Información del autor
Autor Bertino, Elisa |
Documentos disponibles escritos por este autor (26)
Crear una solicitud de compra Refinar búsqueda
Advances in Artificial Intelligence and Security / Sun, Xingming ; Zhang, Xiaorui ; Xia, Zhihua ; Bertino, Elisa
TÃtulo : Advances in Artificial Intelligence and Security : 7th International Conference, ICAIS 2021, Dublin, Ireland, July 19-23, 2021, Proceedings, Part I Tipo de documento: documento electrónico Autores: Sun, Xingming, ; Zhang, Xiaorui, ; Xia, Zhihua, ; Bertino, Elisa, Mención de edición: 1 ed. Editorial: [s.l.] : Springer Fecha de publicación: 2021 Número de páginas: XXX, 730 p. 324 ilustraciones, 208 ilustraciones en color. ISBN/ISSN/DL: 978-3-030-78615-1 Nota general: Libro disponible en la plataforma SpringerLink. Descarga y lectura en formatos PDF, HTML y ePub. Descarga completa o por capítulos. Idioma : Inglés (eng) Palabras clave: Protección de datos Aprendizaje automático IngenierÃa Informática Red de computadoras Procesamiento de imágenes Visión por computador Ciencias sociales Seguridad de datos e información IngenierÃa Informática y Redes Imágenes por computadora visión reconocimiento de patrones y gráficos Aplicación informática en ciencias sociales y del comportamiento. Computadoras y Educación Clasificación: 005.8 Ciencia de los computadores (Programación, programas de sistemas) Resumen: El conjunto de tres volúmenes CCIS 1422, CCIS 1423 y CCIS 1424 constituye las actas arbitradas de la 7.ª Conferencia Internacional sobre Inteligencia y Seguridad Artificial, ICAIS 2021, que se celebró en DublÃn, Irlanda, en julio de 2021. El total de 131 artÃculos completos y Se revisaron y seleccionaron cuidadosamente 52 artÃculos breves presentados en estas actas de 3 volúmenes entre 1013 presentaciones. Los artÃculos se organizaron en secciones temáticas de la siguiente manera: Parte I: inteligencia artificial; Parte II: inteligencia artificial; grandes datos; computación en la nube y seguridad en Internet; Parte III: computación en la nube y seguridad; cifrado y ciberseguridad; ocultación de información; Seguridad de la IO. . Nota de contenido: Artificial Intelligence -- A Load Balancing Mechanism for a Multi-Controller Software Defined WiFi Network -- HGC:Hybrid Gradient Compression in Distributed Deep Learning -- Application of Lidar INS Integrated Positioning in Automatic Driving -- A Review of Named Entity Recognition in Chinese Medical Text -- Robust liver vessel extraction using DV-Net with D-BCE loss function -- Cloud computing-based graph convolutional network power consumption prediction method -- Intelligent Intrusion Detection of Measurement Automation System Based on Deep Learning -- LSTM-Exploit:Intelligent Penetration Based On LSTM Tool -- Pig target detection from image based on improved YOLO V3 -- ICPM: An Intelligent Compound Prediction Model Based on GA and GRNN -- A new method of halftoning and inverse halftoning based on GAN Network -- Sow Estrus Diagnosis from Sound Samples based on Improved Deep Learning -- Research on YOLO Model and its application in Fault Status recognition of freight trains -- Feedforward Deep Neural Network-Based Model for the Forecast of Severe Convective Wind -- Asynchronous Compatible D-ML System for Edge Devices -- Ball K-Medoids: Faster and Exacter -- GVNP: Global Vectors for Node Representation -- Investigation on Loan Approval Based on Convolutional Neural Network -- Chinese Verb-Object Collocation Knowledge Graph Construction and Application -- Optimal Deployment of Underwater Sensor Networks Based on Hungarian Algorithm -- Discrete Multi-Height Wind Farm Layout Optimization for Optimal Energy Output -- Multilevel Threshold Image Segmentation Based on Modified Moth-flame Optimization Algorithm -- Research on critical illness fundraising methods based on blockchain and smart contracts -- Collaboration Energy Efficiency with Mobile Edge Computing for Data Collection in IoT -- Improving the Transformer Translation Model with Back-Translation -- Rigid Image Registration based on Graph Matching -- A Multi-scale Fusion Method For Dense Crowd Counting -- Chinese text classification based on adversarial training -- Research on SVM Parameter Optimization Mechanism Based on Particle Swarm Optimization -- A parameter selection method based on reinforcement learning: the QoS-privacy trade-off for adversarial training framework -- Word Research on Sentiment Analysis of Foreign News Reports Concerning China Based On the Hybrid Model of Opinion Sentence and BLSTM-Attention -- Cascaded Convolutional Neural Network for Image Super-Resolution -- Risk Probability Forecast Technology of the Gust in Beijing Winter Olympic Games based on the Theory of Digital Image Processing -- Depth estimation based on optical flow and depth prediction -- The Algorithms for Word Segmentation and Named Entity Recognition of Chinese Medical Records -- Temperature forecasting based on LSTM in coastal city -- Recent Progress of Medical CT Image Processing based on Deep Learning -- Road Damage Detection and Classification based on M2det -- Weather Temperature Prediction Based on LSTM-Bayesian Optimization -- Research Situation and Development Trends of Deep Learning application in Meteorology -- Exploiting Spatial-Spectral Feature for Hyperspectral Image Classification based on 3-D CNN and Bi-LSTM -- Automated Methods for Symptom Normalization in Traditional Chinese Medicine Records -- A Nested Named Entity Recognition Method for Traditional Chinese Medicine Records -- Face Feature Extraction and Recognition Based on Lighted Deep Convolutional Neural Network -- Non-Orthogonal Multiple Access is Used for Power Allocation to MaximizeThroughput in Cognitive Radio Network Systems -- Research on Drug Response Prediction Model Based on Big Data -- A Cross-Modal Image-Text Retrieval System with Deep Learning -- Research on Behavioral Decision Reward Mechanism of Unmanned Swarm System in Confrontational Environment -- A Variable Step-Size based Iterative Algorithm for High-precision Ranging using FMCW Radar -- Research on the Smart Management and Service of Smart Classrooms in Colleges and Universities -- Performance Analysis of Hard Fusion Rules in Cognitive Radio Networks over Composite Channels -- Performance Analysis of Spectrum Sensing in Cognitive Radio Networks Based on AD Goodness of Fit under Noise Uncertainty -- Research on Prediction Algorithm for Heavy Overload of Main Equipment in Distribution Network -- Review of Attention Mechanism in Electric Power Systems -- Comprehensive review of intelligent operation and maintenance of power system in China -- An Incremental Learning Method for Fault Diagnosis Based on Random Forest -- Research on Short-term Flow Forecast of Intelligent Traffic -- Research on Stock Price Forecasting Based on BP Neural Network -- Trust Computing Model of online transaction based on Social Network and Mobile Agent -- An Adaptive Momentum Term based Optimization Method for Image Restoration -- Research on Situational Awareness Security Defense of Intrusion Link Based on Data Element Characteristic Network Transmission Signal -- Research on Proofreading Method of Semantic Collocation Error in Chinese. Tipo de medio : Computadora Summary : The 3-volume set CCIS 1422, CCIS 1423 and CCIS 1424 constitutes the refereed proceedings of the 7th International Conference on Artificial Intelligence and Security, ICAIS 2021, which was held in Dublin, Ireland, in July 2021. The total of 131 full papers and 52 short papers presented in this 3-volume proceedings was carefully reviewed and selected from 1013 submissions. The papers were organized in topical sections as follows: Part I: artificial intelligence; Part II: artificial intelligence; big data; cloud computing and security internet; Part III: cloud computing and security; encryption and cybersecurity; information hiding; IoT security. . Enlace de acceso : https://link-springer-com.biblioproxy.umanizales.edu.co/referencework/10.1007/97 [...] Advances in Artificial Intelligence and Security : 7th International Conference, ICAIS 2021, Dublin, Ireland, July 19-23, 2021, Proceedings, Part I [documento electrónico] / Sun, Xingming, ; Zhang, Xiaorui, ; Xia, Zhihua, ; Bertino, Elisa, . - 1 ed. . - [s.l.] : Springer, 2021 . - XXX, 730 p. 324 ilustraciones, 208 ilustraciones en color.
ISBN : 978-3-030-78615-1
Libro disponible en la plataforma SpringerLink. Descarga y lectura en formatos PDF, HTML y ePub. Descarga completa o por capítulos.
