Autor Zhang, Xiaorui
|
|
Documentos disponibles escritos por este autor (5)
Hacer una sugerencia Refinar búsqueda7th International Conference, ICAIS 2021, Dublin, Ireland, July 19–23, 2021, Proceedings, Part I / Sun, Xingming ; Zhang, Xiaorui ; Xia, Zhihua ; Bertino, Elisa
![]()
TÃtulo : 7th International Conference, ICAIS 2021, Dublin, Ireland, July 19–23, 2021, Proceedings, Part I Tipo de documento: documento electrónico Autores: Sun, Xingming, ; Zhang, Xiaorui, ; Xia, Zhihua, ; Bertino, Elisa, Mención de edición: 1 ed. Editorial: [s.l.] : Springer Fecha de publicación: 2021 Número de páginas: XXIV, 753 p. 118 ilustraciones, 1 ilustraciones en color. ISBN/ISSN/DL: 978-3-030-78609-0 Nota general: Libro disponible en la plataforma SpringerLink. Descarga y lectura en formatos PDF, HTML y ePub. Descarga completa o por capítulos. Palabras clave: Software de la aplicacion Inteligencia artificial IngenierÃa Informática Red de computadoras Visión por computador Aplicaciones informáticas y de sistemas de información IngenierÃa Informática y Redes Ãndice Dewey: 005.3 Ciencia de los computadores (Programas) Resumen: Este conjunto de dos volúmenes de LNCS 12736-12737 constituye las actas arbitradas de la 7.ª Conferencia Internacional sobre Inteligencia Artificial y Seguridad, ICAIS 2021, que se celebró en DublÃn, Irlanda, en julio de 2021. La conferencia se llamaba anteriormente "Conferencia Internacional sobre la Nube". Informática y Seguridad†con las siglas ICCCS. El total de 93 artÃculos completos y 29 artÃculos breves presentados en estas actas de dos volúmenes fue cuidadosamente revisado y seleccionado entre 1013 presentaciones. En total, se aceptaron un total de 224 artÃculos completos y 81 artÃculos breves para ICAIS 2021; los demás artÃculos aceptados se presentan en CCIS 1422-1424. Los artÃculos se organizaron en secciones temáticas de la siguiente manera: Parte I: Inteligencia artificial; y big data Parte II: Big data; computación en la nube y seguridad; cifrado y ciberseguridad; ocultación de información; seguridad de la IoT; y análisis forense multimedia. Nota de contenido: Artificial Intelligence -- Research on Spoofing Jamming of Integrated Navigation System on UAV -- Multi-penalty functions GANs via multi-task learning -- Community Detection Model Based on Graph Representation and Self-supervised Learning -- Efficient Distributed Stochastic Gradient Descent through Gaussian Averaging -- Application Research of Improved Particle Swarm Optimization Algorithm Used on Job Shop Scheduling Problem -- Artificial Intelligence Chronic Disease Management System Based on Medical Resource Perception -- Research on Deep Learning Denoising Method in an Ultra-fast All-optical Solid-state Framing Camera -- LSTM-XGBoost Application of the Model to the Prediction of Stock Price -- Test of integrated urban rail transit vehicle-to-ground communication system based on LTE-U technology -- Research on Efficient Image Inpainting Algorithm Based on Deep Learning -- Subspace Classification of Attention Deficit Hyperactivity Disorder with Laplacian Regularization -- Study the Quantum Transport Process: Machine Learning Simulates Quantum Conditional Master Equation -- Neural Network Study Quantum Synchronization and Quantum Correlation under Non-zero Temperature -- Research on Intelligent Cloud Manufacturing Resource Adaptation Methodology Based on Reinforcement Learning -- Automatic CT Lesion Detection Based On Feature Pyramid Inference with Multi-Scale Response -- A Survey of Chinese Anaphora Resolution -- Efficient 3D Pancreas Segmentation Using Two-stage 3D Convolutional Neural Networks -- Multi-UAV Task Allocation Method Based on Improved Bat Algorithm -- Deep Learning Models for Intelligent Healthcare: Implementation and Challenges -- An Improved YOLOv3 Algorithm Combined with Attention Mechanism for Flame and Smoke Detection -- The Evaluation Method of Safety Classification