐—ก๐—ฎ๐˜๐˜‚๐—ฟ๐—ฎ๐—น ๐—Ÿ๐—ฎ๐—ป๐—ด๐˜‚๐—ฎ๐—ด๐—ฒ ๐—ฃ๐—ฟ๐

FacebookTwitterLinkedInGoogle

Link: https://nlpaics2026.gplsi.es/
 
When Jun 11, 2026 - Jun 12, 2026
Where Alicante, Spain
Submission Deadline Mar 16, 2026
Notification Due May 5, 2026
Final Version Due May 19, 2026
Categories    NLP   artificial intelligence   computational linguistics   cybersecurity
 

Call For Papers


๐—ฆ๐—ฒ๐—ฐ๐—ผ๐—ป๐—ฑ ๐—œ๐—ป๐˜๐—ฒ๐—ฟ๐—ป๐—ฎ๐˜๐—ถ๐—ผ๐—ป๐—ฎ๐—น ๐—–๐—ผ๐—ป๐—ณ๐—ฒ๐—ฟ๐—ฒ๐—ป๐—ฐ๐—ฒ ๐—ผ๐—ป ๐—ก๐—ฎ๐˜๐˜‚๐—ฟ๐—ฎ๐—น ๐—Ÿ๐—ฎ๐—ป๐—ด๐˜‚๐—ฎ๐—ด๐—ฒ ๐—ฃ๐—ฟ๐—ผ๐—ฐ๐—ฒ๐˜€๐˜€๐—ถ๐—ป๐—ด ๐—ฎ๐—ป๐—ฑ ๐—”๐—ฟ๐˜๐—ถ๐—ณ๐—ถ๐—ฐ๐—ถ๐—ฎ๐—น ๐—œ๐—ป๐˜๐—ฒ๐—น๐—น๐—ถ๐—ด๐—ฒ๐—ป๐—ฐ๐—ฒ ๐—ณ๐—ผ๐—ฟ ๐—–๐˜†๐—ฏ๐—ฒ๐—ฟ ๐—ฆ๐—ฒ๐—ฐ๐˜‚๐—ฟ๐—ถ๐˜๐˜† (๐—ก๐—Ÿ๐—ฃ๐—”๐—œ๐—–๐—ฆโ€™๐Ÿฎ๐Ÿฌ๐Ÿฎ๐Ÿฒ)

University of Alicante, Alicante, Spain

11 and 12 June 2026

https://nlpaics2026.gplsi.es/

๐—™๐—ถ๐—ฟ๐˜€๐˜ ๐—–๐—ฎ๐—น๐—น ๐—ณ๐—ผ๐—ฟ ๐—ฃ๐—ฎ๐—ฝ๐—ฒ๐—ฟ๐˜€

Recent advances in Natural Language Processing (NLP), Deep Learning and Large Language Models (LLMs) have resulted in improved performance of applications. In particular, there has been a growing interest in employing AI methods in different Cyber Security applications.

In today's digital world, Cyber Security has emerged as a heightened priority for both individual users and organisations. As the volume of online information grows exponentially, traditional security approaches often struggle to identify and prevent evolving security threats. The inadequacy of conventional security frameworks highlights the need for innovative solutions that can effectively navigate the complex digital landscape for ensuring robust security. NLP and AI in Cyber Security have vast potential to significantly enhance threat detection and mitigation by fostering the development of advanced security systems for autonomous identification, assessment, and response to security threats in real-time. Recognising this challenge and the capabilities of NLP and AI approaches to fortify Cyber Security systems, the Second International Conference on Natural Language Processing (NLP) and Artificial Intelligence (AI) for Cyber Security (NLPAICSโ€™2026) continues the tradition from NLPAICSโ€™2024 to be a gathering place for researchers in NLP and AI methods for Cyber Security. We invite contributions that present the latest NLP and AI solutions for mitigating risks in processing digital information.