Idioma : Inglés (eng)
Palabras clave: Protección de datos Aprendizaje automático IngenierÃa Informática Red de computadoras Procesamiento de imágenes Visión por computador Ciencias sociales Seguridad de datos e información IngenierÃa Informática y Redes Imágenes por computadora visión reconocimiento de patrones y gráficos Aplicación informática en ciencias sociales y del comportamiento. Computadoras y Educación Clasificación: 005.8 Ciencia de los computadores (Programación, programas de sistemas) Resumen: El conjunto de tres volúmenes CCIS 1422, CCIS 1423 y CCIS 1424 constituye las actas arbitradas de la 7.ª Conferencia Internacional sobre Inteligencia y Seguridad Artificial, ICAIS 2021, que se celebró en DublÃn, Irlanda, en julio de 2021. El total de 131 artÃculos completos y Se revisaron y seleccionaron cuidadosamente 52 artÃculos breves presentados en estas actas de 3 volúmenes entre 1013 presentaciones. Los artÃculos se organizaron en secciones temáticas de la siguiente manera: Parte I: inteligencia artificial; Parte II: inteligencia artificial; grandes datos; computación en la nube y seguridad en Internet; Parte III: computación en la nube y seguridad; cifrado y ciberseguridad; ocultación de información; Seguridad de la IO. . Nota de contenido: Artificial Intelligence -- A Load Balancing Mechanism for a Multi-Controller Software Defined WiFi Network -- HGC:Hybrid Gradient Compression in Distributed Deep Learning -- Application of Lidar INS Integrated Positioning in Automatic Driving -- A Review of Named Entity Recognition in Chinese Medical Text -- Robust liver vessel extraction using DV-Net with D-BCE loss function -- Cloud computing-based graph convolutional network power consumption prediction method -- Intelligent Intrusion Detection of Measurement Automation System Based on Deep Learning -- LSTM-Exploit:Intelligent Penetration Based On LSTM Tool -- Pig target detection from image based on improved YOLO V3 -- ICPM: An Intelligent Compound Prediction Model Based on GA and GRNN -- A new method of halftoning and inverse halftoning based on GAN Network -- Sow Estrus Diagnosis from Sound Samples based on Improved Deep Learning -- Research on YOLO Model and its application in Fault Status recognition of freight trains -- Feedforward Deep Neural Network-Based Model for the Forecast of Severe Convective Wind -- Asynchronous Compatible D-ML System for Edge Devices -- Ball K-Medoids: Faster and Exacter -- GVNP: Global Vectors for Node Representation -- Investigation on Loan Approval Based on Convolutional Neural Network -- Chinese Verb-Object Collocation Knowledge Graph Construction and Application -- Optimal Deployment of Underwater Sensor Networks Based on Hungarian Algorithm -- Discrete Multi-Height Wind Farm Layout Optimization for Optimal Energy Output -- Multilevel Threshold Image Segmentation Based on Modified Moth-flame Optimization Algorithm -- Research on critical illness fundraising methods based on blockchain and smart contracts -- Collaboration Energy Efficiency with Mobile Edge Computing for Data Collection in IoT -- Improving the Transformer Translation Model with Back-Translation -- Rigid Image Registration based on Graph Matching -- A Multi-scale Fusion Method For Dense Crowd Counting -- Chinese text classification based on adversarial training -- Research on SVM Parameter Optimization Mechanism Based on Particle Swarm Optimization -- A parameter selection method based on reinforcement learning: the QoS-privacy trade-off for adversarial training framework -- Word Research on Sentiment Analysis of Foreign News Reports Concerning China Based On the Hybrid Model of Opinion Sentence and BLSTM-Attention -- Cascaded Convolutional Neural Network for Image Super-Resolution -- Risk Probability Forecast Technology of the Gust in Beijing Winter Olympic Games based on the Theory of Digital Image Processing -- Depth estimation based on optical flow and depth prediction -- The Algorithms for Word Segmentation and Named Entity Recognition of Chinese Medical Records -- Temperature forecasting based on LSTM in coastal city -- Recent Progress of Medical CT Image Processing based on Deep Learning -- Road Damage Detection and Classification based on M2det -- Weather Temperature Prediction Based on LSTM-Bayesian Optimization -- Research Situation and Development Trends of Deep Learning application in Meteorology -- Exploiting Spatial-Spectral Feature for Hyperspectral Image Classification based on 3-D CNN and Bi-LSTM -- Automated Methods for Symptom Normalization in Traditional Chinese Medicine Records -- A Nested Named Entity Recognition Method for Traditional Chinese Medicine Records -- Face Feature Extraction and Recognition Based on Lighted Deep Convolutional Neural Network -- Non-Orthogonal Multiple Access is Used for Power Allocation to MaximizeThroughput in Cognitive Radio Network Systems -- Research on Drug Response Prediction Model Based on Big Data -- A Cross-Modal Image-Text Retrieval System with Deep Learning -- Research on Behavioral Decision Reward Mechanism of Unmanned Swarm System in Confrontational Environment -- A Variable Step-Size based Iterative Algorithm for High-precision Ranging using FMCW Radar -- Research on the Smart Management and Service of Smart Classrooms in Colleges and Universities -- Performance Analysis of Hard Fusion Rules in Cognitive Radio Networks over Composite Channels -- Performance Analysis of Spectrum Sensing in Cognitive Radio Networks Based on AD Goodness of Fit under Noise Uncertainty -- Research on Prediction Algorithm for Heavy Overload of Main Equipment in Distribution Network -- Review of Attention Mechanism in Electric Power Systems -- Comprehensive review of intelligent operation and maintenance of power system in China -- An Incremental Learning Method for Fault Diagnosis Based on Random Forest -- Research on Short-term Flow Forecast of Intelligent Traffic -- Research on Stock Price Forecasting Based on BP Neural Network -- Trust Computing Model of online transaction based on Social Network and Mobile Agent -- An Adaptive Momentum Term based Optimization Method for Image Restoration -- Research on Situational Awareness Security Defense of Intrusion Link Based on Data Element Characteristic Network Transmission Signal -- Research on Proofreading Method of Semantic Collocation Error in Chinese. Tipo de medio : Computadora Summary : The 3-volume set CCIS 1422, CCIS 1423 and CCIS 1424 constitutes the refereed proceedings of the 7th International Conference on Artificial Intelligence and Security, ICAIS 2021, which was held in Dublin, Ireland, in July 2021. The total of 131 full papers and 52 short papers presented in this 3-volume proceedings was carefully reviewed and selected from 1013 submissions. The papers were organized in topical sections as follows: Part I: artificial intelligence; Part II: artificial intelligence; big data; cloud computing and security internet; Part III: cloud computing and security; encryption and cybersecurity; information hiding; IoT security. . Enlace de acceso : https://link-springer-com.biblioproxy.umanizales.edu.co/referencework/10.1007/97 [...] Advances in Artificial Intelligence and Security / Sun, Xingming ; Zhang, Xiaorui ; Xia, Zhihua ; Bertino, Elisa
TÃtulo : Advances in Artificial Intelligence and Security : 7th International Conference, ICAIS 2021, Dublin, Ireland, July 19-23, 2021, Proceedings, Part II Tipo de documento: documento electrónico Autores: Sun, Xingming, ; Zhang, Xiaorui, ; Xia, Zhihua, ; Bertino, Elisa, Mención de edición: 1 ed. Editorial: [s.l.] : Springer Fecha de publicación: 2021 Número de páginas: XVIII, 746 p. 111 ilustraciones ISBN/ISSN/DL: 978-3-030-78618-2 Nota general: Libro disponible en la plataforma SpringerLink. Descarga y lectura en formatos PDF, HTML y ePub. Descarga completa o por capítulos. Idioma : Inglés (eng) Palabras clave: Protección de datos Software de la aplicacion Red de computadoras Sistemas informáticos Computadoras Propósitos especiales Gestión de base de datos Seguridad de datos e información Aplicaciones informáticas y de sistemas de información Redes de comunicación informática Implementación de sistema informático Sistemas de propósito especial y basados ​​en aplicaciones Clasificación: 005.8 Ciencia de los computadores (Programación, programas de sistemas) Resumen: El conjunto de tres volúmenes CCIS 1422, CCIS 1423 y CCIS 1424 constituye las actas arbitradas de la 7.ª Conferencia Internacional sobre Inteligencia y Seguridad Artificial, ICAIS 2021, que se celebró en DublÃn, Irlanda, en julio de 2021. El total de 131 artÃculos completos y Se revisaron y seleccionaron cuidadosamente 52 artÃculos breves presentados en estas actas de 3 volúmenes entre 1013 presentaciones. Los artÃculos se organizaron en secciones temáticas de la siguiente manera: Parte I: inteligencia artificial; Parte II: inteligencia artificial; grandes datos; computación en la nube y seguridad en Internet; Parte III: computación en la nube y seguridad; cifrado y ciberseguridad; ocultación de información; Seguridad de la IO. . Nota de contenido: Artificial Intelligence -- An approach based on demand prediction with LSTM for solving multi-batch 2D cutting stock problems -- The identification of slope crack based on convolutional neural network -- Multi-dimensional fatigue driving detection method based on SVM improved by the kernel function -- Experiments of Federated Learning for COVID-19 Chest X-ray Images -- A Novel Network Covert Channel Model based on Blockchain Transaction Parity -- An Improved CNN Model for Fast Salient Object Detection -- Control system design of transport Robot based on Multi-color Recognition -- SACache: Size-Aware Load Balancing for Large-Scale Storage Systems -- Heterogeneous-ISA Application Migration in Edge Computing: Challenges, Techniques and Open Issues -- The Interaction Between Probe and Cavity Field Assists Quantum Synchronization -- Big Data -- W-Louvain:A Group Detection Algorithm Based On Synthetic Vectors -- Application of non-negative matrix factorization in faultdetection of distribution network -- Patent Citation Network Analysis Based on Improved