Autor Sun, Xingming
|
|
Documentos disponibles escritos por este autor (22)
Hacer una sugerencia Refinar búsqueda4th International Conference, ICCCS 2018, Haikou, China, June 8–10, 2018, Revised Selected Papers, Part III / Sun, Xingming ; Pan, Zhaoqing ; Bertino, Elisa
![]()
Título : 4th International Conference, ICCCS 2018, Haikou, China, June 8–10, 2018, Revised Selected Papers, Part III Tipo de documento: documento electrónico Autores: Sun, Xingming, ; Pan, Zhaoqing, ; Bertino, Elisa, Mención de edición: 1 ed. Editorial: [s.l.] : Springer Fecha de publicación: 2018 Número de páginas: XVIII, 723 p. 228 ilustraciones ISBN/ISSN/DL: 978-3-030-00012-7 Nota general: Libro disponible en la plataforma SpringerLink. Descarga y lectura en formatos PDF, HTML y ePub. Descarga completa o por capítulos. Palabras clave: Software de la aplicacion Protección de datos Estructuras de datos (Informática) Teoría de la información Red de computadoras Aplicaciones informáticas y de sistemas de información Seguridad de datos e información Estructuras de datos y teoría de la información Redes de comunicación informática Índice Dewey: 005.3 Ciencia de los computadores (Programas) Resumen: Este conjunto de seis volúmenes LNCS 11063 – 11068 constituye las actas de la 4.ª Conferencia Internacional sobre Seguridad y Computación en la Nube, ICCCS 2018, celebrada en Haikou, China, en junio de 2018. Los 386 artículos completos de estos seis volúmenes fueron cuidadosamente revisados y seleccionado entre 1743 presentaciones. Los artículos cubren ideas y logros en la teoría y la práctica de todas las áreas de los sistemas inventivos, que incluyen control, inteligencia artificial, sistemas de automatización, sistemas informáticos, sistemas eléctricos e informativos. Los seis volúmenes están organizados según las áreas temáticas de la siguiente manera: computación en la nube, seguridad en la nube, cifrado, ocultación de información, seguridad de IoT y análisis forense multimedia. Nota de contenido: Cloud Computing -- Encryption -- Information Hiding -- Cloud Security -- IoT Security. En línea: https://link-springer-com.biblioproxy.umanizales.edu.co/referencework/10.1007/97 [...] Link: https://biblioteca.umanizales.edu.co/ils/opac_css/index.php?lvl=notice_display&i 4th International Conference, ICCCS 2018, Haikou, China, June 8–10, 2018, Revised Selected Papers, Part III [documento electrónico] / Sun, Xingming, ; Pan, Zhaoqing, ; Bertino, Elisa, . - 1 ed. . - [s.l.] : Springer, 2018 . - XVIII, 723 p. 228 ilustraciones.
ISBN : 978-3-030-00012-7
Libro disponible en la plataforma SpringerLink. Descarga y lectura en formatos PDF, HTML y ePub. Descarga completa o por capítulos.
Palabras clave: Software de la aplicacion Protección de datos Estructuras de datos (Informática) Teoría de la información Red de computadoras Aplicaciones informáticas y de sistemas de información Seguridad de datos e información Estructuras de datos y teoría de la información Redes de comunicación informática Índice Dewey: 005.3 Ciencia de los computadores (Programas) Resumen: Este conjunto de seis volúmenes LNCS 11063 – 11068 constituye las actas de la 4.ª Conferencia Internacional sobre Seguridad y Computación en la Nube, ICCCS 2018, celebrada en Haikou, China, en junio de 2018. Los 386 artículos completos de estos seis volúmenes fueron cuidadosamente revisados y seleccionado entre 1743 presentaciones. Los artículos cubren ideas y logros en la teoría y la práctica de todas las áreas de los sistemas inventivos, que incluyen control, inteligencia artificial, sistemas de automatización, sistemas informáticos, sistemas eléctricos e informativos. Los seis volúmenes están organizados según las áreas temáticas de la siguiente manera: computación en la nube, seguridad en la nube, cifrado, ocultación de información, seguridad de IoT y análisis forense multimedia. Nota de contenido: Cloud Computing -- Encryption -- Information Hiding -- Cloud Security -- IoT Security. En línea: https://link-springer-com.biblioproxy.umanizales.edu.co/referencework/10.1007/97 [...] Link: https://biblioteca.umanizales.edu.co/ils/opac_css/index.php?lvl=notice_display&i 4th International Conference, ICCCS 2018, Haikou, China, June 8–10, 2018, Revised Selected Papers, Part IV / Sun, Xingming ; Pan, Zhaoqing ; Bertino, Elisa
![]()
Título : 4th International Conference, ICCCS 2018, Haikou, China, June 8–10, 2018, Revised Selected Papers, Part IV Tipo de documento: documento electrónico Autores: Sun, Xingming, ; Pan, Zhaoqing, ; Bertino, Elisa, Mención de edición: 1 ed. Editorial: [s.l.] : Springer Fecha de publicación: 2018 Número de páginas: XVII, 721 p. 315 ilustraciones ISBN/ISSN/DL: 978-3-030-00015-8 Nota general: Libro disponible en la plataforma SpringerLink. Descarga y lectura en formatos PDF, HTML y ePub. Descarga completa o por capítulos. Palabras clave: Software de la aplicacion Protección de datos Criptografía Cifrado de datos (Informática) Teoría de la codificación Teoría de la información Procesamiento de imágenes Visión por computador Aplicaciones informáticas y de sistemas de información Seguridad de datos e información Criptología Teoría de la codificación y la información Imágenes por computadora visión reconocimiento de patrones y gráficos Índice Dewey: 005.3 Ciencia de los computadores (Programas) Resumen: Este conjunto de seis volúmenes LNCS 11063 – 11068 constituye las actas de la 4.ª Conferencia Internacional sobre Seguridad y Computación en la Nube, ICCCS 2018, celebrada en Haikou, China, en junio de 2018. Los 386 artículos completos de estos seis volúmenes fueron cuidadosamente revisados y seleccionado entre 1743 presentaciones. Los artículos cubren ideas y logros en la teoría y la práctica de todas las áreas de los sistemas inventivos, que incluyen control, inteligencia artificial, sistemas de automatización, sistemas informáticos, sistemas eléctricos e informativos. Los seis volúmenes están organizados según las áreas temáticas de la siguiente manera: computación en la nube, seguridad en la nube, cifrado, ocultación de información, seguridad de IoT y análisis forense multimedia. Nota de contenido: Cloud Computing -- Encryption -- Information Hiding -- Cloud Security -- IoT Security. En línea: https://link-springer-com.biblioproxy.umanizales.edu.co/referencework/10.1007/97 [...] Link: https://biblioteca.umanizales.edu.co/ils/opac_css/index.php?lvl=notice_display&i 4th International Conference, ICCCS 2018, Haikou, China, June 8–10, 2018, Revised Selected Papers, Part IV [documento electrónico] / Sun, Xingming, ; Pan, Zhaoqing, ; Bertino, Elisa, . - 1 ed. . - [s.l.] : Springer, 2018 . - XVII, 721 p. 315 ilustraciones.
