Información del autor
Autor Pan, Zhaoqing |
Documentos disponibles escritos por este autor (10)
Crear una solicitud de compra Refinar búsqueda
TÃtulo : Artificial Intelligence and Security : 5th International Conference, ICAIS 2019, New York, NY, USA, July 26-28, 2019, Proceedings, Part I Tipo de documento: documento electrónico Autores: Sun, Xingming, ; Pan, Zhaoqing, ; Bertino, Elisa, Mención de edición: 1 ed. Editorial: [s.l.] : Springer Fecha de publicación: 2019 Número de páginas: XVII, 655 p. 342 ilustraciones, 214 ilustraciones en color. ISBN/ISSN/DL: 978-3-030-24274-9 Nota general: Libro disponible en la plataforma SpringerLink. Descarga y lectura en formatos PDF, HTML y ePub. Descarga completa o por capítulos. Idioma : Inglés (eng) Palabras clave: Protección de datos Inteligencia artificial Red de computadoras Visión por computador Ordenador TecnologÃa de la información Seguridad de datos e información Redes de comunicación informática Aspectos Legales de la Computación Clasificación: 005.8 Ciencia de los computadores (Programación, programas de sistemas) Resumen: El conjunto de 4 volúmenes LNCS 11632 hasta LNCS 11635 constituye las actas arbitradas de la Quinta Conferencia Internacional sobre Inteligencia Artificial y Seguridad, ICAIS 2019, que se celebró en Nueva York, EE. UU., en julio de 2019. La conferencia se llamaba anteriormente "Conferencia Internacional sobre Computación y Seguridad en la Nube†con las siglas ICCCS. El total de 230 artÃculos completos presentados en estas actas de 4 volúmenes fue cuidadosamente revisado y seleccionado entre 1529 presentaciones. Los artÃculos se organizaron en secciones temáticas de la siguiente manera: Parte I: computación en la nube; Parte II: inteligencia artificial; grandes datos; y computación y seguridad en la nube; Parte III: computación en la nube y seguridad; ocultación de información; seguridad de la IoT; análisis forense multimedia; y cifrado y ciberseguridad; Parte IV: cifrado y ciberseguridad. Nota de contenido: Cloud Computing -- Fuzzy Clustering: A New Clustering Method in Heterogeneous Medical Records Searching -- NOAA-LSTM: A New Method of Dialect Identification -- Evaluation Method of Teachers' Teaching Ability Based on BP Neural Network -- Research on the Promotion of Tibetan New Words and Platform Design -- A Classification Model for Drug Addicts Based on Improved Random Forests Algorithm -- Studying L-Diversity and K-Anonymity over Datasets with Sensitive Fields -- Power System Transient Stability Prediction Algorithm Based on ReliefF and LSTM -- A No-pairing Proxy Re-Encryption Scheme for Data Sharing in Untrusted Cloud -- E-sports Ban/Pick Prediction Based On Bi-LSTM Meta Learning Network -- Bottlenecks and Feasible Solutions of Data Field Clustering in Impact Factor, Time Resolution, Selecting Core Objects and Merging Process -- Detection of Microblog Overlapping Community Based on Multidimensional Information and Edge Distance Matrix -- Research on Settlement Deformation of Asphalt PavementStructure in Soft Soil Zone Based on Pavement Settlement Theory -- Legal Case Inspection: An Analogy-based Approach to Judgment Evaluation -- A Novel Noise Filter Based on Multiple Voting -- Fuzzy Control Method for Path Tracking System of Combine Harvester -- Research on Opinion Spam Detection by Time Series Anomaly Detection -- Application of Machine Learning Methods for Material Classification with Multi-energy X-ray Transmission Images -- Intra-class Classification of Architectural Styles Using Visualization of CNN -- MSE-Net: Pedestrian Attribute Recognition using MLSC and SE-Blocks -- CBAM-GAN: Generative Adversarial Networks Based on Convolutional Block Attention Module -- A Novel Distributed Knowledge Reasoning Model -- Research on Detection Method Of Abnormal Traffic In SDN -- Research on Constructing Technology of Implicit Hierarchical Topic Network Based on FP-growth -- PPD-DL: Privacy-Preserving Decentralized Deep Learning -- Towards Edge Computing based Distributed Data Analytics Framework in Smart Grids -- Android Malware Identification Based on Traffic Analysis -- Unsupervised Traditional Chinese Medicine Text Segmentation Combined with Domain Dictionary -- Research on the Efficiency and Application of Ship- helicopter Cooperative Search -- Cellular Neural Network Based Contour Detection for Seismic Image -- Discovering New Sensitive Words Based on Sensitive Information Categorization -- A Dynamic Event Region Tracking Approach Based on Node Calibration -- A Graph Updating Method of Data Theft Detection Based on Rough Set -- A Tutorial of Graph Representation -- Ground-based Cloud Images Recognition Based on GAN and PCANet -- Sparse Representation-Based Radiomics in the Diagnosis of Thyroid Nodules -- Local Smoothing Constraint in Convolutional Neural Network for Image Denoising -- Perceptual Loss based Super-Resolution Reconstruction from Single Magnetic Resonance Imaging -- DWI Fiber Tracking with Functional MRI of White Matter -- Multi-objective Investment Decision Making Based on An Improved SPEA2 Algorithm -- Power Load Forecasting Based on Adaptive Deep Long Short-Term Memory Network -- Optimized White Matter Fiber Reconstruction Using Combination of Diffusion and Functional MRI -- Convolutional Neural Networks for Scene Image Recognition -- A Classification Model of Power Equipment Defect Texts Based on Convolutional Neural Network.-Research on Artificial Intelligence Technology in Computer Network Technology -- Research on Detection Method of Unhealthy Message in Social Network -- Image Authentication by Single Target Region Detection -- Security Approaches and Crypto Algorithms in Mobile Cloud Storage Environment to Ensure Data Security -- Probe-Polling: A polling based MAC protocol for Energy Harvesting Wireless Sensor Networks -- An Dynamic Protocol for the Quantum Secure Multi-party Summation based on Commutative Encryption -- Optimal Resource Allocation for Energy Harvesting Cognitive Radio Network with Q Learning -- Facial Expression Recognition Based onComplete Local Binary Pattern and Convolutional Neural Network -- A Novel Malware Detection and Classification Method Based on Capsule Network -- Application of Gradient Boosting Decision Tree in Wind Turbine Drivetrain Recognition -- Implementation of MD5 Collision Attack in Program -- Automatic Discovery Mechanism of Blockchain Nodes Based on the Kademlia Algorithm -- Monochromatic Mutual Nearest Neighbor Queries over Uncertain Data -- Network-Embedding Based Storage Location Assignment in Mobile Rack Warehouse -- Efficient PatchMatch-based Image Registration and Retargeting for Cartoon Animation. Tipo de medio : Computadora Summary : The 4-volume set LNCS 11632 until LNCS 11635 constitutes the refereed proceedings of the 5th International Conference on Artificial Intelligence and Security, ICAIS 2019, which was held in New York, USA, in July 2019. The conference was formerly called "International Conference on Cloud Computing and Security" with the acronym ICCCS. The total of 230 full papers presented in this 4-volume proceedings was carefully reviewed and selected from 1529 submissions. The papers were organized in topical sections as follows: Part I: cloud computing; Part II: artificial intelligence; big data; and cloud computing and security; Part III: cloud computing and security; information hiding; IoT security; multimedia forensics; and encryption and cybersecurity; Part IV: encryption and cybersecurity. Enlace de acceso : https://link-springer-com.biblioproxy.umanizales.edu.co/referencework/10.1007/97 [...] Artificial Intelligence and Security : 5th International Conference, ICAIS 2019, New York, NY, USA, July 26-28, 2019, Proceedings, Part I [documento electrónico] / Sun, Xingming, ; Pan, Zhaoqing, ; Bertino, Elisa, . - 1 ed. . - [s.l.] : Springer, 2019 . - XVII, 655 p. 342 ilustraciones, 214 ilustraciones en color.