๐—–๐—ผ๐—ป๐—ณ๐—ฒ๐—ฟ๐—ฒ๐—ป๐—ฐ๐—ฒ ๐˜๐—ผ๐—ฝ๐—ถ๐—ฐ๐˜€

The conference invites submissions on a broad range of topics related to the employment of NLP and AI (and in general, language studies and models) for Cyber Security including but not limited to:

- ๐˜š๐˜ฐ๐˜ค๐˜ช๐˜ฆ๐˜ต๐˜ข๐˜ญ ๐˜ข๐˜ฏ๐˜ฅ ๐˜๐˜ถ๐˜ฎ๐˜ข๐˜ฏ ๐˜š๐˜ฆ๐˜ค๐˜ถ๐˜ณ๐˜ช๐˜ต๐˜บ ๐˜ข๐˜ฏ๐˜ฅ ๐˜š๐˜ข๐˜ง๐˜ฆ๐˜ต๐˜บ
- Content Legitimacy and Quality
- Detection and mitigation of hate speech and offensive language
- Fake news, deepfakes, misinformation and disinformation
- Detection of machine generated language in multimodal context (text, speech and gesture)
- Trust and credibility of online information
- User Security and Safety
- Cyberbullying and identification of internet offenders
- Monitoring extremist fora
- Suicide prevention
- Clickbait and scam detection
- Fake profile detection in online social networks
- Technical Measures and Solutions
- Social engineering identification, phishing detection
- NLP for risk assessment
- Controlled languages for safe messages
- Prevention of malicious use of ai models
- Forensic linguistics
- Human Factors in Cyber Security

- ๐˜š๐˜ฑ๐˜ฆ๐˜ฆ๐˜ค๐˜ฉ ๐˜›๐˜ฆ๐˜ค๐˜ฉ๐˜ฏ๐˜ฐ๐˜ญ๐˜ฐ๐˜จ๐˜บ ๐˜ข๐˜ฏ๐˜ฅ ๐˜”๐˜ถ๐˜ญ๐˜ต๐˜ช๐˜ฎ๐˜ฐ๐˜ฅ๐˜ข๐˜ญ ๐˜๐˜ฏ๐˜ท๐˜ฆ๐˜ด๐˜ต๐˜ช๐˜จ๐˜ข๐˜ต๐˜ช๐˜ฐ๐˜ฏ๐˜ด ๐˜ง๐˜ฐ๐˜ณ ๐˜Š๐˜บ๐˜ฃ๐˜ฆ๐˜ณ ๐˜š๐˜ฆ๐˜ค๐˜ถ๐˜ณ๐˜ช๐˜ต๐˜บ
- Voice-based security: Analysis of voice recordings or transcripts for security threats
- Detection of machine generated language in multimodal context (text, speech and gesture)
- NLP and biometrics in multimodal context

- ๐˜‹๐˜ข๐˜ต๐˜ข ๐˜ข๐˜ฏ๐˜ฅ ๐˜š๐˜ฐ๐˜ง๐˜ต๐˜ธ๐˜ข๐˜ณ๐˜ฆ ๐˜š๐˜ฆ๐˜ค๐˜ถ๐˜ณ๐˜ช๐˜ต๐˜บ
- Cryptography
- Digital forensics
- Malware detection, obfuscation
- Models for documentation
- NLP for data privacy and leakage prevention (DLP)
- Addressing dataset โ€œpoisoningโ€ attacks

- ๐˜๐˜ถ๐˜ฎ๐˜ข๐˜ฏ-๐˜Š๐˜ฆ๐˜ฏ๐˜ต๐˜ณ๐˜ช๐˜ค ๐˜š๐˜ฆ๐˜ค๐˜ถ๐˜ณ๐˜ช๐˜ต๐˜บ ๐˜ข๐˜ฏ๐˜ฅ ๐˜š๐˜ถ๐˜ฑ๐˜ฑ๐˜ฐ๐˜ณ๐˜ต
- Natural language understanding for chatbots: NLP-powered chatbots for user support and security incident reporting
- User behaviour analysis: analysing user-generated text data (e.g., chat logs and emails) to detect insider threats or unusual behaviour
- Human supervision of technology for Cyber Security