ISBN : 978-3-030-00015-8
Libro disponible en la plataforma SpringerLink. Descarga y lectura en formatos PDF, HTML y ePub. Descarga completa o por capítulos.
Palabras clave: Software de la aplicacion Protección de datos Criptografía Cifrado de datos (Informática) Teoría de la codificación Teoría de la información Procesamiento de imágenes Visión por computador Aplicaciones informáticas y de sistemas de información Seguridad de datos e información Criptología Teoría de la codificación y la información Imágenes por computadora visión reconocimiento de patrones y gráficos Índice Dewey: 005.3 Ciencia de los computadores (Programas) Resumen: Este conjunto de seis volúmenes LNCS 11063 – 11068 constituye las actas de la 4.ª Conferencia Internacional sobre Seguridad y Computación en la Nube, ICCCS 2018, celebrada en Haikou, China, en junio de 2018. Los 386 artículos completos de estos seis volúmenes fueron cuidadosamente revisados y seleccionado entre 1743 presentaciones. Los artículos cubren ideas y logros en la teoría y la práctica de todas las áreas de los sistemas inventivos, que incluyen control, inteligencia artificial, sistemas de automatización, sistemas informáticos, sistemas eléctricos e informativos. Los seis volúmenes están organizados según las áreas temáticas de la siguiente manera: computación en la nube, seguridad en la nube, cifrado, ocultación de información, seguridad de IoT y análisis forense multimedia. Nota de contenido: Cloud Computing -- Encryption -- Information Hiding -- Cloud Security -- IoT Security. En línea: https://link-springer-com.biblioproxy.umanizales.edu.co/referencework/10.1007/97 [...] Link: https://biblioteca.umanizales.edu.co/ils/opac_css/index.php?lvl=notice_display&i 5th International Conference, ICAIS 2019, New York, NY, USA, July 26–28, 2019, Proceedings, Part III / Sun, Xingming ; Pan, Zhaoqing ; Bertino, Elisa
![]()
Título : 5th International Conference, ICAIS 2019, New York, NY, USA, July 26–28, 2019, Proceedings, Part III Tipo de documento: documento electrónico Autores: Sun, Xingming, ; Pan, Zhaoqing, ; Bertino, Elisa, Mención de edición: 1 ed. Editorial: [s.l.] : Springer Fecha de publicación: 2019 Número de páginas: XVII, 661 p. 293 ilustraciones, 169 ilustraciones en color. ISBN/ISSN/DL: 978-3-030-24271-8 Nota general: Libro disponible en la plataforma SpringerLink. Descarga y lectura en formatos PDF, HTML y ePub. Descarga completa o por capítulos. Palabras clave: Protección de datos Criptografía Cifrado de datos (Informática) Software de la aplicacion Red de computadoras Inteligencia artificial Visión por computador Seguridad de datos e información Criptología Aplicaciones informáticas y de sistemas de información Redes de comunicación informática Índice Dewey: 005.8 Ciencia de los computadores (Programación, programas de sistemas) Resumen: El conjunto de 4 volúmenes LNCS 11632 hasta LNCS 11635 constituye las actas arbitradas de la Quinta Conferencia Internacional sobre Inteligencia Artificial y Seguridad, ICAIS 2019, que se celebró en Nueva York, EE. UU., en julio de 2019. La conferencia se llamaba anteriormente "Conferencia Internacional sobre Computación y Seguridad en la Nube” con las siglas ICCCS. El total de 230 artículos completos presentados en estas actas de 4 volúmenes fue cuidadosamente revisado y seleccionado entre 1529 presentaciones. Los artículos se organizaron en secciones temáticas de la siguiente manera: Parte I: computación en la nube; Parte II: inteligencia artificial; grandes datos; y computación y seguridad en la nube; Parte III: computación en la nube y seguridad; ocultación de información; seguridad de la IoT; análisis forense multimedia; y cifrado y ciberseguridad; Parte IV: cifrado y ciberseguridad. Nota de contenido: Cloud Computing and Security -- Evaluation and Testing of PCI Express 8-Gbps Re-timer in Storage Server -- Virtualization of 5G Cellular Networks: A Combinatorial Share-averse Auction Approach -- Equipment Fault Detection Based on SENCForest -- Research on Telemedical Monitoring System Based on Homomorphic Encryption -- Phase Retrieval via Accelerated Gradient Descent -- Anti-Noise Quantum Network Coding Protocol Based on Bell States and Butterfly Network Model -- A Privacy-preserving Multi-keyword Ranked Search over Encrypted Data in Hybrid Clouds -- Application of Blockchain Technology in Agricultural Product Traceability System -- Anonymous Authentication Scheme for Machine-To-Machine Communication Based on Elliptic Curve -- Linear Complexity of R-Ary Sequences Derived from Euler Quotients Modulo 2p -- Information Hiding -- An Improved Steganalysis Method Using Feature Combinations -- Research on Application of OFD Technology in Secure Electronic Bills -- A Generative Method for Image Steganography Based on Semantics -- Review on Text Watermarking Resistant to Print-scan, Screen-shooting -- A Novel Reversible Data Hiding Scheme for Encrypted VQ-Compressed Image -- IoT Security -- An Landmark Evaluation Alogrithm Based on Router Identification and Delay Measurement -- Multiplicative Linear Secret Sharing without Interaction -- Positioning Improvement Algorithm Based on LoRa Wireless Networks -- Time-aware and Energy Efficient Data Collection Mechanism for Duty-Cycled Wireless Sensor Networks -- An Implementation of CoAP-Based Semantic Resource Directory in Californium -- A Survey of Simulators for Home Energy Management: System Architecture, Intelligence, UI and Efficiency -- Relay Location Optimization and Relay Coordination in Multi-hop Cognitive Radio Networks -- Subspace Extension Algorithm for Joint DOA and DOD Estimation in Bistatic MIMO Radar -- Under-Determined Blind