ISBN : 978-3-030-24274-9
Libro disponible en la plataforma SpringerLink. Descarga y lectura en formatos PDF, HTML y ePub. Descarga completa o por capítulos.
Idioma : Inglés (eng)
Palabras clave: Protección de datos Inteligencia artificial Red de computadoras Visión por computador Ordenador TecnologÃa de la información Seguridad de datos e información Redes de comunicación informática Aspectos Legales de la Computación Clasificación: 005.8 Ciencia de los computadores (Programación, programas de sistemas) Resumen: El conjunto de 4 volúmenes LNCS 11632 hasta LNCS 11635 constituye las actas arbitradas de la Quinta Conferencia Internacional sobre Inteligencia Artificial y Seguridad, ICAIS 2019, que se celebró en Nueva York, EE. UU., en julio de 2019. La conferencia se llamaba anteriormente "Conferencia Internacional sobre Computación y Seguridad en la Nube†con las siglas ICCCS. El total de 230 artÃculos completos presentados en estas actas de 4 volúmenes fue cuidadosamente revisado y seleccionado entre 1529 presentaciones. Los artÃculos se organizaron en secciones temáticas de la siguiente manera: Parte I: computación en la nube; Parte II: inteligencia artificial; grandes datos; y computación y seguridad en la nube; Parte III: computación en la nube y seguridad; ocultación de información; seguridad de la IoT; análisis forense multimedia; y cifrado y ciberseguridad; Parte IV: cifrado y ciberseguridad. Nota de contenido: Cloud Computing -- Fuzzy Clustering: A New Clustering Method in Heterogeneous Medical Records Searching -- NOAA-LSTM: A New Method of Dialect Identification -- Evaluation Method of Teachers' Teaching Ability Based on BP Neural Network -- Research on the Promotion of Tibetan New Words and Platform Design -- A Classification Model for Drug Addicts Based on Improved Random Forests Algorithm -- Studying L-Diversity and K-Anonymity over Datasets with Sensitive Fields -- Power System Transient Stability Prediction Algorithm Based on ReliefF and LSTM -- A No-pairing Proxy Re-Encryption Scheme for Data Sharing in Untrusted Cloud -- E-sports Ban/Pick Prediction Based On Bi-LSTM Meta Learning Network -- Bottlenecks and Feasible Solutions of Data Field Clustering in Impact Factor, Time Resolution, Selecting Core Objects and Merging Process -- Detection of Microblog Overlapping Community Based on Multidimensional Information and Edge Distance Matrix -- Research on Settlement Deformation of Asphalt PavementStructure in Soft Soil Zone Based on Pavement Settlement Theory -- Legal Case Inspection: An Analogy-based Approach to Judgment Evaluation -- A Novel Noise Filter Based on Multiple Voting -- Fuzzy Control Method for Path Tracking System of Combine Harvester -- Research on Opinion Spam Detection by Time Series Anomaly Detection -- Application of Machine Learning Methods for Material Classification with Multi-energy X-ray Transmission Images -- Intra-class Classification of Architectural Styles Using Visualization of CNN -- MSE-Net: Pedestrian Attribute Recognition using MLSC and SE-Blocks -- CBAM-GAN: Generative Adversarial Networks Based on Convolutional Block Attention Module -- A Novel Distributed Knowledge Reasoning Model -- Research on Detection Method Of Abnormal Traffic In SDN -- Research on Constructing Technology of Implicit Hierarchical Topic Network Based on FP-growth -- PPD-DL: Privacy-Preserving Decentralized Deep Learning -- Towards Edge Computing based Distributed Data Analytics Framework in Smart Grids -- Android Malware Identification Based on Traffic Analysis -- Unsupervised Traditional Chinese Medicine Text Segmentation Combined with Domain Dictionary -- Research on the Efficiency and Application of Ship- helicopter Cooperative Search -- Cellular Neural Network Based Contour Detection for Seismic Image -- Discovering New Sensitive Words Based on Sensitive Information Categorization -- A Dynamic Event Region Tracking Approach Based on Node Calibration -- A Graph Updating Method of Data Theft Detection Based on Rough Set -- A Tutorial of Graph Representation -- Ground-based Cloud Images Recognition Based on GAN and PCANet -- Sparse Representation-Based Radiomics in the Diagnosis of Thyroid Nodules -- Local Smoothing Constraint in Convolutional Neural Network for Image Denoising -- Perceptual Loss based Super-Resolution Reconstruction from Single Magnetic Resonance Imaging -- DWI Fiber Tracking with Functional MRI of White Matter -- Multi-objective Investment Decision Making Based on An Improved SPEA2 Algorithm -- Power Load Forecasting Based on Adaptive Deep Long Short-Term Memory Network -- Optimized White Matter Fiber Reconstruction Using Combination of Diffusion and Functional MRI -- Convolutional Neural Networks for Scene Image Recognition -- A Classification Model of Power Equipment Defect Texts Based on Convolutional Neural Network.-Research on Artificial Intelligence Technology in Computer Network Technology -- Research on Detection Method of Unhealthy Message in Social Network -- Image Authentication by Single Target Region Detection -- Security Approaches and Crypto Algorithms in Mobile Cloud Storage Environment to Ensure Data Security -- Probe-Polling: A polling based MAC protocol for Energy Harvesting Wireless Sensor Networks -- An Dynamic Protocol for the Quantum Secure Multi-party Summation based on Commutative Encryption -- Optimal Resource Allocation for Energy Harvesting Cognitive Radio Network with Q Learning -- Facial Expression Recognition Based onComplete Local Binary Pattern and Convolutional Neural Network -- A Novel Malware Detection and Classification Method Based on Capsule Network -- Application of Gradient Boosting Decision Tree in Wind Turbine Drivetrain Recognition -- Implementation of MD5 Collision Attack in Program -- Automatic Discovery Mechanism of Blockchain Nodes Based on the Kademlia Algorithm -- Monochromatic Mutual Nearest Neighbor Queries over Uncertain Data -- Network-Embedding Based Storage Location Assignment in Mobile Rack Warehouse -- Efficient PatchMatch-based Image Registration and Retargeting for Cartoon Animation. Tipo de medio : Computadora Summary : The 4-volume set LNCS 11632 until LNCS 11635 constitutes the refereed proceedings of the 5th International Conference on Artificial Intelligence and Security, ICAIS 2019, which was held in New York, USA, in July 2019. The conference was formerly called "International Conference on Cloud Computing and Security" with the acronym ICCCS. The total of 230 full papers presented in this 4-volume proceedings was carefully reviewed and selected from 1529 submissions. The papers were organized in topical sections as follows: Part I: cloud computing; Part II: artificial intelligence; big data; and cloud computing and security; Part III: cloud computing and security; information hiding; IoT security; multimedia forensics; and encryption and cybersecurity; Part IV: encryption and cybersecurity. Enlace de acceso : https://link-springer-com.biblioproxy.umanizales.edu.co/referencework/10.1007/97 [...]