Main Path Analysis: Mapping Key Technology Trajectory -- On-chain and Off-chain Collaborative Management System Based on Consortium Blockchain -- The Implementation of Aeronautical Information Exchange Model in SWIM -- CCTL: Cascade Classifier Text Localization Algorithm in Natural Scene Image -- Research on the Application of Big Data Analysis in University Library -- Research on Support Vector Machine in Traffic Detection Algorithm -- Application Research on Crop Straw Biomass Waste in Logistics Packaging System -- Research On Data Analysis To Improve English Vocabulary Learning Performance -- Hungarian Method in a car-sharing system application research -- Network Topology Discovery Based on Classification Algorithm -- Research on Feature Words for IoT Device Recognition Based on Word2vec -- Coverless Information Hiding Method Based on Combination Morse code and Double Cycle Application of Starter -- Application of Grey Forecasting Model to CPI Index Forecast -- A Preliminary Study about Star Image Processing Method in Harsh Environment -- Combining Turning Point Detection with Grid Transformation for Road Intersection Detection -- Evaluation of Training Effect of New Professional Farmers Based on BP Neural Network -- Evaluation of training effect of new-type professional Farmer based on cloud model -- A study on the characteristics of college students' consumption behavior based on clustering and association rules -- Research and Application of Nuclear Reactor Computational Data Framework Based on HDF5 -- Exploiting API description information to improve code comment generation -- A Tag Recommendation Method for OpenStreetMap Based on FP-Growth and Improved Markov Process -- Data Processing and Development of Big Data System: A Survey -- Current PHM Surveys for Mechanical Engineering -- Multi-sensor Fusion Detection Method for Vehicle Target Based on Kalman Filter and Data Association Filter.-Research on Crop Growth Period Estimation Based on Fusion Features -- Research and Application of Holographic Portrait Label System Construction for Main Equipment of Distribution Network Based on Big Data -- An Empirical Study on the Tourism Image of Nanjing From the Perspective of International Students -- Anomaly detection based on isolated forests -- An Information Identification Method for Venture Firms based on Frequent Itemset Discovery -- Design of Abnormal Behavior Detection System in the State Grid Business Office -- Research on the Application of Intelligent Detection Technology in Business Hall System -- Study on Freshness Indicator Agent of Natural Plant Pigment -- Multi-dimensional Visualization and Simulation Analysis of COVID-19 Outbreak -- Enterprise Electricity Consumption Forecasting Method Based on Federated Learning -- Cloud Computing and Security -- Revisit Raft Consistency Protocol on Private Blockchain System in High Network Latency -- Privacy-Preserving Outsourced Nash Equilibrium Computation in Cloud Computing -- Efficient Multi-Receiver Certificate-Based Proxy Re-Encryption Scheme for Secure Cloud Data Sharing -- Identity Authentication Technology in Edge Computing Environment: Vision and Challenges -- Research on Security Mechanism and Forensics of SQLite Database -- Research On Software Defined Programmable Strategy of Fireworks Model Oriented To Edge Computing Nodes -- Boolean functions with a few Walsh transform values -- Research on Automation Strategy of Coq -- A Model Design of Cost-effificient Blockchain Framework for E-Government Application -- Offloading Method Based on Reinforcement Learning in Mobile Edge Computing -- A Dynamic Decision-making Method for Endorser Node Selection -- A Proxy Node Resource Load Balancing Strategy Based on the Swift System -- Research on the Picture Database of Minority Emotion -- Instant Messaging Application Traffic Recognition. Tipo de medio : Computadora Summary : The 3-volume set CCIS 1422, CCIS 1423 and CCIS 1424 constitutes the refereed proceedings of the 7th International Conference on Artificial Intelligence and Security, ICAIS 2021, which was held in Dublin, Ireland, in July 2021. The total of 131 full papers and 52 short papers presented in this 3-volume proceedings was carefully reviewed and selected from 1013 submissions. The papers were organized in topical sections as follows: Part I: artificial intelligence; Part II: artificial intelligence; big data; cloud computing and security internet; Part III: cloud computing and security; encryption and cybersecurity; information hiding; IoT security. . Enlace de acceso : https://link-springer-com.biblioproxy.umanizales.edu.co/referencework/10.1007/97 [...] Advances in Artificial Intelligence and Security : 7th International Conference, ICAIS 2021, Dublin, Ireland, July 19-23, 2021, Proceedings, Part II [documento electrónico] / Sun, Xingming, ; Zhang, Xiaorui, ; Xia, Zhihua, ; Bertino, Elisa, . - 1 ed. . - [s.l.] : Springer, 2021 . - XVIII, 746 p. 111 ilustraciones.
ISBN : 978-3-030-78618-2
Libro disponible en la plataforma SpringerLink. Descarga y lectura en formatos PDF, HTML y ePub. Descarga completa o por capítulos.
Idioma : Inglés (eng)
Palabras clave: Protección de datos Software de la aplicacion Red de computadoras Sistemas informáticos Computadoras Propósitos especiales Gestión de base de datos Seguridad de datos e información Aplicaciones informáticas y de sistemas de información Redes de comunicación informática Implementación de sistema informático Sistemas de propósito especial y basados ​​en aplicaciones Clasificación: 005.8 Ciencia de los computadores (Programación, programas de sistemas) Resumen: El conjunto de tres volúmenes CCIS 1422, CCIS 1423 y CCIS 1424 constituye las actas arbitradas de la 7.ª Conferencia Internacional sobre Inteligencia y Seguridad Artificial, ICAIS 2021, que se celebró en DublÃn, Irlanda, en julio de 2021. El total de 131 artÃculos completos y Se revisaron y seleccionaron cuidadosamente 52 artÃculos breves presentados en estas actas de 3 volúmenes entre 1013 presentaciones. Los artÃculos se organizaron en secciones temáticas de la siguiente manera: Parte I: inteligencia artificial; Parte II: inteligencia artificial; grandes datos; computación en la nube y seguridad en Internet; Parte III: computación en la nube y seguridad; cifrado y ciberseguridad; ocultación de información; Seguridad de la IO. . Nota de contenido: Artificial Intelligence -- An approach based on demand prediction with LSTM for solving multi-batch 2D cutting stock problems -- The identification of slope crack based on convolutional neural network -- Multi-dimensional fatigue driving detection method based on SVM improved by the kernel function -- Experiments of Federated Learning for COVID-19 Chest X-ray Images -- A Novel Network Covert Channel Model based on Blockchain Transaction Parity -- An Improved CNN Model for Fast Salient Object Detection -- Control system design of transport Robot based on Multi-color Recognition -- SACache: Size-Aware Load Balancing for Large-Scale Storage Systems -- Heterogeneous-ISA Application Migration in Edge Computing: Challenges, Techniques and Open Issues -- The Interaction Between Probe and Cavity Field Assists Quantum Synchronization -- Big Data -- W-Louvain:A Group Detection Algorithm Based On Synthetic Vectors -- Application of non-negative matrix factorization in faultdetection of distribution network -- Patent Citation Network Analysis Based on Improved Main Path Analysis: Mapping Key Technology Trajectory -- On-chain and Off-chain Collaborative Management System Based on Consortium Blockchain -- The Implementation of Aeronautical Information Exchange Model in SWIM -- CCTL: Cascade Classifier Text Localization Algorithm in Natural Scene Image -- Research on the Application of Big Data Analysis in University Library -- Research on Support Vector Machine in Traffic Detection Algorithm -- Application Research on Crop Straw Biomass Waste in Logistics Packaging System -- Research On Data Analysis To Improve English Vocabulary Learning Performance -- Hungarian Method in a car-sharing system application research -- Network Topology Discovery Based on Classification Algorithm -- Research on Feature Words for IoT Device Recognition Based on Word2vec -- Coverless Information Hiding Method Based on Combination Morse code and Double Cycle Application of Starter -- Application of Grey Forecasting Model to CPI Index Forecast -- A Preliminary Study about Star Image Processing Method in Harsh Environment -- Combining Turning Point Detection with Grid Transformation for Road Intersection Detection -- Evaluation of Training Effect of New Professional Farmers Based on BP Neural Network -- Evaluation of training effect of new-type professional Farmer based on cloud model -- A study on the characteristics of college students' consumption behavior based on clustering and association rules -- Research and Application of Nuclear Reactor Computational Data Framework Based on HDF5 -- Exploiting API description information to improve code comment generation -- A Tag Recommendation Method for OpenStreetMap Based on FP-Growth and Improved Markov Process -- Data Processing and Development of Big Data System: A Survey -- Current PHM Surveys for Mechanical Engineering -- Multi-sensor Fusion Detection Method for Vehicle Target Based on Kalman Filter and Data Association Filter.