- ๐˜ˆ๐˜ฏ๐˜ฐ๐˜ฎ๐˜ข๐˜ญ๐˜บ ๐˜‹๐˜ฆ๐˜ต๐˜ฆ๐˜ค๐˜ต๐˜ช๐˜ฐ๐˜ฏ ๐˜ข๐˜ฏ๐˜ฅ ๐˜›๐˜ฉ๐˜ณ๐˜ฆ๐˜ข๐˜ต ๐˜๐˜ฏ๐˜ต๐˜ฆ๐˜ญ๐˜ญ๐˜ช๐˜จ๐˜ฆ๐˜ฏ๐˜ค๐˜ฆ
- Text-Based Anomaly Detection
- Identification of unusual or suspicious patterns in logs, incident reports or other textual data
- Detecting deviations from normal behaviour in system logs or network traffic
- Threat Intelligence Analysis
- Processing and analysing threat intelligence reports, news, articles and blogs on latest Cyber Security threats
- Extracting key information and indicators of compromise (IoCs) from unstructured text

- ๐˜š๐˜บ๐˜ด๐˜ต๐˜ฆ๐˜ฎ๐˜ด ๐˜ข๐˜ฏ๐˜ฅ ๐˜๐˜ฏ๐˜ง๐˜ณ๐˜ข๐˜ด๐˜ต๐˜ณ๐˜ถ๐˜ค๐˜ต๐˜ถ๐˜ณ๐˜ฆ ๐˜š๐˜ฆ๐˜ค๐˜ถ๐˜ณ๐˜ช๐˜ต๐˜บ
- Systems Security
- Anti-reverse engineering for protecting privacy and anonymity
- Identification and mitigation of side-channel attacks
- Authentication and access control
- Enterprise-level mitigation
- NLP for software vulnerability detection
- Malware Detection through Code Analysis
- Analysing code and scripts for malware
- Detection using NLP to identify patterns indicative of malicious code

- ๐˜๐˜ช๐˜ฏ๐˜ข๐˜ฏ๐˜ค๐˜ช๐˜ข๐˜ญ ๐˜Š๐˜บ๐˜ฃ๐˜ฆ๐˜ณ ๐˜š๐˜ฆ๐˜ค๐˜ถ๐˜ณ๐˜ช๐˜ต๐˜บ
- Financial fraud detection
- Financial risk detection
- Algorithmic trading security
- Secure online banking
- Risk management in finance
- Financial text analytics

- ๐˜Œ๐˜ต๐˜ฉ๐˜ช๐˜ค๐˜ด, ๐˜‰๐˜ช๐˜ข๐˜ด, ๐˜ข๐˜ฏ๐˜ฅ ๐˜“๐˜ฆ๐˜จ๐˜ช๐˜ด๐˜ญ๐˜ข๐˜ต๐˜ช๐˜ฐ๐˜ฏ ๐˜ช๐˜ฏ ๐˜Š๐˜บ๐˜ฃ๐˜ฆ๐˜ณ ๐˜š๐˜ฆ๐˜ค๐˜ถ๐˜ณ๐˜ช๐˜ต๐˜บ
- Ethical and Legal Issues
- Digital privacy and identity management
- The ethics of NLP and speech technology
- Explainability of NLP and speech technology tools
- Legislation against malicious use of AI
- Regulatory issues
- Bias and Security
- Bias in Large Language Models (LLMs)
- Bias in security related datasets and annotations

- ๐˜‹๐˜ข๐˜ต๐˜ข๐˜ด๐˜ฆ๐˜ต๐˜ด ๐˜ข๐˜ฏ๐˜ฅ ๐˜™๐˜ฆ๐˜ด๐˜ฐ๐˜ถ๐˜ณ๐˜ค๐˜ฆ๐˜ด ๐˜ง๐˜ฐ๐˜ณ ๐˜Š๐˜บ๐˜ฃ๐˜ฆ๐˜ณ ๐˜š๐˜ฆ๐˜ค๐˜ถ๐˜ณ๐˜ช๐˜ต๐˜บ ๐˜ˆ๐˜ฑ๐˜ฑ๐˜ญ๐˜ช๐˜ค๐˜ข๐˜ต๐˜ช๐˜ฐ๐˜ฏ๐˜ด