TÃtulo : Artificial Intelligence and Security : 5th International Conference, ICAIS 2019, New York, NY, USA, July 26-28, 2019, Proceedings, Part II Tipo de documento: documento electrónico Autores: Sun, Xingming, ; Pan, Zhaoqing, ; Bertino, Elisa, Mención de edición: 1 ed. Editorial: [s.l.] : Springer Fecha de publicación: 2019 Número de páginas: XVII, 665 p. 375 ilustraciones, 189 ilustraciones en color. ISBN/ISSN/DL: 978-3-030-24265-7 Nota general: Libro disponible en la plataforma SpringerLink. Descarga y lectura en formatos PDF, HTML y ePub. Descarga completa o por capítulos. Idioma : Inglés (eng) Palabras clave: Protección de datos Inteligencia artificial IngenierÃa Informática Red de computadoras Software de la aplicacion Visión por computador Algoritmos Seguridad de datos e información IngenierÃa Informática y Redes Aplicaciones informáticas y de sistemas de información Clasificación: 005.8 Ciencia de los computadores (Programación, programas de sistemas) Resumen: El conjunto de 4 volúmenes LNCS 11632 hasta LNCS 11635 constituye las actas arbitradas de la Quinta Conferencia Internacional sobre Inteligencia Artificial y Seguridad, ICAIS 2019, que se celebró en Nueva York, EE. UU., en julio de 2019. La conferencia se llamaba anteriormente "Conferencia Internacional sobre Computación y Seguridad en la Nube†con las siglas ICCCS. El total de 230 artÃculos completos presentados en estas actas de 4 volúmenes fue cuidadosamente revisado y seleccionado entre 1529 presentaciones. Los artÃculos se organizaron en secciones temáticas de la siguiente manera: Parte I: computación en la nube; Parte II: inteligencia artificial; grandes datos; y computación y seguridad en la nube; Parte III: computación en la nube y seguridad; ocultación de información; seguridad de la IoT; análisis forense multimedia; y cifrado y ciberseguridad; Parte IV: cifrado y ciberseguridad. Nota de contenido: Artificial Intelligence -- CCNET: Cascading Convolutions for Cardiac Segmentation -- A Deep Belief Networks Based Prediction Method for Identification of Disease-associated Non-coding SNPs in Human Genome -- On Human-like Performance Artificial Intelligence – A Demonstration Using an Atari Game -- Implementation of Multiplicative Seasonal ARIMA modeling and Flood Prediction based on Long-Term Time Series Data in Indonesia -- Improved Bayesian Method with Collision Recovery for RFID Anti-Collision -- Multi-step Attack Scenarios Mining Based on Neural Network and Bayesian Network Attack Graph -- A Comparative Study of Machine Learning Classifiers for Network Intrusion Detection -- On True Language Understanding -- The l2,1-Norm Stacked Robust Autoencoders via Adaptation Regularization for Domain Adaptation -- Molecular Dynamics Simulation Optimization Based on GROMACS on Sunway TaihuLight -- A Review of Network Representation Learning -- A Two-stage Deep Neural Network for Sequence Labeling -- Reinforcement Learning based Content Push Policy for HetNets with Energy Harvesting Small Cells -- A Comparative Research on Open Source Edge Computing Systems -- Weather Forecasting Using Artificial Neural Network -- A New Quantitative Evaluation Method for Fuzzing -- Classification of ECG Arrhythmia Using CNN, SVM and LDA -- Discrete Similarity Preserving Hashing for Cross-Modal Retrieval -- Classification of Vitiligo Based on Convolutional Neural Network -- Big Data -- Multi-scale and Hierarchical Embedding for Polarity Shift Sensitive Sentiment Classification -- Trade-off between Energy Consumption and Makespan in the Mapreduce Resource Allocation Problem -- FSampleJoin: A Fixed-sample-based Method for String Similarity Joins using MapReduce -- Mass Diffusion Recommendation Algorithm Based on Multi-Subnet Composited Complex Network Model -- Optimizing Word Embedding for Fine-grained Sentiment Analysis -- A Sentiment Classification Model Based on Multiple Multi-classifier Systems -- Task SchedulingAlgorithm based on Campus Cloud Platform -- Automatic Self-feedback for the Studying effect of MOOC Based on Support Vector Machine -- Prediction on Payment Volume from Customer Service Electricity Channel -- Delay-Tolerant Rendezvous-based Data collection for Target Tracking in Large-Scale Wireless Sensor Networks with UGV -- Energy-Efficient Data-Collection with Rendezvous-Based Approaches in Large-Scale WSNs with multi-UGV -- Analysis of the Efficiency-Energy with Regression and Classification in Household using K-NN 354 -- Probe Recommendation Algorithm for Link Delay Detection -- Recommendation with Heterogeneous Information Networks Based on Meta-Graph -- A GA-optimized Weighted Mixed Kernel Function of SVM Based on Information Entropy -- Modeling and Simulation of Network Public Opinion Propagation Model Based on Interest Matching in Social Network -- Power Consumption and Coverage Test of NB-IoT in the Substation Edge Computing Environment -- Research on the Optimizationof Spark Big Table Equal Join -- Gait Recognition based on spatial-temporal information -- Research on Load Balancing Algorithm Optimization Based on Spark Platform -- A System for Calculating the Amount of Motion Based on 3D Pose Estimation -- Design of Security Portrait Big Data Application System -- Urban traffic flow forecast based on ST-SEResNet -- A Novel Power System Anomaly Data Identification Method Based on Neural Network and Affine Propagation -- Input-Output Analysis of Chinese National Agricultural Science and Technology Park -- A Power Grid Operations Monitoring Platform Based on Big Data Technology -- An Efficient Social-Aware Routing Strategy in Mobile Social Networks -- Cloud Computing and Security -- Improvement of Differential Fault Attack Based on Lightweight Ciphers with GFN Structure -- Cloud Management Systems - Load Balancing Algorithms and VDI Implementation Techniques -- When Side Channel becomes Good: Kernel Malware Attack Investigation -- Robust Encrypted Watermarking for Medical Images Based on DWT-DCT and Tent Mapping in Encrypted Domain -- An Analysis of A Three-Factor Authentication Scheme and Its Improved Fix -- A Novel Content Based Image Retrieval Scheme in Cloud Computing -- Mobile Image Retrieval System for Cloud Service Based on Convolutional Neural Network and Hadoop -- Formal Specification of Concurrent Enforcement Ucon Model with CTL Logic -- Design of Real-Time Resource-Aware Network Resource Allocation Mechanism Under SDN Background -- RSCM: A Reliability-Aware Service Chain Mapping. Tipo de medio : Computadora Summary : The 4-volume set LNCS 11632 until LNCS 11635 constitutes the refereed proceedings of the 5th International Conference on Artificial Intelligence and Security, ICAIS 2019, which was held in New York, USA, in July 2019. The conference was formerly called "International Conference on Cloud Computing and Security" with the acronym ICCCS. The total of 230 full papers presented in this 4-volume proceedings was carefully reviewed and selected from 1529 submissions. The papers were organized in topical sections as follows: Part I: cloud computing; Part II: artificial intelligence; big data; and cloud computing and security; Part III: cloud computing and security; information hiding; IoT security; multimedia forensics; and encryption and cybersecurity; Part IV: encryption and cybersecurity. Enlace de acceso : https://link-springer-com.biblioproxy.umanizales.edu.co/referencework/10.1007/97 [...] Artificial Intelligence and Security : 5th International Conference, ICAIS 2019, New York, NY, USA, July 26-28, 2019, Proceedings, Part II [documento electrónico] / Sun, Xingming, ; Pan, Zhaoqing, ; Bertino, Elisa, . - 1 ed. . - [s.l.] : Springer, 2019 . - XVII, 665 p. 375 ilustraciones, 189 ilustraciones en color.
ISBN : 978-3-030-24265-7
Libro disponible en la plataforma SpringerLink. Descarga y lectura en formatos PDF, HTML y ePub. Descarga completa o por capítulos.