-Research on Crop Growth Period Estimation Based on Fusion Features -- Research and Application of Holographic Portrait Label System Construction for Main Equipment of Distribution Network Based on Big Data -- An Empirical Study on the Tourism Image of Nanjing From the Perspective of International Students -- Anomaly detection based on isolated forests -- An Information Identification Method for Venture Firms based on Frequent Itemset Discovery -- Design of Abnormal Behavior Detection System in the State Grid Business Office -- Research on the Application of Intelligent Detection Technology in Business Hall System -- Study on Freshness Indicator Agent of Natural Plant Pigment -- Multi-dimensional Visualization and Simulation Analysis of COVID-19 Outbreak -- Enterprise Electricity Consumption Forecasting Method Based on Federated Learning -- Cloud Computing and Security -- Revisit Raft Consistency Protocol on Private Blockchain System in High Network Latency -- Privacy-Preserving Outsourced Nash Equilibrium Computation in Cloud Computing -- Efficient Multi-Receiver Certificate-Based Proxy Re-Encryption Scheme for Secure Cloud Data Sharing -- Identity Authentication Technology in Edge Computing Environment: Vision and Challenges -- Research on Security Mechanism and Forensics of SQLite Database -- Research On Software Defined Programmable Strategy of Fireworks Model Oriented To Edge Computing Nodes -- Boolean functions with a few Walsh transform values -- Research on Automation Strategy of Coq -- A Model Design of Cost-effificient Blockchain Framework for E-Government Application -- Offloading Method Based on Reinforcement Learning in Mobile Edge Computing -- A Dynamic Decision-making Method for Endorser Node Selection -- A Proxy Node Resource Load Balancing Strategy Based on the Swift System -- Research on the Picture Database of Minority Emotion -- Instant Messaging Application Traffic Recognition. Tipo de medio : Computadora Summary : The 3-volume set CCIS 1422, CCIS 1423 and CCIS 1424 constitutes the refereed proceedings of the 7th International Conference on Artificial Intelligence and Security, ICAIS 2021, which was held in Dublin, Ireland, in July 2021. The total of 131 full papers and 52 short papers presented in this 3-volume proceedings was carefully reviewed and selected from 1013 submissions. The papers were organized in topical sections as follows: Part I: artificial intelligence; Part II: artificial intelligence; big data; cloud computing and security internet; Part III: cloud computing and security; encryption and cybersecurity; information hiding; IoT security. . Enlace de acceso : https://link-springer-com.biblioproxy.umanizales.edu.co/referencework/10.1007/97 [...] Advances in Artificial Intelligence and Security / Sun, Xingming ; Zhang, Xiaorui ; Xia, Zhihua ; Bertino, Elisa
TÃtulo : Advances in Artificial Intelligence and Security : 7th International Conference, ICAIS 2021, Dublin, Ireland, July 19-23, 2021, Proceedings, Part III Tipo de documento: documento electrónico Autores: Sun, Xingming, ; Zhang, Xiaorui, ; Xia, Zhihua, ; Bertino, Elisa, Mención de edición: 1 ed. Editorial: [s.l.] : Springer Fecha de publicación: 2021 Número de páginas: XVIII, 758 p. 330 ilustraciones, 206 ilustraciones en color. ISBN/ISSN/DL: 978-3-030-78621-2 Nota general: Libro disponible en la plataforma SpringerLink. Descarga y lectura en formatos PDF, HTML y ePub. Descarga completa o por capítulos. Idioma : Inglés (eng) Palabras clave: Protección de datos IngenierÃa Informática Red de computadoras Sistemas informáticos CriptografÃa Cifrado de datos (Informática) TeorÃa de la codificación TeorÃa de la información Seguridad de datos e información IngenierÃa Informática y Redes Redes de comunicación informática Implementación de sistema informático CriptologÃa TeorÃa de la codificación y la información Clasificación: 005.8 Ciencia de los computadores (Programación, programas de sistemas) Resumen: El conjunto de tres volúmenes CCIS 1422, CCIS 1423 y CCIS 1424 constituye las actas arbitradas de la 7.ª Conferencia Internacional sobre Inteligencia y Seguridad Artificial, ICAIS 2021, que se celebró en DublÃn, Irlanda, en julio de 2021. El total de 131 artÃculos completos y Se revisaron y seleccionaron cuidadosamente 52 artÃculos breves presentados en estas actas de 3 volúmenes entre 1013 presentaciones. Los artÃculos se organizaron en secciones temáticas de la siguiente manera: Parte I: inteligencia artificial; Parte II: inteligencia artificial; grandes datos; computación en la nube y seguridad; Parte III: computación en la nube y seguridad; cifrado y ciberseguridad; ocultación de información; Seguridad de la IO. . Nota de contenido: Cloud Computing and Security -- Design and Implementation of Information Detection System Based On Privacy Sensitive Data -- Performance Modeling of OpenMP Program Based On LLVM Compilation Platform -- A Method of network attack recognition Based on CNN+LSTM Model -- Encryption and Cybersecurity -- Recognition Method of Abnormal Data in Local Area Network Common Channel Based on Convolutional Neural Network -- MCF-CSA: A Multi-level Collaboration Framework for Cyber Situation Awareness and Information Sharing -- VABox: A Virtualization-based Analysis Framework of Virtualization-Obfuscated Packed Executables -- Imbalance Malware Classification by Decoupling Representation and Classifier- The promotion of online communication ability of mainstream media- HNN-based Prediction Method Supporting Discovery of Production Abnormal -- Efficient Forward and Backward Private Searchable Symmetric Encryption for Multiple Data Sources -- A feature extracting and matching system based on magic-number and AC-algorithm -- A Review: How to detect malicious domains -- A Homomorphic Encryption Method for Power Data Based on Improved Paillier Algorithm -- The Vulnerabilities in Smart Contracts: A Survey -- Detection of false data injection attacks in Smart Grid based on Machine Learning -- An Adversarial Examples Defense Method Based on Image Low-frequency Information -- Information Hiding -- A Robust Watermarking Algorithm for Video Game Artwork Based on Pose Estimation Neural Network -- Research on Content Authentication Technology of Electronic Bills Based on Text Watermarking Algorithm -- Finding the better distortion function from prior scheme for Image Steganography -- Application in Aviation Customer Churn Prediction Using Classification Algorithm Based on Machine Learning -- Color Image Steganography Scheme Based on Convolutional Neural Network -- Robust JPEG steganography using singular value decomposition in DCT domain -- 3D Coverless Image SteganographyScheme Based on 3D Slice Technology -- Software Information Hiding Algorithm Based on Import Table of Portable Executable File -- A Novel Robust Reversible Watermarking Method Against JPEG Compression -- A Common Steganalysis Method of Low Embedding Rate Steganography in Compressed Speech Based on Hierarchy Feature Extraction and Fusion -- TStego-THU: Large-scale Text Steganalysis Dataset -- IoT Security -- Integration Innovation of Competitive Intelligence, AI and Big Data Analysis -- A Comprehensive Review of IoT Technologies and Applications for Healthcare -- A Pervasive Narrow-band Internet of Things (NB-IoT) based health monitoring platform for Ambient Assisted Living,. Design and Development of Field Mobile Monitoring System for Forest Fire Fighting -- ZigBee Wireless Network Attack and Detection -- Joint ToF and Doppler Estimation for Reflection Path Under the Wi-Fi TTW Scenario -- Securing Satellite Internet of Things by Perceiving Content Semantics -- Research on Cultivating Senior Technical Talents Based on the Internet of Things Platform -- Liquid Metal Droplet Series Based Wire Oscillation -- Linear Time-invariant System Reduced-order Finite-time Observer -- Research on invulnerability of WSN based on small world characteristics of complex networks -- Collaboration energy efficiency with mobile edge computing for target tracking in IOT -- Realization of CSI-based Human Behavior Recognition: A Survey -- Security Analysis of Blockchain Smart Contract: Taking Reentrancy Vulnerability as an Example -- Research on Data Security Protection System of Monitoring and Acquisition System Based on Block Chain Technology -- Adaptive Active Immune Policy for Sensing Nodes in Internet of Things -- ELM Forecasted Model of Ammonia Nitrogen in Lake Taihu Combined with Adaboost and Particle Swarm Optimization Algorithms -- Study on Identification of Multiple Pesticide Residues in Lettuce Leaves Based on Hyperspectral Technology -- Robust JPEG Image Steganography Based onSVD in Wavelet Domain -- Raw Material Traceability of Industrial Control System based on Blockchain -- Survey: Research on Blockchain Consensus Mechanism in IoT Security -- Research on Life Prediction Model of Field Seismic Equipment Based on IFA-RVM Algorithm -- Optimization of Location Technology in Meteorological Wireless Sensor Network -- A Survey on the Applications of Wi-Fi Sensing -- Efficient Partially Policy-Hidden CP-ABE for IoT assisted Smart Health -- A Novel Hand Gesture Recognition Method for FMCW Radar -- A Novel Blockchain-based Revocable Permission Management on CP-ABE Scheme.-Automated Authentication of Large-scale IoT Devices with Hybrid Feature Selection -- A Practical Blockchain Framework for Securing IoT Applications -- A Blockchain-based Internet of Things Forensics Model -- Network Device Identification based on MAC Boundary Inference -- Providing Network-based Datasets and Multi-dimensional Features for IoT Botnet Detection Research -- The cross-domain identity authentication scheme has no trusted authentication center in the cloud environment -- A Caching Strategy Based On Content Popularity Level for NDN. . Tipo de medio : Computadora Summary : The 3-volume set CCIS 1422, CCIS 1423 and CCIS 1424 constitutes the refereed proceedings of the 7th International Conference on Artificial Intelligence and Security, ICAIS 2021, which was held in Dublin, Ireland, in July 2021. The total of 131 full papers and 52 short papers presented in this 3-volume proceedings was carefully reviewed and selected from 1013 submissions. The papers were organized in topical sections as follows: Part I: artificial intelligence; Part II: artificial intelligence; big data; cloud computing and security; Part III: cloud computing and security; encryption and cybersecurity; information hiding; IoT security. . Enlace de acceso : https://link-springer-com.biblioproxy.umanizales.edu.co/referencework/10.1007/97 [...] Advances in Artificial Intelligence and Security : 7th International Conference, ICAIS 2021, Dublin, Ireland, July 19-23, 2021, Proceedings, Part III [documento electrónico] / Sun, Xingming, ; Zhang, Xiaorui, ; Xia, Zhihua, ; Bertino, Elisa, . - 1 ed. . - [s.l.] : Springer, 2021 . - XVIII, 758 p. 330 ilustraciones, 206 ilustraciones en color.