- ๐˜š๐˜ฑ๐˜ฆ๐˜ค๐˜ช๐˜ข๐˜ญ๐˜ช๐˜ด๐˜ฆ๐˜ฅ ๐˜š๐˜ฆ๐˜ค๐˜ถ๐˜ณ๐˜ช๐˜ต๐˜บ ๐˜ˆ๐˜ฑ๐˜ฑ๐˜ญ๐˜ช๐˜ค๐˜ข๐˜ต๐˜ช๐˜ฐ๐˜ฏ๐˜ด ๐˜ข๐˜ฏ๐˜ฅ ๐˜–๐˜ฑ๐˜ฆ๐˜ฏ ๐˜›๐˜ฐ๐˜ฑ๐˜ช๐˜คs
- Intelligence applications
- Emerging and innovative applications in Cyber Security


๐˜š๐˜ฑ๐˜ฆ๐˜ค๐˜ช๐˜ข๐˜ญ ๐˜›๐˜ฉ๐˜ฆ๐˜ฎ๐˜ฆ ๐˜›๐˜ณ๐˜ข๐˜ค๐˜ฌ - ๐˜๐˜ถ๐˜ต๐˜ถ๐˜ณ๐˜ฆ ๐˜ฐ๐˜ง ๐˜Š๐˜บ๐˜ฃ๐˜ฆ๐˜ณ ๐˜š๐˜ฆ๐˜ค๐˜ถ๐˜ณ๐˜ช๐˜ต๐˜บ ๐˜ช๐˜ฏ ๐˜ต๐˜ฉ๐˜ฆ ๐˜Œ๐˜ณ๐˜ข ๐˜ฐ๐˜ง ๐˜“๐˜“๐˜”๐˜ด ๐˜ข๐˜ฏ๐˜ฅ ๐˜Ž๐˜ฆ๐˜ฏ๐˜ฆ๐˜ณ๐˜ข๐˜ต๐˜ช๐˜ท๐˜ฆ ๐˜ˆ๐˜

NLPAICS 2026 will feature a special theme track with the goal of stimulating discussion around Large Language Models (LLMs), Generative AI and ensuring their safety. The latest generation of LLMs, such as CHATGPT, Gemini, DeepSeek, LLAMA and open-source alternatives, has showcased remarkable advancements in text and image understanding and generation. However, as we navigate through uncharted territory, it becomes imperative to address the challenges associated with employing these models in everyday tasks, focusing on aspects such as fairness, ethics, and responsibility. The theme track invites studies on how to ensure the safety of LLMs in various tasks and applications and what this means for the future of the field. The possible topics of discussion include (but are not limited to) the following:
โ€ข Detection of LLM-generated language in multimodal context (text, speech and gesture)
โ€ข LLMs for forensic linguistics
โ€ข Bias in LLMs
โ€ข Safety benchmarks for LLMs
โ€ข Legislation against malicious use of LLMs
โ€ข Tools to evaluate safety in LLMs
โ€ข Methods to enhance the robustness of language models


๐—ฆ๐˜‚๐—ฏ๐—บ๐—ถ๐˜€๐˜€๐—ถ๐—ผ๐—ป๐˜€ ๐—ฎ๐—ป๐—ฑ ๐—ฃ๐˜‚๐—ฏ๐—น๐—ถ๐—ฐ๐—ฎ๐˜๐—ถ๐—ผ๐—ป
NLPAICS welcomes high-quality submissions in English, which can take two forms:
โ€ข Regular long papers: These can be up to eight (8) pages long, presenting substantial, original, completed, and unpublished work.
โ€ข Short (poster) papers: These can be up to four (4) pages long and are suitable for describing small, focused contributions, ongoing research, negative results, system demonstrations, etc. Short papers will be presented as part of a poster session.