Idioma : Inglés (eng)
Palabras clave: Protección de datos Inteligencia artificial IngenierÃa Informática Red de computadoras Software de la aplicacion Visión por computador Algoritmos Seguridad de datos e información IngenierÃa Informática y Redes Aplicaciones informáticas y de sistemas de información Clasificación: 005.8 Ciencia de los computadores (Programación, programas de sistemas) Resumen: El conjunto de 4 volúmenes LNCS 11632 hasta LNCS 11635 constituye las actas arbitradas de la Quinta Conferencia Internacional sobre Inteligencia Artificial y Seguridad, ICAIS 2019, que se celebró en Nueva York, EE. UU., en julio de 2019. La conferencia se llamaba anteriormente "Conferencia Internacional sobre Computación y Seguridad en la Nube†con las siglas ICCCS. El total de 230 artÃculos completos presentados en estas actas de 4 volúmenes fue cuidadosamente revisado y seleccionado entre 1529 presentaciones. Los artÃculos se organizaron en secciones temáticas de la siguiente manera: Parte I: computación en la nube; Parte II: inteligencia artificial; grandes datos; y computación y seguridad en la nube; Parte III: computación en la nube y seguridad; ocultación de información; seguridad de la IoT; análisis forense multimedia; y cifrado y ciberseguridad; Parte IV: cifrado y ciberseguridad. Nota de contenido: Artificial Intelligence -- CCNET: Cascading Convolutions for Cardiac Segmentation -- A Deep Belief Networks Based Prediction Method for Identification of Disease-associated Non-coding SNPs in Human Genome -- On Human-like Performance Artificial Intelligence – A Demonstration Using an Atari Game -- Implementation of Multiplicative Seasonal ARIMA modeling and Flood Prediction based on Long-Term Time Series Data in Indonesia -- Improved Bayesian Method with Collision Recovery for RFID Anti-Collision -- Multi-step Attack Scenarios Mining Based on Neural Network and Bayesian Network Attack Graph -- A Comparative Study of Machine Learning Classifiers for Network Intrusion Detection -- On True Language Understanding -- The l2,1-Norm Stacked Robust Autoencoders via Adaptation Regularization for Domain Adaptation -- Molecular Dynamics Simulation Optimization Based on GROMACS on Sunway TaihuLight -- A Review of Network Representation Learning -- A Two-stage Deep Neural Network for Sequence Labeling -- Reinforcement Learning based Content Push Policy for HetNets with Energy Harvesting Small Cells -- A Comparative Research on Open Source Edge Computing Systems -- Weather Forecasting Using Artificial Neural Network -- A New Quantitative Evaluation Method for Fuzzing -- Classification of ECG Arrhythmia Using CNN, SVM and LDA -- Discrete Similarity Preserving Hashing for Cross-Modal Retrieval -- Classification of Vitiligo Based on Convolutional Neural Network -- Big Data -- Multi-scale and Hierarchical Embedding for Polarity Shift Sensitive Sentiment Classification -- Trade-off between Energy Consumption and Makespan in the Mapreduce Resource Allocation Problem -- FSampleJoin: A Fixed-sample-based Method for String Similarity Joins using MapReduce -- Mass Diffusion Recommendation Algorithm Based on Multi-Subnet Composited Complex Network Model -- Optimizing Word Embedding for Fine-grained Sentiment Analysis -- A Sentiment Classification Model Based on Multiple Multi-classifier Systems -- Task SchedulingAlgorithm based on Campus Cloud Platform -- Automatic Self-feedback for the Studying effect of MOOC Based on Support Vector Machine -- Prediction on Payment Volume from Customer Service Electricity Channel -- Delay-Tolerant Rendezvous-based Data collection for Target Tracking in Large-Scale Wireless Sensor Networks with UGV -- Energy-Efficient Data-Collection with Rendezvous-Based Approaches in Large-Scale WSNs with multi-UGV -- Analysis of the Efficiency-Energy with Regression and Classification in Household using K-NN 354 -- Probe Recommendation Algorithm for Link Delay Detection -- Recommendation with Heterogeneous Information Networks Based on Meta-Graph -- A GA-optimized Weighted Mixed Kernel Function of SVM Based on Information Entropy -- Modeling and Simulation of Network Public Opinion Propagation Model Based on Interest Matching in Social Network -- Power Consumption and Coverage Test of NB-IoT in the Substation Edge Computing Environment -- Research on the Optimizationof Spark Big Table Equal Join -- Gait Recognition based on spatial-temporal information -- Research on Load Balancing Algorithm Optimization Based on Spark Platform -- A System for Calculating the Amount of Motion Based on 3D Pose Estimation -- Design of Security Portrait Big Data Application System -- Urban traffic flow forecast based on ST-SEResNet -- A Novel Power System Anomaly Data Identification Method Based on Neural Network and Affine Propagation -- Input-Output Analysis of Chinese National Agricultural Science and Technology Park -- A Power Grid Operations Monitoring Platform Based on Big Data Technology -- An Efficient Social-Aware Routing Strategy in Mobile Social Networks -- Cloud Computing and Security -- Improvement of Differential Fault Attack Based on Lightweight Ciphers with GFN Structure -- Cloud Management Systems - Load Balancing Algorithms and VDI Implementation Techniques -- When Side Channel becomes Good: Kernel Malware Attack Investigation -- Robust Encrypted Watermarking for Medical Images Based on DWT-DCT and Tent Mapping in Encrypted Domain -- An Analysis of A Three-Factor Authentication Scheme and Its Improved Fix -- A Novel Content Based Image Retrieval Scheme in Cloud Computing -- Mobile Image Retrieval System for Cloud Service Based on Convolutional Neural Network and Hadoop -- Formal Specification of Concurrent Enforcement Ucon Model with CTL Logic -- Design of Real-Time Resource-Aware Network Resource Allocation Mechanism Under SDN Background -- RSCM: A Reliability-Aware Service Chain Mapping. Tipo de medio : Computadora Summary : The 4-volume set LNCS 11632 until LNCS 11635 constitutes the refereed proceedings of the 5th International Conference on Artificial Intelligence and Security, ICAIS 2019, which was held in New York, USA, in July 2019. The conference was formerly called "International Conference on Cloud Computing and Security" with the acronym ICCCS. The total of 230 full papers presented in this 4-volume proceedings was carefully reviewed and selected from 1529 submissions. The papers were organized in topical sections as follows: Part I: cloud computing; Part II: artificial intelligence; big data; and cloud computing and security; Part III: cloud computing and security; information hiding; IoT security; multimedia forensics; and encryption and cybersecurity; Part IV: encryption and cybersecurity. Enlace de acceso : https://link-springer-com.biblioproxy.umanizales.edu.co/referencework/10.1007/97 [...]