for Electric Energy Measurement Based on Dynamic Double Fuzzy Reasoning -- Offline Writer Identification Using Convolutional Neural Network and VLAD Descriptors -- A Light-Weight Prediction Model forAero-Engine Surge Based on Seq2Seq -- Simulation Analysis of PLC/WLC Hybrid Communication with traffic model -- A study on the Influence of Economic growth on urban-rural income gap in five northwest Provinces based on unit root and Co-integration test -- Research on Intrusion Detection of Industrial Control System Based on FastICA-SVM Method -- KCFuzz: Directed Fuzzing Based on Keypoint Coverage -- Deep Adversarial Learning Based Heterogeneous Defect Prediction -- Smart grid data anomaly detection method based on cloud computing platform -- A Flexible Planning Approach Using Label Member -- A Survey and Future Perspectives of Hybrid Deep Learning Models for Text Classification -- Non-contact Heart Rate Measurement Based on Fusion Technology -- Research on Cotton Impurity Detection Algorithm Based on Image Segmentation -- Improving Text Matching with Semantic Dependency Graph via Message Passing Neural Network -- Demonstration of Low Power and Low Cost Wireless Sensor Network with Edge Computing.-Analysis on spatial Pattern Evolution of Cultivated land in urban Area based on spatial Autocorrelation Analysis -- A case study of Luoyang City -- Research of Spatial pattern for cultivated land quality in Henan Province based on spatial autocorrelation -- Preamble selection and allocation algorithm based on Q learning -- An Improved Object Detection Algorithm Based on CenterNet -- Survey on Image Object Detection Algorithms based on Deep Learning -- Autocoder Guide Multi-Category Topic Clustering for Keywords Matching -- Adversarial Defense Networks via Gaussian Noise and RBF -- Intelligent Detection and Early Warning System of Railway Track -- Train Driver State Detection System Based on PCA and SVM -- The Offset-Image Recognition Based on Dense Coding -- Self-Supervision adversarial learning network for liver lesion classification -- Mining Consumer Brand Relationship from Social Media Data: A Natural Language Processing Approach -- Weighted Hierarchy Mechanism over BERT for Long Text Classification -- Corrosion Detection in Transformers Based on Hierarchical Annotation -- Fake Calligraphy Recognition Based on Deep Learning -- A Top-k QoS-optimal Service Composition Approach under Dynamic Environment -- Big Data -- Analysis on the Influencing Factors of Mooc Construction based on SPSS Analysis -- A Copyright Protection Scheme of Visual Media in Big Data Environment -- A Fast Sound Ray Tracking Method for Ultra-short Baseline Positioning -- Research on Auxiliary Target Extraction and Recognition Technology in Big Data Environment -- Analysis of Information Dissemination Orientation of New Media Police Microblog Platform -- An Evaluation Method of Population Based on Geographic Raster and Logistic Regression -- Image Compression Algorithm Based on Time Series -- A Resource-saving Multi-layer Fault-tolerant Low Orbit Satellite Network -- Research on business travel problem based on simulated annealing and tabu search algorithms -- Intelligent Security Image Classification on Small Sample Learning -- Intelligent Ecological Environment Control System Design. En lÃnea: https://link-springer-com.biblioproxy.umanizales.edu.co/referencework/10.1007/97 [...] Link: https://biblioteca.umanizales.edu.co/ils/opac_css/index.php?lvl=notice_display&i 7th International Conference, ICAIS 2021, Dublin, Ireland, July 19–23, 2021, Proceedings, Part I [documento electrónico] / Sun, Xingming, ; Zhang, Xiaorui, ; Xia, Zhihua, ; Bertino, Elisa, . - 1 ed. . - [s.l.] : Springer, 2021 . - XXIV, 753 p. 118 ilustraciones, 1 ilustraciones en color.
ISBN : 978-3-030-78609-0
Libro disponible en la plataforma SpringerLink. Descarga y lectura en formatos PDF, HTML y ePub. Descarga completa o por capítulos.