The conference will not consider and evaluate abstracts only.

Accepted papers, including both long and short papers, will be published as e-proceedings with ISBN will available online on the conference website at the time of the conference and are expected to be uploaded into the ACL Anthology.

Further details on the submission procedure will be made available in the Second Call for Papers due in October 2025.

The conference will feature a student workshop and awards will be offered to the authors of best papers.

๐—œ๐—บ๐—ฝ๐—ผ๐—ฟ๐˜๐—ฎ๐—ป๐˜ ๐—ฑ๐—ฎ๐˜๐—ฒ๐˜€
โ€ข Submissions due: 16 March 2026
โ€ข Reviewing process: 1 April โ€“ 30 April 2026
โ€ข Notification of acceptance: 5 May 2026
โ€ข Camera-ready due: 19 May 2026
โ€ข Conference camera-ready proceedings ready 1 June 2026
โ€ข Conference: 11-12 June 2026


๐—ข๐—ฟ๐—ด๐—ฎ๐—ป๐—ถ๐˜€๐—ฎ๐˜๐—ถ๐—ผ๐—ป
๐™ฒฬฒ๐š˜ฬฒ๐š—ฬฒ๐šฬฒ๐šŽฬฒ๐š›ฬฒ๐šŽฬฒ๐š—ฬฒ๐šŒฬฒ๐šŽฬฒโ€€ฬฒ๐™ฒฬฒ๐š‘ฬฒ๐šŠฬฒ๐š’ฬฒ๐š›ฬฒ๐šœฬฒโ€€ฬฒ
Ruslan Mitkov (University of Alicante)
Rafael Muรฑoz (University of Alicante)


๐™ฟฬฒ๐š›ฬฒ๐š˜ฬฒ๐šฬฒ๐š›ฬฒ๐šŠฬฒ๐š–ฬฒ๐š–ฬฒ๐šŽฬฒโ€€ฬฒ๐™ฒฬฒ๐š˜ฬฒ๐š–ฬฒ๐š–ฬฒ๐š’ฬฒ๐šฬฒ๐šฬฒ๐šŽฬฒ๐šŽฬฒโ€€ฬฒ๐™ฒฬฒ๐š‘ฬฒ๐šŠฬฒ๐š’ฬฒ๐š›ฬฒ๐šœฬฒ
Elena Lloret (University of Alicante)
Tharindu Ranasinghe (Lancaster University)

๐™ฟฬฒ๐šžฬฒ๐š‹ฬฒ๐š•ฬฒ๐š’ฬฒ๐šŒฬฒ๐šŠฬฒ๐šฬฒ๐š’ฬฒ๐š˜ฬฒ๐š—ฬฒโ€€ฬฒ๐™ฒฬฒ๐š‘ฬฒ๐šŠฬฒ๐š’ฬฒ๐š›ฬฒ
Ernesto Estevanell (University of Alicante)

๐š‚ฬฒ๐š™ฬฒ๐š˜ฬฒ๐š—ฬฒ๐šœฬฒ๐š˜ฬฒ๐š›ฬฒ๐šœฬฒ๐š‘ฬฒ๐š’ฬฒ๐š™ฬฒโ€€ฬฒ๐™ฒฬฒ๐š‘ฬฒ๐šŠฬฒ๐š’ฬฒ๐š›ฬฒ
Andres Montoyo (University of Alicante)

๐š‚ฬฒ๐šฬฒ๐šžฬฒ๐šฬฒ๐šŽฬฒ๐š—ฬฒ๐šฬฒโ€€ฬฒ๐š†ฬฒ๐š˜ฬฒ๐š›ฬฒ๐š”ฬฒ๐šœฬฒ๐š‘ฬฒ๐š˜ฬฒ๐š™ฬฒโ€€ฬฒ๐™ฒฬฒ๐š‘ฬฒ๐šŠฬฒ๐š’ฬฒ๐š›ฬฒ
Salima Lamsiyah (University of Luxembourg)