ISBN : 978-3-030-78621-2
Libro disponible en la plataforma SpringerLink. Descarga y lectura en formatos PDF, HTML y ePub. Descarga completa o por capítulos.
Idioma : Inglés (eng)
Palabras clave: Protección de datos IngenierÃa Informática Red de computadoras Sistemas informáticos CriptografÃa Cifrado de datos (Informática) TeorÃa de la codificación TeorÃa de la información Seguridad de datos e información IngenierÃa Informática y Redes Redes de comunicación informática Implementación de sistema informático CriptologÃa TeorÃa de la codificación y la información Clasificación: 005.8 Ciencia de los computadores (Programación, programas de sistemas) Resumen: El conjunto de tres volúmenes CCIS 1422, CCIS 1423 y CCIS 1424 constituye las actas arbitradas de la 7.ª Conferencia Internacional sobre Inteligencia y Seguridad Artificial, ICAIS 2021, que se celebró en DublÃn, Irlanda, en julio de 2021. El total de 131 artÃculos completos y Se revisaron y seleccionaron cuidadosamente 52 artÃculos breves presentados en estas actas de 3 volúmenes entre 1013 presentaciones. Los artÃculos se organizaron en secciones temáticas de la siguiente manera: Parte I: inteligencia artificial; Parte II: inteligencia artificial; grandes datos; computación en la nube y seguridad; Parte III: computación en la nube y seguridad; cifrado y ciberseguridad; ocultación de información; Seguridad de la IO. . Nota de contenido: Cloud Computing and Security -- Design and Implementation of Information Detection System Based On Privacy Sensitive Data -- Performance Modeling of OpenMP Program Based On LLVM Compilation Platform -- A Method of network attack recognition Based on CNN+LSTM Model -- Encryption and Cybersecurity -- Recognition Method of Abnormal Data in Local Area Network Common Channel Based on Convolutional Neural Network -- MCF-CSA: A Multi-level Collaboration Framework for Cyber Situation Awareness and Information Sharing -- VABox: A Virtualization-based Analysis Framework of Virtualization-Obfuscated Packed Executables -- Imbalance Malware Classification by Decoupling Representation and Classifier- The promotion of online communication ability of mainstream media- HNN-based Prediction Method Supporting Discovery of Production Abnormal -- Efficient Forward and Backward Private Searchable Symmetric Encryption for Multiple Data Sources -- A feature extracting and matching system based on magic-number and AC-algorithm -- A Review: How to detect malicious domains -- A Homomorphic Encryption Method for Power Data Based on Improved Paillier Algorithm -- The Vulnerabilities in Smart Contracts: A Survey -- Detection of false data injection attacks in Smart Grid based on Machine Learning -- An Adversarial Examples Defense Method Based on Image Low-frequency Information -- Information Hiding -- A Robust Watermarking Algorithm for Video Game Artwork Based on Pose Estimation Neural Network -- Research on Content Authentication Technology of Electronic Bills Based on Text Watermarking Algorithm -- Finding the better distortion function from prior scheme for Image Steganography -- Application in Aviation Customer Churn Prediction Using Classification Algorithm Based on Machine Learning -- Color Image Steganography Scheme Based on Convolutional Neural Network -- Robust JPEG steganography using singular value decomposition in DCT domain -- 3D Coverless Image SteganographyScheme Based on 3D Slice Technology -- Software Information Hiding Algorithm Based on Import Table of Portable Executable File -- A Novel Robust Reversible Watermarking Method Against JPEG Compression -- A Common Steganalysis Method of Low Embedding Rate Steganography in Compressed Speech Based on Hierarchy Feature Extraction and Fusion -- TStego-THU: Large-scale Text Steganalysis Dataset -- IoT Security -- Integration Innovation of Competitive Intelligence, AI and Big Data Analysis -- A Comprehensive Review of IoT Technologies and Applications for Healthcare -- A Pervasive Narrow-band Internet of Things (NB-IoT) based health monitoring platform for Ambient Assisted Living,. Design and Development of Field Mobile Monitoring System for Forest Fire Fighting -- ZigBee Wireless Network Attack and Detection -- Joint ToF and Doppler Estimation for Reflection Path Under the Wi-Fi TTW Scenario -- Securing Satellite Internet of Things by Perceiving Content Semantics -- Research on Cultivating Senior Technical Talents Based on the Internet of Things Platform -- Liquid Metal Droplet Series Based Wire Oscillation -- Linear Time-invariant System Reduced-order Finite-time Observer -- Research on invulnerability of WSN based on small world characteristics of complex networks -- Collaboration energy efficiency with mobile edge computing for target tracking in IOT -- Realization of CSI-based Human Behavior Recognition: A Survey -- Security Analysis of Blockchain Smart Contract: Taking Reentrancy Vulnerability as an Example -- Research on Data Security Protection System of Monitoring and Acquisition System Based on Block Chain Technology -- Adaptive Active Immune Policy for Sensing Nodes in Internet of Things -- ELM Forecasted Model of Ammonia Nitrogen in Lake Taihu Combined with Adaboost and Particle Swarm Optimization Algorithms -- Study on Identification of Multiple Pesticide Residues in Lettuce Leaves Based on Hyperspectral Technology -- Robust JPEG Image Steganography Based onSVD in Wavelet Domain -- Raw Material Traceability of Industrial Control System based on Blockchain -- Survey: Research on Blockchain Consensus Mechanism in IoT Security -- Research on Life Prediction Model of Field Seismic Equipment Based on IFA-RVM Algorithm -- Optimization of Location Technology in Meteorological Wireless Sensor Network -- A Survey on the Applications of Wi-Fi Sensing -- Efficient Partially Policy-Hidden CP-ABE for IoT assisted Smart Health -- A Novel Hand Gesture Recognition Method for FMCW Radar -- A Novel Blockchain-based Revocable Permission Management on CP-ABE Scheme.-Automated Authentication of Large-scale IoT Devices with Hybrid Feature Selection -- A Practical Blockchain Framework for Securing IoT Applications -- A Blockchain-based Internet of Things Forensics Model -- Network Device Identification based on MAC Boundary Inference -- Providing Network-based Datasets and Multi-dimensional Features for IoT Botnet Detection Research -- The cross-domain identity authentication scheme has no trusted authentication center in the cloud environment -- A Caching Strategy Based On Content Popularity Level for NDN. . Tipo de medio : Computadora Summary : The 3-volume set CCIS 1422, CCIS 1423 and CCIS 1424 constitutes the refereed proceedings of the 7th International Conference on Artificial Intelligence and Security, ICAIS 2021, which was held in Dublin, Ireland, in July 2021. The total of 131 full papers and 52 short papers presented in this 3-volume proceedings was carefully reviewed and selected from 1013 submissions. The papers were organized in topical sections as follows: Part I: artificial intelligence; Part II: artificial intelligence; big data; cloud computing and security; Part III: cloud computing and security; encryption and cybersecurity; information hiding; IoT security. . Enlace de acceso : https://link-springer-com.biblioproxy.umanizales.edu.co/referencework/10.1007/97 [...]