TÃtulo : Artificial Intelligence and Security : 5th International Conference, ICAIS 2019, New York, NY, USA, July 26–28, 2019, Proceedings, Part III / Tipo de documento: documento electrónico Autores: Sun, Xingming, ; Pan, Zhaoqing, ; Bertino, Elisa, Mención de edición: 1 ed. Editorial: [s.l.] : Springer Fecha de publicación: 2019 Número de páginas: XVII, 661 p. 293 ilustraciones, 169 ilustraciones en color. ISBN/ISSN/DL: 978-3-030-24271-8 Nota general: Libro disponible en la plataforma SpringerLink. Descarga y lectura en formatos PDF, HTML y ePub. Descarga completa o por capítulos. Idioma : Inglés (eng) Palabras clave: Protección de datos CriptografÃa Cifrado de datos (Informática) Software de la aplicacion Red de computadoras Inteligencia artificial Visión por computador Seguridad de datos e información CriptologÃa Aplicaciones informáticas y de sistemas de información Redes de comunicación informática Clasificación: 005.8 Ciencia de los computadores (Programación, programas de sistemas) Resumen: El conjunto de 4 volúmenes LNCS 11632 hasta LNCS 11635 constituye las actas arbitradas de la Quinta Conferencia Internacional sobre Inteligencia Artificial y Seguridad, ICAIS 2019, que se celebró en Nueva York, EE. UU., en julio de 2019. La conferencia se llamaba anteriormente "Conferencia Internacional sobre Computación y Seguridad en la Nube†con las siglas ICCCS. El total de 230 artÃculos completos presentados en estas actas de 4 volúmenes fue cuidadosamente revisado y seleccionado entre 1529 presentaciones. Los artÃculos se organizaron en secciones temáticas de la siguiente manera: Parte I: computación en la nube; Parte II: inteligencia artificial; grandes datos; y computación y seguridad en la nube; Parte III: computación en la nube y seguridad; ocultación de información; seguridad de la IoT; análisis forense multimedia; y cifrado y ciberseguridad; Parte IV: cifrado y ciberseguridad. Nota de contenido: Cloud Computing and Security -- Evaluation and Testing of PCI Express 8-Gbps Re-timer in Storage Server -- Virtualization of 5G Cellular Networks: A Combinatorial Share-averse Auction Approach -- Equipment Fault Detection Based on SENCForest -- Research on Telemedical Monitoring System Based on Homomorphic Encryption -- Phase Retrieval via Accelerated Gradient Descent -- Anti-Noise Quantum Network Coding Protocol Based on Bell States and Butterfly Network Model -- A Privacy-preserving Multi-keyword Ranked Search over Encrypted Data in Hybrid Clouds -- Application of Blockchain Technology in Agricultural Product Traceability System -- Anonymous Authentication Scheme for Machine-To-Machine Communication Based on Elliptic Curve -- Linear Complexity of R-Ary Sequences Derived from Euler Quotients Modulo 2p -- Information Hiding -- An Improved Steganalysis Method Using Feature Combinations -- Research on Application of OFD Technology in Secure Electronic Bills -- A Generative Method for Image Steganography Based on Semantics -- Review on Text Watermarking Resistant to Print-scan, Screen-shooting -- A Novel Reversible Data Hiding Scheme for Encrypted VQ-Compressed Image -- IoT Security -- An Landmark Evaluation Alogrithm Based on Router Identification and Delay Measurement -- Multiplicative Linear Secret Sharing without Interaction -- Positioning Improvement Algorithm Based on LoRa Wireless Networks -- Time-aware and Energy Efficient Data Collection Mechanism for Duty-Cycled Wireless Sensor Networks -- An Implementation of CoAP-Based Semantic Resource Directory in Californium -- A Survey of Simulators for Home Energy Management: System Architecture, Intelligence, UI and Efficiency -- Relay Location Optimization and Relay Coordination in Multi-hop Cognitive Radio Networks -- Subspace Extension Algorithm for Joint DOA and DOD Estimation in Bistatic MIMO Radar -- Under-Determined Blind Source Separation Anti-Collision Algorithm for Rfid Based on Adaptive Tree Grouping -- Design of a Peristaltic Pump Driven by Pneumatic Artificial Muscles -- An Approach to Deep Learning Service Provision with Elastic Remote Interfaces -- Design of an IoT-based Efficient Security Scheme in Home Wireless System -- Discussion on the Application of Industrial Internet -- Performance Analysis of a NB-IoT based Smart Lamp Solution with Application Enabled Platform -- Mining Hypernym-Hyponym Relations from Social Tags via Tag Embedding -- Accurate and Fast DV-hop Localization Algorithm in Irregular Networks -- Shape Recognition with Recurrent Neural Network -- WSN Multi-hop Routing Algorithm Based on Path Quality Comparison in New Energy Consumption Distance Node Relation Model -- Tobacco Intelligent Management System Based on Internet of Things -- Research on Fault Self Diagnosis Technology of Agricultural Internet of Things Information Collection System -- Analysis of Antenna Array Parameter Effect for Massive MIMO Transmission -- Intelligent Irrigation System of Balcony Flowers Based on Internet of Things -- Multimedia Forensics -- The Impact of Using Facebook on the Academic Performance of University Students -- Robust Audio Watermarking Algorithm Based on Moving Average and DCT -- Computer Evidence Analysis Technology Based on Weighted Frequent Pattern Growth Algorithm -- Reversible Data Hiding in JPEG Images Based on Multiple Histograms Modification -- Image Hashing based on CS-LBP and DCT for Copy Detection -- KMSVM: A Efficient Min-Max Modular Support Vector Machine Based on Clustering -- An Image Forensic Method for AI Inpainting Using Faster R-CNN -- Kernel Generalized Canonical Correlation and A New Feature Fusion Strategy -- Multiple Obstacle Detection for Assistance Driver System Using Deep Neural Networks -- Encryption and Cybersecurity -- CABAC: A Content-Driven Attribute-Based Access Control Model for Big Data -- Calculation of Network Security Index Based on Convolution Neural Networks -- A Method to Defense APT based on Dynamic ID Transformation -- Emergency analysis Based on Affective Computing in Universities Forum -- Network Attack and Defense Effectiveness Evaluation Based on Dematel Method -- Web Application-layer DDoS Attack Detection Based on generalized Jaccard Similarity and Information Entropy -- Ultra-broad Bandpass Filter Based on Composite Right-Left Handed Transmission Line Model -- An Automatic Identification Algorithm for Encrypted Anti-counterfeiting Tag Based on DWT-DCT and Chen's Chaos -- Security Analysis and Improvement of Elliptic Curve Digital Signature Scheme -- Risk Taking Behavior in Crowdsourcing Adoption: The Case of Witkey -- Anomaly detection in Wireless Sensor Networks based on KNN -- Comparison of The Legal Principle Foundation of Chinese And American Secret Information Access Control Technique. Tipo de medio : Computadora Summary : The 4-volume set LNCS 11632 until LNCS 11635 constitutes the refereed proceedings of the 5th International Conference on Artificial Intelligence and Security, ICAIS 2019, which was held in New York, USA, in July 2019. The conference was formerly called "International Conference on Cloud Computing and Security" with the acronym ICCCS. The total of 230 full papers presented in this 4-volume proceedings was carefully reviewed and selected from 1529 submissions. The papers were organized in topical sections as follows: Part I: cloud computing; Part II: artificial intelligence; big data; and cloud computing and security; Part III: cloud computing and security; information hiding; IoT security; multimedia forensics; and encryption and cybersecurity; Part IV: encryption and cybersecurity. Enlace de acceso : https://link-springer-com.biblioproxy.umanizales.edu.co/referencework/10.1007/97 [...] Artificial Intelligence and Security : 5th International Conference, ICAIS 2019, New York, NY, USA, July 26–28, 2019, Proceedings, Part III / [documento electrónico] / Sun, Xingming, ; Pan, Zhaoqing, ; Bertino, Elisa, . - 1 ed. . - [s.l.] : Springer, 2019 . - XVII, 661 p. 293 ilustraciones, 169 ilustraciones en color.
ISBN : 978-3-030-24271-8
Libro disponible en la plataforma SpringerLink. Descarga y lectura en formatos PDF, HTML y ePub. Descarga completa o por capítulos.