Source Separation Anti-Collision Algorithm for Rfid Based on Adaptive Tree Grouping -- Design of a Peristaltic Pump Driven by Pneumatic Artificial Muscles -- An Approach to Deep Learning Service Provision with Elastic Remote Interfaces -- Design of an IoT-based Efficient Security Scheme in Home Wireless System -- Discussion on the Application of Industrial Internet -- Performance Analysis of a NB-IoT based Smart Lamp Solution with Application Enabled Platform -- Mining Hypernym-Hyponym Relations from Social Tags via Tag Embedding -- Accurate and Fast DV-hop Localization Algorithm in Irregular Networks -- Shape Recognition with Recurrent Neural Network -- WSN Multi-hop Routing Algorithm Based on Path Quality Comparison in New Energy Consumption Distance Node Relation Model -- Tobacco Intelligent Management System Based on Internet of Things -- Research on Fault Self Diagnosis Technology of Agricultural Internet of Things Information Collection System -- Analysis of Antenna Array Parameter Effect for Massive MIMO Transmission -- Intelligent Irrigation System of Balcony Flowers Based on Internet of Things -- Multimedia Forensics -- The Impact of Using Facebook on the Academic Performance of University Students -- Robust Audio Watermarking Algorithm Based on Moving Average and DCT -- Computer Evidence Analysis Technology Based on Weighted Frequent Pattern Growth Algorithm -- Reversible Data Hiding in JPEG Images Based on Multiple Histograms Modification -- Image Hashing based on CS-LBP and DCT for Copy Detection -- KMSVM: A Efficient Min-Max Modular Support Vector Machine Based on Clustering -- An Image Forensic Method for AI Inpainting Using Faster R-CNN -- Kernel Generalized Canonical Correlation and A New Feature Fusion Strategy -- Multiple Obstacle Detection for Assistance Driver System Using Deep Neural Networks -- Encryption and Cybersecurity -- CABAC: A Content-Driven Attribute-Based Access Control Model for Big Data -- Calculation of Network Security Index Based on Convolution Neural Networks -- A Method to Defense APT based on Dynamic ID Transformation -- Emergency analysis Based on Affective Computing in Universities Forum -- Network Attack and Defense Effectiveness Evaluation Based on Dematel Method -- Web Application-layer DDoS Attack Detection Based on generalized Jaccard Similarity and Information Entropy -- Ultra-broad Bandpass Filter Based on Composite Right-Left Handed Transmission Line Model -- An Automatic Identification Algorithm for Encrypted Anti-counterfeiting Tag Based on DWT-DCT and Chen's Chaos -- Security Analysis and Improvement of Elliptic Curve Digital Signature Scheme -- Risk Taking Behavior in Crowdsourcing Adoption: The Case of Witkey -- Anomaly detection in Wireless Sensor Networks based on KNN -- Comparison of The Legal Principle Foundation of Chinese And American Secret Information Access Control Technique. En línea: https://link-springer-com.biblioproxy.umanizales.edu.co/referencework/10.1007/97 [...] Link: https://biblioteca.umanizales.edu.co/ils/opac_css/index.php?lvl=notice_display&i 5th International Conference, ICAIS 2019, New York, NY, USA, July 26–28, 2019, Proceedings, Part III [documento electrónico] / Sun, Xingming, ; Pan, Zhaoqing, ; Bertino, Elisa, . - 1 ed. . - [s.l.] : Springer, 2019 . - XVII, 661 p. 293 ilustraciones, 169 ilustraciones en color.
ISBN : 978-3-030-24271-8
Libro disponible en la plataforma SpringerLink. Descarga y lectura en formatos PDF, HTML y ePub. Descarga completa o por capítulos.
Palabras clave: Protección de datos Criptografía Cifrado de datos (Informática) Software de la aplicacion Red de computadoras Inteligencia artificial Visión por computador Seguridad de datos e información Criptología Aplicaciones informáticas y de sistemas de información Redes de comunicación informática Índice Dewey: 005.8 Ciencia de los computadores (Programación, programas de sistemas) Resumen: El conjunto de 4 volúmenes LNCS 11632 hasta LNCS 11635 constituye las actas arbitradas de la Quinta Conferencia Internacional sobre Inteligencia Artificial y Seguridad, ICAIS 2019, que se celebró en Nueva York, EE. UU., en julio de 2019. La conferencia se llamaba anteriormente "Conferencia Internacional sobre Computación y Seguridad en la Nube” con las siglas ICCCS. El total de 230 artículos completos presentados en estas actas de 4 volúmenes fue cuidadosamente revisado y seleccionado entre 1529 presentaciones. Los artículos se organizaron en secciones temáticas de la siguiente manera: Parte I: computación en la nube; Parte II: inteligencia artificial; grandes datos; y computación y seguridad en la nube; Parte III: computación en la nube y seguridad; ocultación de información; seguridad de la IoT; análisis forense multimedia; y cifrado y ciberseguridad; Parte IV: cifrado y ciberseguridad. Nota de contenido: Cloud Computing and Security -- Evaluation and Testing of PCI Express 8-Gbps Re-timer in Storage Server -- Virtualization of 5G Cellular Networks: A Combinatorial Share-averse Auction Approach -- Equipment Fault Detection Based on SENCForest -- Research on Telemedical Monitoring System Based on Homomorphic Encryption -- Phase Retrieval via Accelerated Gradient Descent -- Anti-Noise Quantum Network Coding Protocol Based on Bell States and Butterfly Network Model -- A Privacy-preserving Multi-keyword Ranked Search over Encrypted Data in Hybrid Clouds -- Application of Blockchain Technology in Agricultural Product Traceability System -- Anonymous Authentication Scheme for Machine-To-Machine Communication Based on Elliptic Curve -- Linear Complexity of R-Ary Sequences Derived from Euler Quotients Modulo 2p -- Information Hiding -- An Improved Steganalysis Method Using Feature Combinations -- Research on Application of OFD Technology in Secure Electronic Bills -- A Generative Method for Image Steganography Based on Semantics -- Review on Text Watermarking Resistant to Print-scan, Screen-shooting -- A Novel Reversible Data Hiding Scheme for Encrypted VQ-Compressed Image -- IoT Security -- An Landmark Evaluation Alogrithm Based on Router Identification and Delay Measurement -- Multiplicative Linear Secret Sharing without Interaction -- Positioning Improvement Algorithm Based on LoRa Wireless Networks -- Time-aware and Energy Efficient Data Collection Mechanism for Duty-Cycled Wireless Sensor Networks -- An Implementation of CoAP-Based Semantic Resource Directory in Californium -- A Survey of Simulators for Home Energy Management: System Architecture, Intelligence, UI and Efficiency -- Relay Location Optimization and Relay Coordination in Multi-hop Cognitive Radio Networks -- Subspace Extension Algorithm for Joint DOA and DOD Estimation in Bistatic MIMO Radar -- Under-Determined Blind Source Separation Anti-Collision Algorithm for Rfid Based on Adaptive Tree Grouping -- Design of a Peristaltic Pump Driven by Pneumatic Artificial Muscles -- An Approach to Deep Learning Service Provision with Elastic Remote Interfaces -- Design of an IoT-based Efficient Security Scheme in Home Wireless System -- Discussion on the Application of Industrial Internet -- Performance Analysis of a NB-IoT based Smart Lamp Solution with Application Enabled Platform -- Mining Hypernym-Hyponym Relations from Social Tags via Tag Embedding -- Accurate and Fast DV-hop Localization Algorithm in Irregular Networks -- Shape Recognition with Recurrent Neural Network -- WSN Multi-hop Routing Algorithm Based on Path Quality Comparison in New Energy Consumption Distance Node Relation Model -- Tobacco Intelligent Management System Based on Internet of Things -- Research on Fault Self Diagnosis Technology of Agricultural Internet of Things Information Collection System -- Analysis of Antenna Array Parameter Effect for Massive MIMO Transmission -- Intelligent Irrigation System of Balcony Flowers Based on Internet of Things -- Multimedia Forensics -- The Impact of Using Facebook on the Academic Performance of University Students -- Robust Audio Watermarking Algorithm Based on Moving Average and DCT -- Computer Evidence Analysis Technology Based on Weighted Frequent Pattern Growth Algorithm -- Reversible Data Hiding in JPEG Images Based on Multiple Histograms Modification -- Image Hashing based on CS-LBP and DCT for Copy Detection -- KMSVM: A Efficient Min-Max Modular Support Vector Machine Based on Clustering -- An Image Forensic Method for AI Inpainting Using Faster R-CNN -- Kernel Generalized Canonical Correlation and A New Feature Fusion Strategy -- Multiple Obstacle Detection for Assistance Driver System Using Deep Neural Networks -- Encryption and Cybersecurity -- CABAC: A Content-Driven Attribute-Based Access Control Model for Big Data -- Calculation of Network Security Index Based on Convolution Neural Networks -- A Method to Defense APT based on Dynamic ID Transformation -- Emergency analysis Based on Affective Computing in Universities Forum -- Network Attack and Defense Effectiveness Evaluation Based on Dematel Method -- Web Application-layer DDoS Attack Detection Based on generalized Jaccard Similarity and Information Entropy -- Ultra-broad Bandpass Filter Based on Composite Right-Left Handed Transmission Line Model -- An Automatic Identification Algorithm for Encrypted Anti-counterfeiting Tag Based on DWT-DCT and Chen's Chaos -- Security Analysis and Improvement of Elliptic Curve Digital Signature Scheme -- Risk Taking Behavior in Crowdsourcing Adoption: The Case of Witkey -- Anomaly detection in Wireless Sensor Networks based on KNN -- Comparison of The Legal Principle Foundation of Chinese And American Secret Information Access Control Technique. En línea: https://link-springer-com.biblioproxy.umanizales.edu.co/referencework/10.1007/97 [...] Link: https://biblioteca.umanizales.edu.co/ils/opac_css/index.php?lvl=notice_display&i 5th International Conference, ICAIS 2019, New York, NY, USA, July 26–28, 2019, Proceedings, Part IV / Sun, Xingming ; Pan, Zhaoqing ; Bertino, Elisa
![]()
Título : 5th International Conference, ICAIS 2019, New York, NY, USA, July 26–28, 2019, Proceedings, Part IV Tipo de documento: documento electrónico Autores: Sun, Xingming, ; Pan, Zhaoqing, ; Bertino, Elisa, Mención de edición: 1 ed. Editorial: [s.l.] : Springer Fecha de publicación: 2019 Número de páginas: XVII, 651 p. 252 ilustraciones, 134 ilustraciones en color. ISBN/ISSN/DL: 978-3-030-24268-8 Nota general: Libro disponible en la plataforma SpringerLink. Descarga y lectura en formatos PDF, HTML y ePub. Descarga completa o por capítulos. Palabras clave: Protección de datos Criptografía Cifrado de datos (Informática) Red de computadoras Software de la aplicacion Ingeniería de software Ordenador Tecnología de la información Seguridad de datos e información Criptología Redes de comunicación informática Aplicaciones informáticas y de sistemas de información Aspectos Legales de la Computación Índice Dewey: 005.8 Ciencia de los computadores (Programación, programas de sistemas) Resumen: El conjunto de 4 volúmenes LNCS 11632 hasta LNCS 11635 constituye las actas arbitradas de la Quinta Conferencia Internacional sobre Inteligencia Artificial y Seguridad, ICAIS 2019, que se celebró en Nueva York, EE. UU., en julio de 2019. La conferencia se llamaba anteriormente "Conferencia Internacional sobre Computación y Seguridad en la Nube” con las siglas ICCCS. El