TÃtulo : Artificial Intelligence and Security : 5th International Conference, ICAIS 2019, New York, NY, USA, July 26-28, 2019, Proceedings, Part I Tipo de documento: documento electrónico Autores: Sun, Xingming, ; Pan, Zhaoqing, ; Bertino, Elisa, Mención de edición: 1 ed. Editorial: [s.l.] : Springer Fecha de publicación: 2019 Número de páginas: XVII, 655 p. 342 ilustraciones, 214 ilustraciones en color. ISBN/ISSN/DL: 978-3-030-24274-9 Nota general: Libro disponible en la plataforma SpringerLink. Descarga y lectura en formatos PDF, HTML y ePub. Descarga completa o por capítulos. Idioma : Inglés (eng) Palabras clave: Protección de datos Inteligencia artificial Red de computadoras Visión por computador Ordenador TecnologÃa de la información Seguridad de datos e información Redes de comunicación informática Aspectos Legales de la Computación Clasificación: 005.8 Ciencia de los computadores (Programación, programas de sistemas) Resumen: El conjunto de 4 volúmenes LNCS 11632 hasta LNCS 11635 constituye las actas arbitradas de la Quinta Conferencia Internacional sobre Inteligencia Artificial y Seguridad, ICAIS 2019, que se celebró en Nueva York, EE. UU., en julio de 2019. La conferencia se llamaba anteriormente "Conferencia Internacional sobre Computación y Seguridad en la Nube†con las siglas ICCCS. El total de 230 artÃculos completos presentados en estas actas de 4 volúmenes fue cuidadosamente revisado y seleccionado entre 1529 presentaciones. Los artÃculos se organizaron en secciones temáticas de la siguiente manera: Parte I: computación en la nube; Parte II: inteligencia artificial; grandes datos; y computación y seguridad en la nube; Parte III: computación en la nube y seguridad; ocultación de información; seguridad de la IoT; análisis forense multimedia; y cifrado y ciberseguridad; Parte IV: cifrado y ciberseguridad. Nota de contenido: Cloud Computing -- Fuzzy Clustering: A New Clustering Method in Heterogeneous Medical Records Searching -- NOAA-LSTM: A New Method of Dialect Identification -- Evaluation Method of Teachers' Teaching Ability Based on BP Neural Network -- Research on the Promotion of Tibetan New Words and Platform Design -- A Classification Model for Drug Addicts Based on Improved Random Forests Algorithm -- Studying L-Diversity and K-Anonymity over Datasets with Sensitive Fields -- Power System Transient Stability Prediction Algorithm Based on ReliefF and LSTM -- A No-pairing Proxy Re-Encryption Scheme for Data Sharing in Untrusted Cloud -- E-sports Ban/Pick Prediction Based On Bi-LSTM Meta Learning Network -- Bottlenecks and Feasible Solutions of Data Field Clustering in Impact Factor, Time Resolution, Selecting Core Objects and Merging Process -- Detection of Microblog Overlapping Community Based on Multidimensional Information and Edge Distance Matrix -- Research on Settlement Deformation of Asphalt PavementStructure in Soft Soil Zone Based on Pavement Settlement Theory -- Legal Case Inspection: An Analogy-based Approach to Judgment Evaluation -- A Novel Noise Filter Based on Multiple Voting -- Fuzzy Control Method for Path Tracking System of Combine Harvester -- Research on Opinion Spam Detection by Time Series Anomaly Detection -- Application of Machine Learning Methods for Material Classification with Multi-energy X-ray Transmission Images -- Intra-class Classification of Architectural Styles Using Visualization of CNN -- MSE-Net: Pedestrian Attribute Recognition using MLSC and SE-Blocks -- CBAM-GAN: Generative Adversarial Networks Based on Convolutional Block Attention Module -- A Novel Distributed Knowledge Reasoning Model -- Research on Detection Method Of Abnormal Traffic In SDN -- Research on Constructing Technology of Implicit Hierarchical Topic Network Based on FP-growth -- PPD-DL: Privacy-Preserving Decentralized Deep Learning -- Towards Edge Computing based Distributed Data Analytics Framework in Smart Grids -- Android Malware Identification Based on Traffic Analysis -- Unsupervised Traditional Chinese Medicine Text Segmentation Combined with Domain Dictionary -- Research on the Efficiency and Application of Ship- helicopter Cooperative Search -- Cellular Neural Network Based Contour Detection for Seismic Image -- Discovering New Sensitive Words Based on Sensitive Information Categorization -- A Dynamic Event Region Tracking Approach Based on Node Calibration -- A Graph Updating Method of Data Theft Detection Based on Rough Set -- A Tutorial of Graph Representation -- Ground-based Cloud Images Recognition Based on GAN and PCANet -- Sparse Representation-Based Radiomics in the Diagnosis of Thyroid Nodules -- Local Smoothing Constraint in Convolutional Neural Network for Image Denoising -- Perceptual Loss based Super-Resolution Reconstruction from Single Magnetic Resonance Imaging -- DWI Fiber Tracking with Functional MRI of White Matter -- Multi-objective Investment Decision Making Based on An Improved SPEA2 Algorithm -- Power Load Forecasting Based on Adaptive Deep Long Short-Term Memory Network -- Optimized White Matter Fiber Reconstruction Using Combination of Diffusion and Functional MRI -- Convolutional Neural Networks for Scene Image Recognition -- A Classification Model of Power Equipment Defect Texts Based on Convolutional Neural Network.-Research on Artificial Intelligence Technology in Computer Network Technology -- Research on Detection Method of Unhealthy Message in Social Network -- Image Authentication by Single Target Region Detection -- Security Approaches and Crypto Algorithms in Mobile Cloud Storage Environment to Ensure Data Security -- Probe-Polling: A polling based MAC protocol for Energy Harvesting Wireless Sensor Networks -- An Dynamic Protocol for the Quantum Secure Multi-party Summation based on Commutative Encryption -- Optimal Resource Allocation for Energy Harvesting Cognitive Radio Network with Q Learning -- Facial Expression Recognition Based onComplete Local Binary Pattern and Convolutional Neural Network -- A Novel Malware Detection and Classification Method Based on Capsule Network -- Application of Gradient Boosting Decision Tree in Wind Turbine Drivetrain Recognition -- Implementation of MD5 Collision Attack in Program -- Automatic Discovery Mechanism of Blockchain Nodes Based on the Kademlia Algorithm -- Monochromatic Mutual Nearest Neighbor Queries over Uncertain Data -- Network-Embedding Based Storage Location Assignment in Mobile Rack Warehouse -- Efficient PatchMatch-based Image Registration and Retargeting for Cartoon Animation. Tipo de medio : Computadora Summary : The 4-volume set LNCS 11632 until LNCS 11635 constitutes the refereed proceedings of the 5th International Conference on Artificial Intelligence and Security, ICAIS 2019, which was held in New York, USA, in July 2019. The conference was formerly called "International Conference on Cloud Computing and Security" with the acronym ICCCS. The total of 230 full papers presented in this 4-volume proceedings was carefully reviewed and selected from 1529 submissions. The papers were organized in topical sections as follows: Part I: cloud computing; Part II: artificial intelligence; big data; and cloud computing and security; Part III: cloud computing and security; information hiding; IoT security; multimedia forensics; and encryption and cybersecurity; Part IV: encryption and cybersecurity. Enlace de acceso : https://link-springer-com.biblioproxy.umanizales.edu.co/referencework/10.1007/97 [...] Artificial Intelligence and Security : 5th International Conference, ICAIS 2019, New York, NY, USA, July 26-28, 2019, Proceedings, Part I [documento electrónico] / Sun, Xingming, ; Pan, Zhaoqing, ; Bertino, Elisa, . - 1 ed. . - [s.l.] : Springer, 2019 . - XVII, 655 p. 342 ilustraciones, 214 ilustraciones en color.
ISBN : 978-3-030-24274-9
Libro disponible en la plataforma SpringerLink. Descarga y lectura en formatos PDF, HTML y ePub. Descarga completa o por capítulos.
Idioma : Inglés (eng)
Palabras clave: Protección de datos Inteligencia artificial Red de computadoras Visión por computador Ordenador TecnologÃa de la información Seguridad de datos e información Redes de comunicación informática Aspectos Legales de la Computación Clasificación: 005.8 Ciencia de los computadores (Programación, programas de sistemas) Resumen: El conjunto de 4 volúmenes LNCS 11632 hasta LNCS 11635 constituye las actas arbitradas de la Quinta Conferencia Internacional sobre Inteligencia Artificial y Seguridad, ICAIS 2019, que se celebró en Nueva York, EE. UU., en julio de 2019. La conferencia se llamaba anteriormente "Conferencia Internacional sobre Computación y Seguridad en la Nube†con las siglas ICCCS. El total de 230 artÃculos completos presentados en estas actas de 4 volúmenes fue cuidadosamente revisado y seleccionado entre 1529 presentaciones. Los artÃculos se organizaron en secciones temáticas de la siguiente manera: Parte I: computación en la nube; Parte II: inteligencia artificial; grandes datos; y computación y seguridad en la nube; Parte III: computación en la nube y seguridad; ocultación de información; seguridad de la IoT; análisis forense multimedia; y cifrado y ciberseguridad; Parte IV: cifrado y ciberseguridad. Nota de contenido: Cloud Computing -- Fuzzy Clustering: A New Clustering Method in Heterogeneous Medical Records Searching -- NOAA-LSTM: A New Method of Dialect Identification -- Evaluation Method of Teachers' Teaching Ability Based on BP Neural Network -- Research on the Promotion of Tibetan New Words and Platform Design -- A Classification Model for Drug Addicts Based on Improved Random Forests Algorithm -- Studying L-Diversity and K-Anonymity over Datasets with Sensitive Fields -- Power System Transient Stability Prediction Algorithm Based on ReliefF and LSTM -- A No-pairing Proxy Re-Encryption Scheme for Data Sharing in Untrusted Cloud -- E-sports Ban/Pick Prediction Based On Bi-LSTM Meta Learning Network -- Bottlenecks and Feasible Solutions of Data Field Clustering in Impact Factor, Time Resolution, Selecting Core Objects and Merging Process -- Detection of Microblog Overlapping Community Based on Multidimensional Information and Edge Distance Matrix -- Research on Settlement Deformation of Asphalt PavementStructure in Soft Soil Zone Based on Pavement Settlement Theory -- Legal Case Inspection: An Analogy-based Approach to Judgment Evaluation -- A Novel Noise Filter Based on Multiple Voting -- Fuzzy Control Method for Path Tracking System of Combine Harvester -- Research on Opinion Spam Detection by Time Series Anomaly Detection -- Application of Machine Learning Methods for Material Classification with Multi-energy X-ray Transmission Images -- Intra-class Classification of Architectural Styles Using Visualization of CNN -- MSE-Net: Pedestrian Attribute Recognition using MLSC and SE-Blocks -- CBAM-GAN: Generative Adversarial Networks Based on Convolutional Block Attention Module -- A Novel Distributed Knowledge Reasoning Model -- Research on Detection Method Of Abnormal Traffic In SDN -- Research on Constructing Technology of Implicit Hierarchical Topic Network Based on FP-growth -- PPD-DL: Privacy-Preserving Decentralized Deep Learning -- Towards Edge Computing based Distributed Data Analytics Framework in Smart Grids -- Android Malware Identification Based on Traffic Analysis -- Unsupervised Traditional Chinese Medicine Text Segmentation Combined with Domain Dictionary -- Research on the Efficiency and Application of Ship- helicopter Cooperative Search -- Cellular Neural Network Based Contour Detection for Seismic Image -- Discovering New Sensitive Words Based on Sensitive Information Categorization -- A Dynamic Event Region Tracking Approach Based on Node Calibration -- A Graph Updating Method of Data Theft Detection Based on Rough Set -- A Tutorial of Graph Representation -- Ground-based Cloud Images Recognition Based on GAN and PCANet -- Sparse Representation-Based Radiomics in the Diagnosis of Thyroid Nodules -- Local Smoothing Constraint in Convolutional Neural Network for Image Denoising -- Perceptual Loss based Super-Resolution Reconstruction from Single Magnetic Resonance Imaging -- DWI Fiber Tracking with Functional MRI of White Matter -- Multi-objective Investment Decision Making Based on An Improved SPEA2 Algorithm -- Power Load Forecasting Based on Adaptive Deep Long Short-Term Memory Network -- Optimized White Matter Fiber Reconstruction Using Combination of Diffusion and Functional MRI -- Convolutional Neural Networks for Scene Image Recognition -- A Classification Model of Power Equipment Defect Texts Based on Convolutional Neural Network.