Palabras clave: Software de la aplicacion Inteligencia artificial IngenierÃa Informática Red de computadoras Visión por computador Aplicaciones informáticas y de sistemas de información IngenierÃa Informática y Redes Ãndice Dewey: 005.3 Ciencia de los computadores (Programas) Resumen: Este conjunto de dos volúmenes de LNCS 12736-12737 constituye las actas arbitradas de la 7.ª Conferencia Internacional sobre Inteligencia Artificial y Seguridad, ICAIS 2021, que se celebró en DublÃn, Irlanda, en julio de 2021. La conferencia se llamaba anteriormente "Conferencia Internacional sobre la Nube". Informática y Seguridad†con las siglas ICCCS. El total de 93 artÃculos completos y 29 artÃculos breves presentados en estas actas de dos volúmenes fue cuidadosamente revisado y seleccionado entre 1013 presentaciones. En total, se aceptaron un total de 224 artÃculos completos y 81 artÃculos breves para ICAIS 2021; los demás artÃculos aceptados se presentan en CCIS 1422-1424. Los artÃculos se organizaron en secciones temáticas de la siguiente manera: Parte I: Inteligencia artificial; y big data Parte II: Big data; computación en la nube y seguridad; cifrado y ciberseguridad; ocultación de información; seguridad de la IoT; y análisis forense multimedia. Nota de contenido: Artificial Intelligence -- Research on Spoofing Jamming of Integrated Navigation System on UAV -- Multi-penalty functions GANs via multi-task learning -- Community Detection Model Based on Graph Representation and Self-supervised Learning -- Efficient Distributed Stochastic Gradient Descent through Gaussian Averaging -- Application Research of Improved Particle Swarm Optimization Algorithm Used on Job Shop Scheduling Problem -- Artificial Intelligence Chronic Disease Management System Based on Medical Resource Perception -- Research on Deep Learning Denoising Method in an Ultra-fast All-optical Solid-state Framing Camera -- LSTM-XGBoost Application of the Model to the Prediction of Stock Price -- Test of integrated urban rail transit vehicle-to-ground communication system based on LTE-U technology -- Research on Efficient Image Inpainting Algorithm Based on Deep Learning -- Subspace Classification of Attention Deficit Hyperactivity Disorder with Laplacian Regularization -- Study the Quantum Transport Process: Machine Learning Simulates Quantum Conditional Master Equation -- Neural Network Study Quantum Synchronization and Quantum Correlation under Non-zero Temperature -- Research on Intelligent Cloud Manufacturing Resource Adaptation Methodology Based on Reinforcement Learning -- Automatic CT Lesion Detection Based On Feature Pyramid Inference with Multi-Scale Response -- A Survey of Chinese Anaphora Resolution -- Efficient 3D Pancreas Segmentation Using Two-stage 3D Convolutional Neural Networks -- Multi-UAV Task Allocation Method Based on Improved Bat Algorithm -- Deep Learning Models for Intelligent Healthcare: Implementation and Challenges -- An Improved YOLOv3 Algorithm Combined with Attention Mechanism for Flame and Smoke Detection -- The Evaluation Method of Safety Classification for Electric Energy Measurement Based on Dynamic Double Fuzzy Reasoning -- Offline Writer Identification Using Convolutional Neural Network and VLAD Descriptors -- A Light-Weight Prediction Model forAero-Engine Surge Based on Seq2Seq -- Simulation Analysis of PLC/WLC Hybrid Communication with traffic model -- A study on the Influence of Economic growth on urban-rural income gap in five northwest Provinces based on unit root and Co-integration test -- Research on Intrusion Detection of Industrial Control System Based on FastICA-SVM Method -- KCFuzz: Directed Fuzzing Based on Keypoint Coverage -- Deep Adversarial Learning Based Heterogeneous Defect Prediction -- Smart grid data anomaly detection method based on cloud computing platform -- A Flexible Planning Approach Using Label Member -- A Survey and Future Perspectives of Hybrid Deep Learning Models for Text Classification -- Non-contact Heart Rate Measurement Based on Fusion Technology -- Research on Cotton Impurity Detection Algorithm Based on Image Segmentation -- Improving Text Matching with Semantic Dependency Graph via Message Passing Neural Network -- Demonstration of Low Power and Low Cost Wireless Sensor Network with Edge Computing.