total de 230 artículos completos presentados en estas actas de 4 volúmenes fue cuidadosamente revisado y seleccionado entre 1529 presentaciones. Los artículos se organizaron en secciones temáticas de la siguiente manera: Parte I: computación en la nube; Parte II: inteligencia artificial; grandes datos; y computación y seguridad en la nube; Parte III: computación en la nube y seguridad; ocultación de información; seguridad de la IoT; análisis forense multimedia; y cifrado y ciberseguridad; Parte IV: cifrado y ciberseguridad. Nota de contenido: Encryption and Cybersecurity -- A Gray-Box Vulnerability Discovery Model based on Path Coverage -- Quantum Network Coding Based on Entanglement Distribution -- Moving Target Defense in Preventing SQL Injection -- Design and Security Analysis of Certificateless Aggregate Signature Scheme -- SuperEye: a Distributed Port Scanning System -- An Improved Multi-classification Algorithm for Imbalanced Online Public Opinion Data -- NCGs: Building A Trustworthy Environment to Identify Abnormal Events Based on Network Connection Behavior Analysis -- Short Text Topic Recognition and Optimization Method for University Online Community -- A Survey on Network Traffic Identification -- A Survey of Network Security Situational Awareness Technology -- Multi-function Quantum Cryptography Protocol Based On Bell State -- The Attack Case of ECDSA on Blockchain based on Improved Simple Power Analysis -- A Weight-Based Channel Estimation Implementation Algorithm -- Multi-Party Quantum Communication Complexity on CompositeBoolean-Valued Function -- BlockZone: A Blockchain-based DNS Storage and Retrieval Scheme -- Robust Analysis of Grid System Based on Complex Network Attack Mode -- A Secure Data Aggregation Protocol in VANETs based on Multi-key FHE -- Research on SQL Injection and Defense Technology -- A Review of the Factorization Problem of Large Integers -- A Comparison of Machine Learning Algorithms for Detecting XSS Attacks -- A Survey of Privacy-Preserving Techniques for Blockchain -- A Survey of Software Reverse Engineering Applications -- A Fast IP Matching Algorithm under Large Traffic -- An Effective Load Balance using Link Bandwidth for SDN-based Data Centers -- Zero-Day Vulnerability Risk Assessment and Attack Path Analysis Using Security Metric -- Research on Content Extraction of Rich Text Web Pages -- Network Protocol Analysis base on WeChat PC Version -- Bitcoin Network Size Estimation Based on Coupon Collection Model -- A Survey of the Software Vulnerability Discovery using Machine Learning Techniques -- A Distributed Cryptanalysis Framework based on Mobile Phones -- A Novel Threshold Signature Scheme Based on Elliptic Curve with designated verifier -- A Congestion Control Methodology with Probability Routing based on MNL for Datacenter Network -- Fast Failover for Link Failures in Software Defined Networks -- Steady-state Topology Discovery of Target Networks based on Statistics Method -- A Novel Method for Weighted Throughput Fairness in Contention-based WLANs with Multiple Priority Levels -- Bitcoin Node Discovery: Large-scale Empirical Evaluation of Network Churn -- DDoS Attack Situation Information Fusion Method Based on Dempster-Shafer Evidence Theory -- Webshell Detection Model based on Deep Learning -- A Security-Sensitive Function Mining Framework for Source Code -- Abstraction of Operations in Trusted Components Based on OR-transition Colored Petri Net -- Trusted Component Decomposition Based on OR-transition Colored Petri Net -- High-Speed File Transferring over Linux Bridge for QGAEnhancement in Cyber Range -- Playing First-Person-Shooter Games with A3C-Anticipator Network Based Agents using Reinforcement Learning -- Identify Influentials Based on User behavior Across Different Topics -- Taylor Series Localization Algorithm Based on Semi-definite Programming -- Research on Pedestrian Attribute Recognition Based on Semantic Segmentation in Natural Scene -- An evolving network model based on a triangular connecting mechanism for the Internet topology -- A new quantum private query protocol with better performance in resisting joint-measurement attack -- PPCSB:A Privacy-Preserving Electricity Consumption Statistics and Billing Scheme in Smart Grid -- Blockchain Private Key Storage Algorithm Based on Image Information Hiding -- Heuristic-Q: A Privacy Data Pricing Method Based on Heuristic Reinforcement Learning -- JPEGCNN:A Transform Domain Steganalysis Model Based On Convolutional Neural Network -- Quantum algorithm for support vector machine with exponentially improved dependence on precision -- Reliability-based and QoS-aware Service Redundancy Backup Method in IoT-based Smart Grid -- A Privacy-Preserving Electricity Trading Scheme Based on Blockchain -- A Novel Facial Expression Recognition Scheme based on Deep Neural Networks -- Active Defense System of Industrial Control System Based on Dynamic Behavior Analysis -- Research on Active Defense Technology of Smart Grid Control Terminal Based on Dynamic Trust. En línea: https://link-springer-com.biblioproxy.umanizales.edu.co/referencework/10.1007/97 [...] Link: https://biblioteca.umanizales.edu.co/ils/opac_css/index.php?lvl=notice_display&i 5th International Conference, ICAIS 2019, New York, NY, USA, July 26–28, 2019, Proceedings, Part IV [documento electrónico] / Sun, Xingming, ; Pan, Zhaoqing, ; Bertino, Elisa, . - 1 ed. . - [s.l.] : Springer, 2019 . - XVII, 651 p. 252 ilustraciones, 134 ilustraciones en color.
ISBN : 978-3-030-24268-8
Libro disponible en la plataforma SpringerLink. Descarga y lectura en formatos PDF, HTML y ePub. Descarga completa o por capítulos.