Idioma : Inglés (eng)
Palabras clave: Protección de datos CriptografÃa Cifrado de datos (Informática) Software de la aplicacion Red de computadoras Inteligencia artificial Visión por computador Seguridad de datos e información CriptologÃa Aplicaciones informáticas y de sistemas de información Redes de comunicación informática Clasificación: 005.8 Ciencia de los computadores (Programación, programas de sistemas) Resumen: El conjunto de 4 volúmenes LNCS 11632 hasta LNCS 11635 constituye las actas arbitradas de la Quinta Conferencia Internacional sobre Inteligencia Artificial y Seguridad, ICAIS 2019, que se celebró en Nueva York, EE. UU., en julio de 2019. La conferencia se llamaba anteriormente "Conferencia Internacional sobre Computación y Seguridad en la Nube†con las siglas ICCCS. El total de 230 artÃculos completos presentados en estas actas de 4 volúmenes fue cuidadosamente revisado y seleccionado entre 1529 presentaciones. Los artÃculos se organizaron en secciones temáticas de la siguiente manera: Parte I: computación en la nube; Parte II: inteligencia artificial; grandes datos; y computación y seguridad en la nube; Parte III: computación en la nube y seguridad; ocultación de información; seguridad de la IoT; análisis forense multimedia; y cifrado y ciberseguridad; Parte IV: cifrado y ciberseguridad. Nota de contenido: Cloud Computing and Security -- Evaluation and Testing of PCI Express 8-Gbps Re-timer in Storage Server -- Virtualization of 5G Cellular Networks: A Combinatorial Share-averse Auction Approach -- Equipment Fault Detection Based on SENCForest -- Research on Telemedical Monitoring System Based on Homomorphic Encryption -- Phase Retrieval via Accelerated Gradient Descent -- Anti-Noise Quantum Network Coding Protocol Based on Bell States and Butterfly Network Model -- A Privacy-preserving Multi-keyword Ranked Search over Encrypted Data in Hybrid Clouds -- Application of Blockchain Technology in Agricultural Product Traceability System -- Anonymous Authentication Scheme for Machine-To-Machine Communication Based on Elliptic Curve -- Linear Complexity of R-Ary Sequences Derived from Euler Quotients Modulo 2p -- Information Hiding -- An Improved Steganalysis Method Using Feature Combinations -- Research on Application of OFD Technology in Secure Electronic Bills -- A Generative Method for Image Steganography Based on Semantics -- Review on Text Watermarking Resistant to Print-scan, Screen-shooting -- A Novel Reversible Data Hiding Scheme for Encrypted VQ-Compressed Image -- IoT Security -- An Landmark Evaluation Alogrithm Based on Router Identification and Delay Measurement -- Multiplicative Linear Secret Sharing without Interaction -- Positioning Improvement Algorithm Based on LoRa Wireless Networks -- Time-aware and Energy Efficient Data Collection Mechanism for Duty-Cycled Wireless Sensor Networks -- An Implementation of CoAP-Based Semantic Resource Directory in Californium -- A Survey of Simulators for Home Energy Management: System Architecture, Intelligence, UI and Efficiency -- Relay Location Optimization and Relay Coordination in Multi-hop Cognitive Radio Networks -- Subspace Extension Algorithm for Joint DOA and DOD Estimation in Bistatic MIMO Radar -- Under-Determined Blind Source Separation Anti-Collision Algorithm for Rfid Based on Adaptive Tree Grouping -- Design of a Peristaltic Pump Driven by Pneumatic Artificial Muscles -- An Approach to Deep Learning Service Provision with Elastic Remote Interfaces -- Design of an IoT-based Efficient Security Scheme in Home Wireless System -- Discussion on the Application of Industrial Internet -- Performance Analysis of a NB-IoT based Smart Lamp Solution with Application Enabled Platform -- Mining Hypernym-Hyponym Relations from Social Tags via Tag Embedding -- Accurate and Fast DV-hop Localization Algorithm in Irregular Networks -- Shape Recognition with Recurrent Neural Network -- WSN Multi-hop Routing Algorithm Based on Path Quality Comparison in New Energy Consumption Distance Node Relation Model -- Tobacco Intelligent Management System Based on Internet of Things -- Research on Fault Self Diagnosis Technology of Agricultural Internet of Things Information Collection System -- Analysis of Antenna Array Parameter Effect for Massive MIMO Transmission -- Intelligent Irrigation System of Balcony Flowers Based on Internet of Things -- Multimedia Forensics -- The Impact of Using Facebook on the Academic Performance of University Students -- Robust Audio Watermarking Algorithm Based on Moving Average and DCT -- Computer Evidence Analysis Technology Based on Weighted Frequent Pattern Growth Algorithm -- Reversible Data Hiding in JPEG Images Based on Multiple Histograms Modification -- Image Hashing based on CS-LBP and DCT for Copy Detection -- KMSVM: A Efficient Min-Max Modular Support Vector Machine Based on Clustering -- An Image Forensic Method for AI Inpainting Using Faster R-CNN -- Kernel Generalized Canonical Correlation and A New Feature Fusion Strategy -- Multiple Obstacle Detection for Assistance Driver System Using Deep Neural Networks -- Encryption and Cybersecurity -- CABAC: A Content-Driven Attribute-Based Access Control Model for Big Data -- Calculation of Network Security Index Based on Convolution Neural Networks -- A Method to Defense APT based on Dynamic ID Transformation -- Emergency analysis Based on Affective Computing in Universities Forum -- Network Attack and Defense Effectiveness Evaluation Based on Dematel Method -- Web Application-layer DDoS Attack Detection Based on generalized Jaccard Similarity and Information Entropy -- Ultra-broad Bandpass Filter Based on Composite Right-Left Handed Transmission Line Model -- An Automatic Identification Algorithm for Encrypted Anti-counterfeiting Tag Based on DWT-DCT and Chen's Chaos -- Security Analysis and Improvement of Elliptic Curve Digital Signature Scheme -- Risk Taking Behavior in Crowdsourcing Adoption: The Case of Witkey -- Anomaly detection in Wireless Sensor Networks based on KNN -- Comparison of The Legal Principle Foundation of Chinese And American Secret Information Access Control Technique. Tipo de medio : Computadora Summary : The 4-volume set LNCS 11632 until LNCS 11635 constitutes the refereed proceedings of the 5th International Conference on Artificial Intelligence and Security, ICAIS 2019, which was held in New York, USA, in July 2019. The conference was formerly called "International Conference on Cloud Computing and Security" with the acronym ICCCS. The total of 230 full papers presented in this 4-volume proceedings was carefully reviewed and selected from 1529 submissions. The papers were organized in topical sections as follows: Part I: cloud computing; Part II: artificial intelligence; big data; and cloud computing and security; Part III: cloud computing and security; information hiding; IoT security; multimedia forensics; and encryption and cybersecurity; Part IV: encryption and cybersecurity. Enlace de acceso : https://link-springer-com.biblioproxy.umanizales.edu.co/referencework/10.1007/97 [...]
TÃtulo : Artificial Intelligence and Security : 5th International Conference, ICAIS 2019, New York, NY, USA, July 26–28, 2019, Proceedings, Part IV / Tipo de documento: documento electrónico Autores: Sun, Xingming, ; Pan, Zhaoqing, ; Bertino, Elisa, Mención de edición: 1 ed. Editorial: [s.l.] : Springer Fecha de publicación: 2019 Número de páginas: XVII, 651 p. 252 ilustraciones, 134 ilustraciones en color. ISBN/ISSN/DL: 978-3-030-24268-8 Nota general: Libro disponible en la plataforma SpringerLink. Descarga y lectura en formatos PDF, HTML y ePub. Descarga completa o por capítulos. Idioma : Inglés (eng) Palabras clave: Protección de datos CriptografÃa Cifrado de datos (Informática) Red de computadoras Software de la aplicacion IngenierÃa de software Ordenador TecnologÃa de la información Seguridad de datos e información CriptologÃa Redes de comunicación informática Aplicaciones informáticas y de sistemas de información Aspectos Legales de la Computación Clasificación: 005.8 Ciencia de los computadores (Programación, programas de sistemas) Resumen: El conjunto de 4 volúmenes LNCS 11632 hasta LNCS 11635 constituye las actas arbitradas de la Quinta Conferencia Internacional sobre Inteligencia Artificial y Seguridad, ICAIS 2019, que se celebró en Nueva York, EE. UU., en julio de 2019. La conferencia se llamaba anteriormente "Conferencia Internacional sobre Computación y Seguridad en la Nube†con las siglas ICCCS. El total de 230 artÃculos completos presentados en estas actas de 4 volúmenes fue cuidadosamente revisado y seleccionado entre 1529 presentaciones. Los artÃculos se organizaron en secciones temáticas de la siguiente manera: Parte I: computación en la nube; Parte II: inteligencia artificial; grandes datos; y computación y seguridad en la nube; Parte III: computación en la nube y seguridad; ocultación de información; seguridad de la IoT; análisis forense multimedia; y