๐™ฑฬฒ๐šŽฬฒ๐šœฬฒ๐šฬฒโ€€ฬฒ๐™ฟฬฒ๐šŠฬฒ๐š™ฬฒ๐šŽฬฒ๐š›ฬฒโ€€ฬฒ๐™ฐฬฒ๐š ฬฒ๐šŠฬฒ๐š›ฬฒ๐šฬฒโ€€ฬฒ๐™ฒฬฒ๐š‘ฬฒ๐šŠฬฒ๐š’ฬฒ๐š›ฬฒ
Saad Ezzini (King Fahd University of Petroleum & Minerals)

๐™ฟฬฒ๐šžฬฒ๐š‹ฬฒ๐š•ฬฒ๐š’ฬฒ๐šŒฬฒ๐š’ฬฒ๐šฬฒ๐šขฬฒโ€€ฬฒ๐™ฒฬฒ๐š‘ฬฒ๐šŠฬฒ๐š’ฬฒ๐š›ฬฒ
Beatriz Botella (University of Alicante)

๐š‚ฬฒ๐š˜ฬฒ๐šŒฬฒ๐š’ฬฒ๐šŠฬฒ๐š•ฬฒโ€€ฬฒ๐™ฟฬฒ๐š›ฬฒ๐š˜ฬฒ๐šฬฒ๐š›ฬฒ๐šŠฬฒ๐š–ฬฒ๐š–ฬฒ๐šŽฬฒโ€€ฬฒ๐™ฒฬฒ๐š‘ฬฒ๐šŠฬฒ๐š’ฬฒ๐š›ฬฒ
Alba Bonet (University of Alicante)

๐—ฉ๐—ฒ๐—ป๐˜‚๐—ฒ
The Second International Conference on Natural Language Processing and Artificial Intelligence for Cyber Security (NLPAICSโ€™2026) will take place at the University of Alicante and is organised by the University of Alicante GPLSI research group.

Further information and contact details

The follow-up calls will list keynote speakers and members of the programme committee once confirmed.

The conference website is https://nlpaics2026.gplsi.es/ and will be updated on a regular basis. For further information, please email nlpaics2026@dlsi.ua.es

Registration will open in February 2026.


Related Resources

IEEE-ACAI 2025   2025 IEEE 8th International Conference on Algorithms, Computing and Artificial Intelligence (ACAI 2025)
JNLP-LMLRL 2026   LNLP - ๐—ฆ๐—ฝ๐—ฒ๐—ฐ๐—ถ๐—ฎ๐—น ๐—œ๐˜€๐˜€๐˜‚๐—ฒ ๐—ผ๐—ป ๐—Ÿ๐—ฎ๐—ป๐—ด๐˜‚๐—ฎ๐—ด๐—ฒ ๐— ๐—ผ๐—ฑ๐—ฒ๐—น๐˜€ ๐—ณ๐—ผ๐—ฟ ๐—Ÿ๐—ผ๐˜„-๐—ฅ๐—ฒ๐˜€๐—ผ๐˜‚๐—ฟ๐—ฐ๐—ฒ ๐—Ÿ๐—ฎ๐—ป๐—ด
Ei/Scopus-SGGEA 2025   2025 2nd Asia Conference on Smart Grid, Green Energy and Applications (SGGEA 2025)
AMLDS 2026   IEEE--2026 2nd International Conference on Advanced Machine Learning and Data Science
DEPLING 2023   International Conference on Dependency Linguistics
Ei/Scopus-CEICE 2026   2026 3rd International Conference on Electrical, Information and Communication Engineering (CEICE 2026)
DRIJ 2025   Dental Research: An International Journal
SOFEA 2025   11th International Conference on Software Engineering and Applications
AIAT 2025   2025 5th International Conference on Artificial Intelligence and Application Technologies (AIAT 2025)
Ei/Scopus-MLBDM 2025   2025 5th International Conference on Machine Learning and Big Data Management (MLBDM 2025)