Palabras clave: Protección de datos Criptografía Cifrado de datos (Informática) Red de computadoras Software de la aplicacion Ingeniería de software Ordenador Tecnología de la información Seguridad de datos e información Criptología Redes de comunicación informática Aplicaciones informáticas y de sistemas de información Aspectos Legales de la Computación Índice Dewey: 005.8 Ciencia de los computadores (Programación, programas de sistemas) Resumen: El conjunto de 4 volúmenes LNCS 11632 hasta LNCS 11635 constituye las actas arbitradas de la Quinta Conferencia Internacional sobre Inteligencia Artificial y Seguridad, ICAIS 2019, que se celebró en Nueva York, EE. UU., en julio de 2019. La conferencia se llamaba anteriormente "Conferencia Internacional sobre Computación y Seguridad en la Nube” con las siglas ICCCS. El total de 230 artículos completos presentados en estas actas de 4 volúmenes fue cuidadosamente revisado y seleccionado entre 1529 presentaciones. Los artículos se organizaron en secciones temáticas de la siguiente manera: Parte I: computación en la nube; Parte II: inteligencia artificial; grandes datos; y computación y seguridad en la nube; Parte III: computación en la nube y seguridad; ocultación de información; seguridad de la IoT; análisis forense multimedia; y cifrado y ciberseguridad; Parte IV: cifrado y ciberseguridad. Nota de contenido: Encryption and Cybersecurity -- A Gray-Box Vulnerability Discovery Model based on Path Coverage -- Quantum Network Coding Based on Entanglement Distribution -- Moving Target Defense in Preventing SQL Injection -- Design and Security Analysis of Certificateless Aggregate Signature Scheme -- SuperEye: a Distributed Port Scanning System -- An Improved Multi-classification Algorithm for Imbalanced Online Public Opinion Data -- NCGs: Building A Trustworthy Environment to Identify Abnormal Events Based on Network Connection Behavior Analysis -- Short Text Topic Recognition and Optimization Method for University Online Community -- A Survey on Network Traffic Identification -- A Survey of Network Security Situational Awareness Technology -- Multi-function Quantum Cryptography Protocol Based On Bell State -- The Attack Case of ECDSA on Blockchain based on Improved Simple Power Analysis -- A Weight-Based Channel Estimation Implementation Algorithm -- Multi-Party Quantum Communication Complexity on CompositeBoolean-Valued Function -- BlockZone: A Blockchain-based DNS Storage and Retrieval Scheme -- Robust Analysis of Grid System Based on Complex Network Attack Mode -- A Secure Data Aggregation Protocol in VANETs based on Multi-key FHE -- Research on SQL Injection and Defense Technology -- A Review of the Factorization Problem of Large Integers -- A Comparison of Machine Learning Algorithms for Detecting XSS Attacks -- A Survey of Privacy-Preserving Techniques for Blockchain -- A Survey of Software Reverse Engineering Applications -- A Fast IP Matching Algorithm under Large Traffic -- An Effective Load Balance using Link Bandwidth for SDN-based Data Centers -- Zero-Day Vulnerability Risk Assessment and Attack Path Analysis Using Security Metric -- Research on Content Extraction of Rich Text Web Pages -- Network Protocol Analysis base on WeChat PC Version -- Bitcoin Network Size Estimation Based on Coupon Collection Model -- A Survey of the Software Vulnerability Discovery using Machine Learning Techniques -- A Distributed Cryptanalysis Framework based on Mobile Phones -- A Novel Threshold Signature Scheme Based on Elliptic Curve with designated verifier -- A Congestion Control Methodology with Probability Routing based on MNL for Datacenter Network -- Fast Failover for Link Failures in Software Defined Networks -- Steady-state Topology Discovery of Target Networks based on Statistics Method -- A Novel Method for Weighted Throughput Fairness in Contention-based WLANs with Multiple Priority Levels -- Bitcoin Node Discovery: Large-scale Empirical Evaluation of Network Churn -- DDoS Attack Situation Information Fusion Method Based on Dempster-Shafer Evidence Theory -- Webshell Detection Model based on Deep Learning -- A Security-Sensitive Function Mining Framework for Source Code -- Abstraction of Operations in Trusted Components Based on OR-transition Colored Petri Net -- Trusted Component Decomposition Based on OR-transition Colored Petri Net -- High-Speed File Transferring over Linux Bridge for QGAEnhancement in Cyber Range -- Playing First-Person-Shooter Games with A3C-Anticipator Network Based Agents using Reinforcement Learning -- Identify Influentials Based on User behavior Across Different Topics -- Taylor Series Localization Algorithm Based on Semi-definite Programming -- Research on Pedestrian Attribute Recognition Based on Semantic Segmentation in Natural Scene -- An evolving network model based on a triangular connecting mechanism for the Internet topology -- A new quantum private query protocol with better performance in resisting joint-measurement attack -- PPCSB:A Privacy-Preserving Electricity Consumption Statistics and Billing Scheme in Smart Grid -- Blockchain Private Key Storage Algorithm Based on Image Information Hiding -- Heuristic-Q: A Privacy Data Pricing Method Based on Heuristic Reinforcement Learning -- JPEGCNN:A Transform Domain Steganalysis Model Based On Convolutional Neural Network -- Quantum algorithm for support vector machine with exponentially improved dependence on precision -- Reliability-based and QoS-aware Service Redundancy Backup Method in IoT-based Smart Grid -- A Privacy-Preserving Electricity Trading Scheme Based on Blockchain -- A Novel Facial Expression Recognition Scheme based on Deep Neural Networks -- Active Defense System of Industrial Control System Based on Dynamic Behavior Analysis -- Research on Active Defense Technology of Smart Grid Control Terminal Based on Dynamic Trust. En línea: https://link-springer-com.biblioproxy.umanizales.edu.co/referencework/10.1007/97 [...] Link: https://biblioteca.umanizales.edu.co/ils/opac_css/index.php?lvl=notice_display&i 6th International Conference, ICAIS 2020, Hohhot, China, July 17–20, 2020, Proceedings, Part I / Sun, Xingming ; Wang, Jinwei ; Bertino, Elisa
![]()