-Research on Artificial Intelligence Technology in Computer Network Technology -- Research on Detection Method of Unhealthy Message in Social Network -- Image Authentication by Single Target Region Detection -- Security Approaches and Crypto Algorithms in Mobile Cloud Storage Environment to Ensure Data Security -- Probe-Polling: A polling based MAC protocol for Energy Harvesting Wireless Sensor Networks -- An Dynamic Protocol for the Quantum Secure Multi-party Summation based on Commutative Encryption -- Optimal Resource Allocation for Energy Harvesting Cognitive Radio Network with Q Learning -- Facial Expression Recognition Based onComplete Local Binary Pattern and Convolutional Neural Network -- A Novel Malware Detection and Classification Method Based on Capsule Network -- Application of Gradient Boosting Decision Tree in Wind Turbine Drivetrain Recognition -- Implementation of MD5 Collision Attack in Program -- Automatic Discovery Mechanism of Blockchain Nodes Based on the Kademlia Algorithm -- Monochromatic Mutual Nearest Neighbor Queries over Uncertain Data -- Network-Embedding Based Storage Location Assignment in Mobile Rack Warehouse -- Efficient PatchMatch-based Image Registration and Retargeting for Cartoon Animation. Tipo de medio : Computadora Summary : The 4-volume set LNCS 11632 until LNCS 11635 constitutes the refereed proceedings of the 5th International Conference on Artificial Intelligence and Security, ICAIS 2019, which was held in New York, USA, in July 2019. The conference was formerly called "International Conference on Cloud Computing and Security" with the acronym ICCCS. The total of 230 full papers presented in this 4-volume proceedings was carefully reviewed and selected from 1529 submissions. The papers were organized in topical sections as follows: Part I: cloud computing; Part II: artificial intelligence; big data; and cloud computing and security; Part III: cloud computing and security; information hiding; IoT security; multimedia forensics; and encryption and cybersecurity; Part IV: encryption and cybersecurity. Enlace de acceso : https://link-springer-com.biblioproxy.umanizales.edu.co/referencework/10.1007/97 [...]
TÃtulo : Artificial Intelligence and Security : 5th International Conference, ICAIS 2019, New York, NY, USA, July 26-28, 2019, Proceedings, Part II Tipo de documento: documento electrónico Autores: Sun, Xingming, ; Pan, Zhaoqing, ; Bertino, Elisa, Mención de edición: 1 ed. Editorial: [s.l.] : Springer Fecha de publicación: 2019 Número de páginas: XVII, 665 p. 375 ilustraciones, 189 ilustraciones en color. ISBN/ISSN/DL: 978-3-030-24265-7 Nota general: Libro disponible en la plataforma SpringerLink. Descarga y lectura en formatos PDF, HTML y ePub. Descarga completa o por capítulos. Idioma : Inglés (eng) Palabras clave: Protección de datos Inteligencia artificial IngenierÃa Informática Red de computadoras Software de la aplicacion Visión por computador Algoritmos Seguridad de datos e información IngenierÃa Informática y Redes Aplicaciones informáticas y de sistemas de información Clasificación: 005.8 Ciencia de los computadores (Programación, programas de sistemas) Resumen: El conjunto de 4 volúmenes LNCS 11632 hasta LNCS 11635 constituye las actas arbitradas de la Quinta Conferencia Internacional sobre Inteligencia Artificial y Seguridad, ICAIS 2019, que se celebró en Nueva York, EE. UU., en julio de 2019. La conferencia se llamaba anteriormente "Conferencia Internacional sobre Computación y Seguridad en la Nube†con las siglas ICCCS. El total de 230 artÃculos completos presentados en estas actas de 4 volúmenes fue cuidadosamente revisado y seleccionado entre 1529 presentaciones. Los artÃculos se organizaron en secciones temáticas de la siguiente manera: Parte I: computación en la nube; Parte II: inteligencia artificial; grandes datos; y computación y seguridad en la nube; Parte III: computación en la nube y seguridad; ocultación de información; seguridad de la IoT; análisis forense multimedia; y cifrado y ciberseguridad; Parte IV: cifrado y ciberseguridad. Nota de contenido: Artificial Intelligence -- CCNET: Cascading Convolutions for Cardiac Segmentation -- A Deep Belief Networks Based Prediction Method for Identification of Disease-associated Non-coding SNPs in Human Genome -- On Human-like Performance Artificial Intelligence – A Demonstration Using an Atari Game -- Implementation of Multiplicative Seasonal ARIMA modeling and Flood Prediction based on Long-Term Time Series Data in Indonesia -- Improved Bayesian Method with Collision Recovery for RFID Anti-Collision -- Multi-step Attack Scenarios Mining Based on Neural Network and Bayesian Network Attack Graph -- A Comparative Study of Machine Learning Classifiers for Network Intrusion Detection -- On True Language Understanding -- The l2,1-Norm Stacked Robust Autoencoders via Adaptation Regularization for Domain Adaptation -- Molecular Dynamics Simulation Optimization Based on GROMACS on Sunway TaihuLight -- A Review of Network Representation Learning -- A Two-stage Deep Neural Network for Sequence Labeling -- Reinforcement Learning based Content Push Policy for HetNets with Energy Harvesting Small Cells -- A Comparative Research on Open Source Edge Computing Systems -- Weather Forecasting Using Artificial Neural Network -- A New Quantitative Evaluation Method for Fuzzing -- Classification of ECG Arrhythmia Using CNN, SVM and LDA -- Discrete Similarity Preserving Hashing for Cross-Modal Retrieval -- Classification of Vitiligo Based on Convolutional Neural Network -- Big Data -- Multi-scale and Hierarchical Embedding for Polarity Shift Sensitive Sentiment Classification -- Trade-off between Energy Consumption and Makespan in the Mapreduce Resource Allocation Problem -- FSampleJoin: A Fixed-sample-based Method for String Similarity Joins using MapReduce -- Mass Diffusion Recommendation Algorithm Based on Multi-Subnet Composited Complex Network Model -- Optimizing Word Embedding for Fine-grained Sentiment Analysis -- A Sentiment Classification Model Based on Multiple Multi-classifier Systems -- Task SchedulingAlgorithm based on Campus Cloud Platform -- Automatic Self-feedback for the Studying effect of MOOC Based on Support Vector Machine -- Prediction on Payment Volume from Customer Service Electricity Channel -- Delay-Tolerant Rendezvous-based Data collection for Target Tracking in Large-Scale Wireless Sensor Networks with UGV -- Energy-Efficient Data-Collection with Rendezvous-Based Approaches in Large-Scale WSNs with multi-UGV -- Analysis of the Efficiency-Energy with Regression and Classification in Household using K-NN 354 -- Probe Recommendation Algorithm for Link Delay Detection -- Recommendation with Heterogeneous Information Networks Based on Meta-Graph -- A GA-optimized Weighted Mixed Kernel Function of SVM Based on Information Entropy -- Modeling and Simulation of Network Public Opinion Propagation Model Based on Interest Matching in Social Network -- Power Consumption and Coverage Test of NB-IoT in the Substation Edge Computing Environment -- Research on the Optimizationof Spark Big Table Equal Join -- Gait Recognition based on spatial-temporal information -- Research on Load Balancing Algorithm Optimization Based on Spark Platform -- A System for Calculating the Amount of Motion Based on 3D Pose Estimation -- Design of Security Portrait Big Data Application System -- Urban traffic flow forecast based on ST-SEResNet -- A Novel Power System Anomaly Data Identification Method Based on Neural Network and Affine Propagation -- Input-Output Analysis of Chinese National Agricultural Science and Technology Park -- A Power Grid Operations Monitoring Platform Based on Big Data Technology -- An Efficient Social-Aware Routing Strategy in Mobile Social Networks -- Cloud Computing and Security -- Improvement of Differential Fault Attack Based on Lightweight Ciphers with GFN Structure -- Cloud Management Systems - Load Balancing Algorithms and VDI Implementation Techniques -- When Side Channel becomes Good: Kernel Malware Attack Investigation -- Robust Encrypted Watermarking for Medical Images Based on DWT-DCT and Tent Mapping in Encrypted Domain -- An Analysis of A Three-Factor Authentication Scheme and Its Improved Fix -- A Novel Content Based Image Retrieval Scheme in Cloud Computing -- Mobile Image Retrieval System for Cloud Service Based on Convolutional Neural Network and Hadoop -- Formal Specification of Concurrent Enforcement Ucon Model with CTL Logic -- Design of Real-Time Resource-Aware Network Resource Allocation Mechanism Under SDN Background -- RSCM: A Reliability-Aware Service Chain Mapping. Tipo de medio : Computadora Summary : The 4-volume set LNCS 11632 until LNCS 11635 constitutes the refereed proceedings of the 5th International Conference on Artificial Intelligence and Security, ICAIS 2019, which was held in New York, USA, in July 2019. The conference was formerly called "International Conference on Cloud Computing and Security" with the acronym ICCCS. The total of 230 full papers presented in this 4-volume proceedings was carefully reviewed and selected from 1529 submissions. The papers were organized in topical sections as follows: Part I: cloud computing; Part II: artificial intelligence; big data; and cloud computing and security; Part III: cloud computing and security; information hiding; IoT security; multimedia forensics; and encryption and cybersecurity; Part IV: encryption and cybersecurity. Enlace de acceso : https://link-springer-com.biblioproxy.umanizales.edu.co/referencework/10.1007/97 [...] Artificial Intelligence and Security : 5th International Conference, ICAIS 2019, New York, NY, USA, July 26-28, 2019, Proceedings, Part II [documento electrónico] / Sun, Xingming, ; Pan, Zhaoqing, ; Bertino, Elisa, . - 1 ed. . - [s.l.] : Springer, 2019 . - XVII, 665 p. 375 ilustraciones, 189 ilustraciones en color.