cifrado y ciberseguridad; Parte IV: cifrado y ciberseguridad. Nota de contenido: Encryption and Cybersecurity -- A Gray-Box Vulnerability Discovery Model based on Path Coverage -- Quantum Network Coding Based on Entanglement Distribution -- Moving Target Defense in Preventing SQL Injection -- Design and Security Analysis of Certificateless Aggregate Signature Scheme -- SuperEye: a Distributed Port Scanning System -- An Improved Multi-classification Algorithm for Imbalanced Online Public Opinion Data -- NCGs: Building A Trustworthy Environment to Identify Abnormal Events Based on Network Connection Behavior Analysis -- Short Text Topic Recognition and Optimization Method for University Online Community -- A Survey on Network Traffic Identification -- A Survey of Network Security Situational Awareness Technology -- Multi-function Quantum Cryptography Protocol Based On Bell State -- The Attack Case of ECDSA on Blockchain based on Improved Simple Power Analysis -- A Weight-Based Channel Estimation Implementation Algorithm -- Multi-Party Quantum Communication Complexity on CompositeBoolean-Valued Function -- BlockZone: A Blockchain-based DNS Storage and Retrieval Scheme -- Robust Analysis of Grid System Based on Complex Network Attack Mode -- A Secure Data Aggregation Protocol in VANETs based on Multi-key FHE -- Research on SQL Injection and Defense Technology -- A Review of the Factorization Problem of Large Integers -- A Comparison of Machine Learning Algorithms for Detecting XSS Attacks -- A Survey of Privacy-Preserving Techniques for Blockchain -- A Survey of Software Reverse Engineering Applications -- A Fast IP Matching Algorithm under Large Traffic -- An Effective Load Balance using Link Bandwidth for SDN-based Data Centers -- Zero-Day Vulnerability Risk Assessment and Attack Path Analysis Using Security Metric -- Research on Content Extraction of Rich Text Web Pages -- Network Protocol Analysis base on WeChat PC Version -- Bitcoin Network Size Estimation Based on Coupon Collection Model -- A Survey of the Software Vulnerability Discovery using Machine Learning Techniques -- A Distributed Cryptanalysis Framework based on Mobile Phones -- A Novel Threshold Signature Scheme Based on Elliptic Curve with designated verifier -- A Congestion Control Methodology with Probability Routing based on MNL for Datacenter Network -- Fast Failover for Link Failures in Software Defined Networks -- Steady-state Topology Discovery of Target Networks based on Statistics Method -- A Novel Method for Weighted Throughput Fairness in Contention-based WLANs with Multiple Priority Levels -- Bitcoin Node Discovery: Large-scale Empirical Evaluation of Network Churn -- DDoS Attack Situation Information Fusion Method Based on Dempster-Shafer Evidence Theory -- Webshell Detection Model based on Deep Learning -- A Security-Sensitive Function Mining Framework for Source Code -- Abstraction of Operations in Trusted Components Based on OR-transition Colored Petri Net -- Trusted Component Decomposition Based on OR-transition Colored Petri Net -- High-Speed File Transferring over Linux Bridge for QGAEnhancement in Cyber Range -- Playing First-Person-Shooter Games with A3C-Anticipator Network Based Agents using Reinforcement Learning -- Identify Influentials Based on User behavior Across Different Topics -- Taylor Series Localization Algorithm Based on Semi-definite Programming -- Research on Pedestrian Attribute Recognition Based on Semantic Segmentation in Natural Scene -- An evolving network model based on a triangular connecting mechanism for the Internet topology -- A new quantum private query protocol with better performance in resisting joint-measurement attack -- PPCSB:A Privacy-Preserving Electricity Consumption Statistics and Billing Scheme in Smart Grid -- Blockchain Private Key Storage Algorithm Based on Image Information Hiding -- Heuristic-Q: A Privacy Data Pricing Method Based on Heuristic Reinforcement Learning -- JPEGCNN:A Transform Domain Steganalysis Model Based On Convolutional Neural Network -- Quantum algorithm for support vector machine with exponentially improved dependence on precision -- Reliability-based and QoS-aware Service Redundancy Backup Method in IoT-based Smart Grid -- A Privacy-Preserving Electricity Trading Scheme Based on Blockchain -- A Novel Facial Expression Recognition Scheme based on Deep Neural Networks -- Active Defense System of Industrial Control System Based on Dynamic Behavior Analysis -- Research on Active Defense Technology of Smart Grid Control Terminal Based on Dynamic Trust. Tipo de medio : Computadora Summary : The 4-volume set LNCS 11632 until LNCS 11635 constitutes the refereed proceedings of the 5th International Conference on Artificial Intelligence and Security, ICAIS 2019, which was held in New York, USA, in July 2019. The conference was formerly called "International Conference on Cloud Computing and Security" with the acronym ICCCS. The total of 230 full papers presented in this 4-volume proceedings was carefully reviewed and selected from 1529 submissions. The papers were organized in topical sections as follows: Part I: cloud computing; Part II: artificial intelligence; big data; and cloud computing and security; Part III: cloud computing and security; information hiding; IoT security; multimedia forensics; and encryption and cybersecurity; Part IV: encryption and cybersecurity. Enlace de acceso : https://link-springer-com.biblioproxy.umanizales.edu.co/referencework/10.1007/97 [...] Artificial Intelligence and Security : 5th International Conference, ICAIS 2019, New York, NY, USA, July 26–28, 2019, Proceedings, Part IV / [documento electrónico] / Sun, Xingming, ; Pan, Zhaoqing, ; Bertino, Elisa, . - 1 ed. . - [s.l.] : Springer, 2019 . - XVII, 651 p. 252 ilustraciones, 134 ilustraciones en color.
ISBN : 978-3-030-24268-8
Libro disponible en la plataforma SpringerLink. Descarga y lectura en formatos PDF, HTML y ePub. Descarga completa o por capítulos.
Idioma : Inglés (eng)
Palabras clave: Protección de datos CriptografÃa Cifrado de datos (Informática) Red de computadoras Software de la aplicacion IngenierÃa de software Ordenador TecnologÃa de la información Seguridad de datos e información CriptologÃa Redes de comunicación informática Aplicaciones informáticas y de sistemas de información Aspectos Legales de la Computación Clasificación: 005.8 Ciencia de los computadores (Programación, programas de sistemas) Resumen: El conjunto de 4 volúmenes LNCS 11632 hasta LNCS 11635 constituye las actas arbitradas de la Quinta Conferencia Internacional sobre Inteligencia Artificial y Seguridad, ICAIS 2019, que se celebró en Nueva York, EE. UU., en julio de 2019. La conferencia se llamaba anteriormente "Conferencia Internacional sobre Computación y Seguridad en la Nube†con las siglas ICCCS. El total de 230 artÃculos completos presentados en estas actas de 4 volúmenes fue cuidadosamente revisado y seleccionado entre 1529 presentaciones. Los artÃculos se organizaron en secciones temáticas de la siguiente manera: Parte I: computación en la nube; Parte II: inteligencia artificial; grandes datos; y computación y seguridad en la nube; Parte III: computación en la nube y seguridad; ocultación de información; seguridad de la IoT; análisis forense multimedia; y cifrado y ciberseguridad; Parte IV: cifrado y ciberseguridad. Nota de contenido: Encryption and Cybersecurity -- A Gray-Box Vulnerability Discovery Model based on Path Coverage -- Quantum Network Coding Based on Entanglement Distribution -- Moving Target Defense in Preventing SQL Injection -- Design and Security Analysis of Certificateless Aggregate Signature Scheme -- SuperEye: a Distributed Port Scanning System -- An Improved Multi-classification Algorithm for Imbalanced Online Public Opinion Data -- NCGs: Building A Trustworthy Environment to Identify Abnormal Events Based on Network Connection Behavior Analysis -- Short Text Topic Recognition and Optimization Method for University Online Community -- A Survey on Network Traffic Identification -- A Survey of Network Security Situational Awareness Technology -- Multi-function Quantum Cryptography Protocol Based On Bell State -- The Attack Case of ECDSA on Blockchain based on Improved Simple Power Analysis -- A Weight-Based Channel Estimation Implementation Algorithm -- Multi-Party Quantum Communication Complexity on CompositeBoolean-Valued Function -- BlockZone: A Blockchain-based DNS Storage and Retrieval Scheme -- Robust Analysis of Grid System Based on Complex Network Attack Mode -- A Secure Data Aggregation Protocol in VANETs based on Multi-key FHE -- Research on SQL Injection and Defense Technology -- A Review of the Factorization Problem of Large Integers -- A Comparison of Machine Learning Algorithms for Detecting XSS Attacks -- A Survey of Privacy-Preserving Techniques for Blockchain -- A Survey of Software Reverse Engineering Applications -- A Fast IP Matching Algorithm under Large Traffic -- An Effective Load Balance using Link Bandwidth for SDN-based Data Centers -- Zero-Day Vulnerability Risk Assessment and Attack Path Analysis Using Security Metric -- Research on Content Extraction of Rich Text Web Pages -- Network Protocol Analysis base on WeChat PC Version -- Bitcoin Network Size Estimation Based on Coupon Collection Model -- A Survey of the Software Vulnerability Discovery using Machine Learning Techniques -- A Distributed Cryptanalysis Framework based on Mobile Phones -- A Novel Threshold Signature Scheme Based on Elliptic Curve with designated verifier -- A Congestion Control Methodology with Probability Routing based on MNL for Datacenter Network -- Fast Failover for Link Failures in Software Defined Networks -- Steady-state Topology Discovery of Target Networks based on Statistics Method -- A Novel Method for Weighted Throughput Fairness in Contention-based WLANs with Multiple Priority Levels -- Bitcoin Node Discovery: Large-scale Empirical Evaluation of Network Churn -- DDoS Attack Situation Information Fusion Method Based on Dempster-Shafer Evidence Theory -- Webshell Detection Model based on Deep Learning -- A Security-Sensitive Function Mining Framework for Source Code -- Abstraction of Operations in Trusted Components Based on OR-transition Colored Petri Net -- Trusted Component Decomposition Based on OR-transition Colored Petri Net -- High-Speed File Transferring over Linux Bridge for QGAEnhancement in Cyber Range -- Playing First-Person-Shooter Games with A3C-Anticipator Network Based Agents using Reinforcement Learning -- Identify Influentials Based on User behavior Across Different Topics -- Taylor Series Localization Algorithm Based on Semi-definite Programming -- Research on Pedestrian Attribute Recognition Based on Semantic Segmentation in Natural Scene -- An evolving network model based on a triangular connecting mechanism for the Internet topology -- A new quantum private query protocol with better performance in resisting joint-measurement attack -- PPCSB:A Privacy-Preserving Electricity Consumption Statistics and Billing Scheme in Smart Grid -- Blockchain Private Key Storage Algorithm Based on Image Information Hiding -- Heuristic-Q: A Privacy Data Pricing Method Based on Heuristic Reinforcement Learning -- JPEGCNN:A Transform Domain Steganalysis Model Based On Convolutional Neural Network -- Quantum algorithm for support vector machine with exponentially improved dependence on precision -- Reliability-based and QoS-aware Service Redundancy Backup Method in IoT-based Smart Grid -- A Privacy-Preserving Electricity Trading Scheme Based on Blockchain -- A Novel Facial Expression Recognition Scheme based on Deep Neural Networks -- Active Defense System of Industrial Control System Based on Dynamic Behavior Analysis -- Research on Active Defense Technology of Smart Grid Control Terminal Based on Dynamic Trust. Tipo de medio : Computadora Summary : The 4-volume set LNCS 11632 until LNCS 11635 constitutes the refereed proceedings of the 5th International Conference on Artificial Intelligence and Security, ICAIS 2019, which was held in New York, USA, in July 2019. The conference was formerly called "International Conference on Cloud Computing and Security" with the acronym ICCCS. The total of 230 full papers presented in this 4-volume proceedings was carefully reviewed and selected from 1529 submissions. The papers were organized in topical sections as follows: Part I: cloud computing; Part II: artificial intelligence; big data; and cloud computing and security; Part III: cloud computing and security; information hiding; IoT security; multimedia forensics; and encryption and cybersecurity; Part IV: encryption and cybersecurity. Enlace de acceso : https://link-springer-com.biblioproxy.umanizales.edu.co/referencework/10.1007/97 [...]
TÃtulo : Cloud Computing and Security : 4th International Conference, ICCCS 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part I Tipo de documento: documento electrónico Autores: Sun, Xingming, ; Pan, Zhaoqing, ; Bertino, Elisa, Mención de edición: 1 ed. Editorial: [s.l.] : Springer Fecha de publicación: 2018 Número de páginas: XVIII, 743 p. 418 ilustraciones, 215 ilustraciones en color. ISBN/ISSN/DL: 978-3-030-00006-6 Nota general: Libro disponible en la plataforma SpringerLink. Descarga y lectura en formatos PDF, HTML y ePub. Descarga completa o por capítulos. Idioma : Inglés (eng) Palabras clave: Software de la aplicacion Protección de datos Inteligencia artificial Estructuras de datos (Informática) TeorÃa de la información Aplicaciones informáticas y de sistemas de información Seguridad de datos e información Estructuras de datos y teorÃa de la información Clasificación: 005.3 Ciencia de los computadores (Programas) Resumen: Este conjunto de seis volúmenes LNCS 11063 – 11068 constituye las actas de la 4.ª Conferencia Internacional sobre Seguridad y Computación en la Nube, ICCCS 2018, celebrada en Haikou, China, en junio de 2018. Los 386 artÃculos completos de estos seis volúmenes fueron cuidadosamente revisados ​​y seleccionado entre 1743 presentaciones. Los artÃculos cubren ideas y logros en la teorÃa y la práctica de todas las áreas de los sistemas inventivos, que incluyen control, inteligencia artificial, sistemas de automatización, sistemas informáticos, sistemas eléctricos e informativos. Los seis volúmenes están organizados según las áreas temáticas de la siguiente manera: computación en la nube, seguridad en la nube, cifrado, ocultación de información, seguridad de IoT y análisis forense multimedia. Tipo de medio : Computadora Summary : This six volume set LNCS 11063 – 11068 constitutes the thoroughly refereed conference proceedings of the 4th International Conference on Cloud Computing and Security, ICCCS 2018, held in Haikou, China, in June 2018. The 386 full papers of these six volumes were carefully reviewed and selected from 1743 submissions. The papers cover ideas and achievements in the theory and practice of all areas of inventive systems which includes control, artificial intelligence, automation systems, computing systems, electrical and informative systems. The six volumes are arranged according to the subject areas as follows: cloud computing, cloud security, encryption, information hiding, IoT security, multimedia forensics. Enlace de acceso : https://link-springer-com.biblioproxy.umanizales.edu.co/referencework/10.1007/97 [...] Cloud Computing and Security : 4th International Conference, ICCCS 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part I [documento electrónico] / Sun, Xingming, ; Pan, Zhaoqing, ; Bertino, Elisa, . - 1 ed. . - [s.l.] : Springer, 2018 . - XVIII, 743 p. 418 ilustraciones, 215 ilustraciones en color.
ISBN : 978-3-030-00006-6
Libro disponible en la plataforma SpringerLink. Descarga y lectura en formatos PDF, HTML y ePub. Descarga completa o por capítulos.
Idioma : Inglés (eng)
Palabras clave: Software de la aplicacion Protección de datos Inteligencia artificial Estructuras de datos (Informática) TeorÃa de la información Aplicaciones informáticas y de sistemas de información Seguridad de datos e información Estructuras de datos y teorÃa de la información Clasificación: 005.3 Ciencia de los computadores (Programas) Resumen: Este conjunto de seis volúmenes LNCS 11063 – 11068 constituye las actas de la 4.ª Conferencia Internacional sobre Seguridad y Computación en la Nube, ICCCS 2018, celebrada en Haikou, China, en junio de 2018. Los 386 artÃculos completos de estos seis volúmenes fueron cuidadosamente revisados ​​y seleccionado entre 1743 presentaciones. Los artÃculos cubren ideas y logros en la teorÃa y la práctica de todas las áreas de los sistemas inventivos, que incluyen control, inteligencia artificial, sistemas de automatización, sistemas informáticos, sistemas eléctricos e informativos. Los seis volúmenes están organizados según las áreas temáticas de la siguiente manera: computación en la nube, seguridad en la nube, cifrado, ocultación de información, seguridad de IoT y análisis forense multimedia. Tipo de medio : Computadora Summary : This six volume set LNCS 11063 – 11068 constitutes the thoroughly refereed conference proceedings of the 4th International Conference on Cloud Computing and Security, ICCCS 2018, held in Haikou, China, in June 2018. The 386 full papers of these six volumes were carefully reviewed and selected from 1743 submissions. The papers cover ideas and achievements in the theory and practice of all areas of inventive systems which includes control, artificial intelligence, automation systems, computing systems, electrical and informative systems. The six volumes are arranged according to the subject areas as follows: cloud computing, cloud security, encryption, information hiding, IoT security, multimedia forensics. Enlace de acceso : https://link-springer-com.biblioproxy.umanizales.edu.co/referencework/10.1007/97 [...] PermalinkPermalinkPermalinkPermalinkPermalink