Título : 6th International Conference, ICAIS 2020, Hohhot, China, July 17–20, 2020, Proceedings, Part I Tipo de documento: documento electrónico Autores: Sun, Xingming, ; Wang, Jinwei, ; Bertino, Elisa, Mención de edición: 1 ed. Editorial: Singapore [Malasya] : Springer Fecha de publicación: 2020 Número de páginas: XXIX, 719 p. 123 ilustraciones ISBN/ISSN/DL: 978-981-1580833-- Nota general: Libro disponible en la plataforma SpringerLink. Descarga y lectura en formatos PDF, HTML y ePub. Descarga completa o por capítulos. Palabras clave: Protección de datos Ingeniería Informática Red de computadoras Inteligencia artificial Seguridad de datos e información Ingeniería Informática y Redes Redes de comunicación informática Índice Dewey: 005.8 Ciencia de los computadores (Programación, programas de sistemas) Resumen: El conjunto de tres volúmenes CCIS 1252 hasta CCIS 1254 constituye las actas arbitradas de la 6.ª Conferencia Internacional sobre Inteligencia Artificial y Seguridad, ICAIS 2020, que se celebró en Hohhot, China, en julio de 2020. La conferencia se llamaba anteriormente "Conferencia Internacional sobre la Nube". Informática y Seguridad” con las siglas ICCCS. El total de 178 artículos completos y 8 artículos breves presentados en estas actas de 3 volúmenes fue cuidadosamente revisado y seleccionado entre 1064 presentaciones. Los artículos se organizaron en secciones temáticas de la siguiente manera: Parte I: inteligencia artificial; Parte II: inteligencia artificial; Internet de las Cosas; seguridad de información; Parte III: seguridad de la información; big data y computación en la nube; procesamiento de información. Nota de contenido: Fast Texture Image Retrieval Using Learning Copula Model of Multiple DTCWT -- Joint Generic Learning and Multi-SourceDomain Adaptation on Unsupervised FaceRecognition -- Reset Attack: An Attack Against Homomorphic Encryption-based Privacy-Preserving Deep Learning System -- Intelligent Contract for Power Market Transaction Based on the BlockChain -- Survey on Zero-trust Network Security -- A Novel Consensus Algorithm for Alliance Chain -- A Novel Thematic Network Data Collector Based on Simulated Annealing Hybrid Genetic Algorithm -- The Study of Fog Computing Security Situation Prediction in Industrial Internet -- A novel keypoints-based image registration method with fully convolutional neural network -- Image super-resolution reconstruction with dense residual attention module -- GF-2 image blue roof building extraction method based on object-oriented classification technology -- Optimization and Parallelization of the cosmological N-body Simulation on Many-core Processor -- Parallel optimization of stencil computation base on Sunway TaihuLight -- Chinese News Data Extraction System Based On Readability Algorithm -- Parallel Acceleration Improvement of Physical Quantity Gradient Algorithm Based on CFD -- Using Process Visualization and Early Warning Based on Learning Analytics to Enhance Teaching and Learning -- Research Progress of Knowledge Graph Embedding -- A Robust Framework for High-quality Voice Conversion with Conditional Generative Adversarial Network -- Effective Android Malware Detection based on Deep Learning -- Research on Tampering Detection of Material Gene Data Based on Fragile Watermarking -- Quantitative Evaluation Of Promotion Of Traditional National Sports Events Based On Probity Multiple Regression Analysis -- Research on Leisure Sports Activities Based on Decision Tree Algorithm -- Semantic Integrity Analysis Based on Transformer -- An improvementof Coherent Semantic Attention for Image Inpainting -- Formal Verification of the Correctness of Operating System on Assembly Layer in Isabelle/HoL -- Nonlinear Correction Based on Depth Neural Network -- Spatial-temporal co-attention network for action recognition -- Improved SSD for object detection -- Sentiment Analysis on Weibo Platform for Stock Prediction -- Refinement Measurement and Evaluation of Streets in Shanghai Old City -- A Traceability Architecture for the Fresh Food Supply Chain based on Blockchain Technology in China -- Research Progress in Blind Forensics of Digital Image Smooth Filtering -- Research on video violence detection technology of UAV on cloud platform -- A Generative Steganography Method Based on WGAN-GP -- A deep learning network for coarse-to-fine deformable medical image registration -- Research on Cross-lingual Machine Reading Comprehension Technology Based on Non-parallel Corpus -- Research on the data reference model of NMIS -- A Real-time Recommender System Design Based on Spark Streaming -- A Novel Clone Detection Scheme Based on Generative Adversarial Networks -- Design of Vehicle Remote Monitoring System Based on LoRa Technology and QT Platform -- Unifying Domain Adaptation into Simultaneous Discriminant Analysis: a Method for Low-resolution Face Recognition with Single Sample per Person -- An exploratory study of blending Smart classroom in database course -- Optimization and simulation of pre-warehouse multi-objective stock levels based on the Weibull distribution function -- Research and Analysis of Fine Management of Engineering Cost Based on BIM -- Survey of Software-Defined Network Security Issues -- A Fall Detection Algorithm Based on a Support Vector Machine -- A Multi-AGV Optimal Scheduling Algorithm Based on Particle Swarm Optimization -- An efficient quantum private comparison protocol based on conjugate coding -- Deliberated Vulnerable Environment Generating based on Container and Structured Vulnerability Intelligence -- Deep neural network watermarking based on texture analysis -- A Robust Reversible Image Watermarking Scheme based on Singular Value Decomposition and Quantization Technique -- Boolean Function Decomposition Based on Grover Algorithm and Its Simulation Using Quantum Language Quipper -- Research on Emotional Recognition of EEG Signals in Experimental Paradigm -- Research on Rasterized Population Evaluation Method Based on Multi-class Machine Learning Method -- Salary Satisfaction of University Teachers with Different Professional Positions -- Defining Cost Function for Robust Embedding -- Efficient Identity-Based Signature authentication scheme for smart home system -- A Resource Allocation Mechanism for Edge-blockchain -- Remote sensing image zero-watermarking algorithm based on accurate polar harmonic Fourier moment -- Multi-layer quantum secret sharing based on GHZ states -- Robot scheduling system based on semantic recognition -- Pedestrian Counting without Tracking for the Security Application of IoT Framework. En línea: https://link-springer-com.biblioproxy.umanizales.edu.co/referencework/10.1007/97 [...] Link: https://biblioteca.umanizales.edu.co/ils/opac_css/index.php?lvl=notice_display&i 6th International Conference, ICAIS 2020, Hohhot, China, July 17–20, 2020, Proceedings, Part I [documento electrónico] / Sun, Xingming, ; Wang, Jinwei, ; Bertino, Elisa, . - 1 ed. . - Singapore [Malasya] : Springer, 2020 . - XXIX, 719 p. 123 ilustraciones.
ISBN : 978-981-1580833--
Libro disponible en la plataforma SpringerLink. Descarga y lectura en formatos PDF, HTML y ePub. Descarga completa o por capítulos.