ISBN : 978-3-030-24265-7
Libro disponible en la plataforma SpringerLink. Descarga y lectura en formatos PDF, HTML y ePub. Descarga completa o por capítulos.
Idioma : Inglés (eng)
Palabras clave: Protección de datos Inteligencia artificial IngenierÃa Informática Red de computadoras Software de la aplicacion Visión por computador Algoritmos Seguridad de datos e información IngenierÃa Informática y Redes Aplicaciones informáticas y de sistemas de información Clasificación: 005.8 Ciencia de los computadores (Programación, programas de sistemas) Resumen: El conjunto de 4 volúmenes LNCS 11632 hasta LNCS 11635 constituye las actas arbitradas de la Quinta Conferencia Internacional sobre Inteligencia Artificial y Seguridad, ICAIS 2019, que se celebró en Nueva York, EE. UU., en julio de 2019. La conferencia se llamaba anteriormente "Conferencia Internacional sobre Computación y Seguridad en la Nube†con las siglas ICCCS. El total de 230 artÃculos completos presentados en estas actas de 4 volúmenes fue cuidadosamente revisado y seleccionado entre 1529 presentaciones. Los artÃculos se organizaron en secciones temáticas de la siguiente manera: Parte I: computación en la nube; Parte II: inteligencia artificial; grandes datos; y computación y seguridad en la nube; Parte III: computación en la nube y seguridad; ocultación de información; seguridad de la IoT; análisis forense multimedia; y cifrado y ciberseguridad; Parte IV: cifrado y ciberseguridad. Nota de contenido: Artificial Intelligence -- CCNET: Cascading Convolutions for Cardiac Segmentation -- A Deep Belief Networks Based Prediction Method for Identification of Disease-associated Non-coding SNPs in Human Genome -- On Human-like Performance Artificial Intelligence – A Demonstration Using an Atari Game -- Implementation of Multiplicative Seasonal ARIMA modeling and Flood Prediction based on Long-Term Time Series Data in Indonesia -- Improved Bayesian Method with Collision Recovery for RFID Anti-Collision -- Multi-step Attack Scenarios Mining Based on Neural Network and Bayesian Network Attack Graph -- A Comparative Study of Machine Learning Classifiers for Network Intrusion Detection -- On True Language Understanding -- The l2,1-Norm Stacked Robust Autoencoders via Adaptation Regularization for Domain Adaptation -- Molecular Dynamics Simulation Optimization Based on GROMACS on Sunway TaihuLight -- A Review of Network Representation Learning -- A Two-stage Deep Neural Network for Sequence Labeling -- Reinforcement Learning based Content Push Policy for HetNets with Energy Harvesting Small Cells -- A Comparative Research on Open Source Edge Computing Systems -- Weather Forecasting Using Artificial Neural Network -- A New Quantitative Evaluation Method for Fuzzing -- Classification of ECG Arrhythmia Using CNN, SVM and LDA -- Discrete Similarity Preserving Hashing for Cross-Modal Retrieval -- Classification of Vitiligo Based on Convolutional Neural Network -- Big Data -- Multi-scale and Hierarchical Embedding for Polarity Shift Sensitive Sentiment Classification -- Trade-off between Energy Consumption and Makespan in the Mapreduce Resource Allocation Problem -- FSampleJoin: A Fixed-sample-based Method for String Similarity Joins using MapReduce -- Mass Diffusion Recommendation Algorithm Based on Multi-Subnet Composited Complex Network Model -- Optimizing Word Embedding for Fine-grained Sentiment Analysis -- A Sentiment Classification Model Based on Multiple Multi-classifier Systems -- Task SchedulingAlgorithm based on Campus Cloud Platform -- Automatic Self-feedback for the Studying effect of MOOC Based on Support Vector Machine -- Prediction on Payment Volume from Customer Service Electricity Channel -- Delay-Tolerant Rendezvous-based Data collection for Target Tracking in Large-Scale Wireless Sensor Networks with UGV -- Energy-Efficient Data-Collection with Rendezvous-Based Approaches in Large-Scale WSNs with multi-UGV -- Analysis of the Efficiency-Energy with Regression and Classification in Household using K-NN 354 -- Probe Recommendation Algorithm for Link Delay Detection -- Recommendation with Heterogeneous Information Networks Based on Meta-Graph -- A GA-optimized Weighted Mixed Kernel Function of SVM Based on Information Entropy -- Modeling and Simulation of Network Public Opinion Propagation Model Based on Interest Matching in Social Network -- Power Consumption and Coverage Test of NB-IoT in the Substation Edge Computing Environment -- Research on the Optimizationof Spark Big Table Equal Join -- Gait Recognition based on spatial-temporal information -- Research on Load Balancing Algorithm Optimization Based on Spark Platform -- A System for Calculating the Amount of Motion Based on 3D Pose Estimation -- Design of Security Portrait Big Data Application System -- Urban traffic flow forecast based on ST-SEResNet -- A Novel Power System Anomaly Data Identification Method Based on Neural Network and Affine Propagation -- Input-Output Analysis of Chinese National Agricultural Science and Technology Park -- A Power Grid Operations Monitoring Platform Based on Big Data Technology -- An Efficient Social-Aware Routing Strategy in Mobile Social Networks -- Cloud Computing and Security -- Improvement of Differential Fault Attack Based on Lightweight Ciphers with GFN Structure -- Cloud Management Systems - Load Balancing Algorithms and VDI Implementation Techniques -- When Side Channel becomes Good: Kernel Malware Attack Investigation -- Robust Encrypted Watermarking for Medical Images Based on DWT-DCT and Tent Mapping in Encrypted Domain -- An Analysis of A Three-Factor Authentication Scheme and Its Improved Fix -- A Novel Content Based Image Retrieval Scheme in Cloud Computing -- Mobile Image Retrieval System for Cloud Service Based on Convolutional Neural Network and Hadoop -- Formal Specification of Concurrent Enforcement Ucon Model with CTL Logic -- Design of Real-Time Resource-Aware Network Resource Allocation Mechanism Under SDN Background -- RSCM: A Reliability-Aware Service Chain Mapping. Tipo de medio : Computadora Summary : The 4-volume set LNCS 11632 until LNCS 11635 constitutes the refereed proceedings of the 5th International Conference on Artificial Intelligence and Security, ICAIS 2019, which was held in New York, USA, in July 2019. The conference was formerly called "International Conference on Cloud Computing and Security" with the acronym ICCCS. The total of 230 full papers presented in this 4-volume proceedings was carefully reviewed and selected from 1529 submissions. The papers were organized in topical sections as follows: Part I: cloud computing; Part II: artificial intelligence; big data; and cloud computing and security; Part III: cloud computing and security; information hiding; IoT security; multimedia forensics; and encryption and cybersecurity; Part IV: encryption and cybersecurity. Enlace de acceso : https://link-springer-com.biblioproxy.umanizales.edu.co/referencework/10.1007/97 [...] PermalinkPermalinkPermalinkPermalinkPermalinkPermalinkPermalinkArtificial Intelligence and Security / Sun, Xingming ; Zhang, Xiaorui ; Xia, Zhihua ; Bertino, Elisa
PermalinkArtificial Intelligence and Security / Sun, Xingming ; Zhang, Xiaorui ; Xia, Zhihua ; Bertino, Elisa
PermalinkPermalink