Palabras clave: Protección de datos Ingeniería Informática Red de computadoras Inteligencia artificial Seguridad de datos e información Ingeniería Informática y Redes Redes de comunicación informática Índice Dewey: 005.8 Ciencia de los computadores (Programación, programas de sistemas) Resumen: El conjunto de tres volúmenes CCIS 1252 hasta CCIS 1254 constituye las actas arbitradas de la 6.ª Conferencia Internacional sobre Inteligencia Artificial y Seguridad, ICAIS 2020, que se celebró en Hohhot, China, en julio de 2020. La conferencia se llamaba anteriormente "Conferencia Internacional sobre la Nube". Informática y Seguridad” con las siglas ICCCS. El total de 178 artículos completos y 8 artículos breves presentados en estas actas de 3 volúmenes fue cuidadosamente revisado y seleccionado entre 1064 presentaciones. Los artículos se organizaron en secciones temáticas de la siguiente manera: Parte I: inteligencia artificial; Parte II: inteligencia artificial; Internet de las Cosas; seguridad de información; Parte III: seguridad de la información; big data y computación en la nube; procesamiento de información. Nota de contenido: Fast Texture Image Retrieval Using Learning Copula Model of Multiple DTCWT -- Joint Generic Learning and Multi-SourceDomain Adaptation on Unsupervised FaceRecognition -- Reset Attack: An Attack Against Homomorphic Encryption-based Privacy-Preserving Deep Learning System -- Intelligent Contract for Power Market Transaction Based on the BlockChain -- Survey on Zero-trust Network Security -- A Novel Consensus Algorithm for Alliance Chain -- A Novel Thematic Network Data Collector Based on Simulated Annealing Hybrid Genetic Algorithm -- The Study of Fog Computing Security Situation Prediction in Industrial Internet -- A novel keypoints-based image registration method with fully convolutional neural network -- Image super-resolution reconstruction with dense residual attention module -- GF-2 image blue roof building extraction method based on object-oriented classification technology -- Optimization and Parallelization of the cosmological N-body Simulation on Many-core Processor -- Parallel optimization of stencil computation base on Sunway TaihuLight -- Chinese News Data Extraction System Based On Readability Algorithm -- Parallel Acceleration Improvement of Physical Quantity Gradient Algorithm Based on CFD -- Using Process Visualization and Early Warning Based on Learning Analytics to Enhance Teaching and Learning -- Research Progress of Knowledge Graph Embedding -- A Robust Framework for High-quality Voice Conversion with Conditional Generative Adversarial Network -- Effective Android Malware Detection based on Deep Learning -- Research on Tampering Detection of Material Gene Data Based on Fragile Watermarking -- Quantitative Evaluation Of Promotion Of Traditional National Sports Events Based On Probity Multiple Regression Analysis -- Research on Leisure Sports Activities Based on Decision Tree Algorithm -- Semantic Integrity Analysis Based on Transformer -- An improvementof Coherent Semantic Attention for Image Inpainting -- Formal Verification of the Correctness of Operating System on Assembly Layer in Isabelle/HoL -- Nonlinear Correction Based on Depth Neural Network -- Spatial-temporal co-attention network for action recognition -- Improved SSD for object detection -- Sentiment Analysis on Weibo Platform for Stock Prediction -- Refinement Measurement and Evaluation of Streets in Shanghai Old City -- A Traceability Architecture for the Fresh Food Supply Chain based on Blockchain Technology in China -- Research Progress in Blind Forensics of Digital Image Smooth Filtering -- Research on video violence detection technology of UAV on cloud platform -- A Generative Steganography Method Based on WGAN-GP -- A deep learning network for coarse-to-fine deformable medical image registration -- Research on Cross-lingual Machine Reading Comprehension Technology Based on Non-parallel Corpus -- Research on the data reference model of NMIS -- A Real-time Recommender System Design Based on Spark Streaming -- A Novel Clone Detection Scheme Based on Generative Adversarial Networks -- Design of Vehicle Remote Monitoring System Based on LoRa Technology and QT Platform -- Unifying Domain Adaptation into Simultaneous Discriminant Analysis: a Method for Low-resolution Face Recognition with Single Sample per Person -- An exploratory study of blending Smart classroom in database course -- Optimization and simulation of pre-warehouse multi-objective stock levels based on the Weibull distribution function -- Research and Analysis of Fine Management of Engineering Cost Based on BIM -- Survey of Software-Defined Network Security Issues -- A Fall Detection Algorithm Based on a Support Vector Machine -- A Multi-AGV Optimal Scheduling Algorithm Based on Particle Swarm Optimization -- An efficient quantum private comparison protocol based on conjugate coding -- Deliberated Vulnerable Environment Generating based on Container and Structured Vulnerability Intelligence -- Deep neural network watermarking based on texture analysis -- A Robust Reversible Image Watermarking Scheme based on Singular Value Decomposition and Quantization Technique -- Boolean Function Decomposition Based on Grover Algorithm and Its Simulation Using Quantum Language Quipper -- Research on Emotional Recognition of EEG Signals in Experimental Paradigm -- Research on Rasterized Population Evaluation Method Based on Multi-class Machine Learning Method -- Salary Satisfaction of University Teachers with Different Professional Positions -- Defining Cost Function for Robust Embedding -- Efficient Identity-Based Signature authentication scheme for smart home system -- A Resource Allocation Mechanism for Edge-blockchain -- Remote sensing image zero-watermarking algorithm based on accurate polar harmonic Fourier moment -- Multi-layer quantum secret sharing based on GHZ states -- Robot scheduling system based on semantic recognition -- Pedestrian Counting without Tracking for the Security Application of IoT Framework. En línea: https://link-springer-com.biblioproxy.umanizales.edu.co/referencework/10.1007/97 [...] Link: https://biblioteca.umanizales.edu.co/ils/opac_css/index.php?lvl=notice_display&i 6th International Conference, ICAIS 2020, Hohhot, China, July 17–20, 2020, Proceedings, Part I / Sun, Xingming ; Wang, Jinwei ; Bertino, Elisa
![]()
Permalink6th International Conference, ICAIS 2020, Hohhot, China, July 17–20, 2020, Proceedings, Part II / Sun, Xingming ; Wang, Jinwei ; Bertino, Elisa
![]()
Permalink6th International Conference, ICAIS 2020, Hohhot, China, July 17–20, 2020, Proceedings, Part II / Sun, Xingming ; Wang, Jinwei ; Bertino, Elisa
![]()
Permalink6th International Conference, ICAIS 2020, Hohhot, China, July 17–20, 2020, Proceedings, Part III / Sun, Xingming ; Wang, Jinwei ; Bertino, Elisa
![]()
Permalink7th International Conference, ICAIS 2021, Dublin, Ireland, July 19–23, 2021, Proceedings, Part I / Sun, Xingming ; Zhang, Xiaorui ; Xia, Zhihua ; Bertino, Elisa
![]()
Permalink7th International Conference, ICAIS 2021, Dublin, Ireland, July 19–23, 2021, Proceedings, Part II / Sun, Xingming ; Zhang, Xiaorui ; Xia, Zhihua ; Bertino, Elisa
![]()
PermalinkAdvances in Artificial Intelligence and Security / Sun, Xingming ; Zhang, Xiaorui ; Xia, Zhihua ; Bertino, Elisa
![]()
PermalinkAdvances in Artificial Intelligence and Security / Sun, Xingming ; Zhang, Xiaorui ; Xia, Zhihua ; Bertino, Elisa
![]()
PermalinkAdvances in Artificial Intelligence and Security / Sun, Xingming ; Zhang, Xiaorui ; Xia, Zhihua ; Bertino, Elisa
![]()
PermalinkPermalink