-Analysis on spatial Pattern Evolution of Cultivated land in urban Area based on spatial Autocorrelation Analysis -- A case study of Luoyang City -- Research of Spatial pattern for cultivated land quality in Henan Province based on spatial autocorrelation -- Preamble selection and allocation algorithm based on Q learning -- An Improved Object Detection Algorithm Based on CenterNet -- Survey on Image Object Detection Algorithms based on Deep Learning -- Autocoder Guide Multi-Category Topic Clustering for Keywords Matching -- Adversarial Defense Networks via Gaussian Noise and RBF -- Intelligent Detection and Early Warning System of Railway Track -- Train Driver State Detection System Based on PCA and SVM -- The Offset-Image Recognition Based on Dense Coding -- Self-Supervision adversarial learning network for liver lesion classification -- Mining Consumer Brand Relationship from Social Media Data: A Natural Language Processing Approach -- Weighted Hierarchy Mechanism over BERT for Long Text Classification -- Corrosion Detection in Transformers Based on Hierarchical Annotation -- Fake Calligraphy Recognition Based on Deep Learning -- A Top-k QoS-optimal Service Composition Approach under Dynamic Environment -- Big Data -- Analysis on the Influencing Factors of Mooc Construction based on SPSS Analysis -- A Copyright Protection Scheme of Visual Media in Big Data Environment -- A Fast Sound Ray Tracking Method for Ultra-short Baseline Positioning -- Research on Auxiliary Target Extraction and Recognition Technology in Big Data Environment -- Analysis of Information Dissemination Orientation of New Media Police Microblog Platform -- An Evaluation Method of Population Based on Geographic Raster and Logistic Regression -- Image Compression Algorithm Based on Time Series -- A Resource-saving Multi-layer Fault-tolerant Low Orbit Satellite Network -- Research on business travel problem based on simulated annealing and tabu search algorithms -- Intelligent Security Image Classification on Small Sample Learning -- Intelligent Ecological Environment Control System Design. En lÃnea: https://link-springer-com.biblioproxy.umanizales.edu.co/referencework/10.1007/97 [...] Link: https://biblioteca.umanizales.edu.co/ils/opac_css/index.php?lvl=notice_display&i 7th International Conference, ICAIS 2021, Dublin, Ireland, July 19–23, 2021, Proceedings, Part II / Sun, Xingming ; Zhang, Xiaorui ; Xia, Zhihua ; Bertino, Elisa
![]()
TÃtulo : 7th International Conference, ICAIS 2021, Dublin, Ireland, July 19–23, 2021, Proceedings, Part II Tipo de documento: documento electrónico Autores: Sun, Xingming, ; Zhang, Xiaorui, ; Xia, Zhihua, ; Bertino, Elisa, Mención de edición: 1 ed. Editorial: [s.l.] : Springer Fecha de publicación: 2021 Número de páginas: XXIII, 753 p. 353 ilustraciones, 246 ilustraciones en color. ISBN/ISSN/DL: 978-3-030-78612-0 Nota general: Libro disponible en la plataforma SpringerLink. Descarga y lectura en formatos PDF, HTML y ePub. Descarga completa o por capítulos. Palabras clave: Software de la aplicacion IngenierÃa Informática Red de computadoras Protección de datos Inteligencia artificial CriptografÃa Cifrado de datos (Informática) Aplicaciones informáticas y de sistemas de información IngenierÃa Informática y Redes Seguridad de datos e información CriptologÃa Ãndice Dewey: 005.3 Ciencia de los computadores (Programas) Resumen: Este conjunto de dos volúmenes de LNCS 12736-12737 constituye las actas arbitradas de la 7.ª Conferencia Internacional sobre Inteligencia Artificial y Seguridad, ICAIS 2021, que se celebró en DublÃn, Irlanda, en julio de 2021. La conferencia se llamaba anteriormente "Conferencia Internacional sobre la Nube". Informática y Seguridad†con las siglas ICCCS. El total de 93 artÃculos completos y 29 artÃculos breves presentados en estas actas de dos volúmenes fue cuidadosamente revisado y seleccionado entre 1013 presentaciones. En total, se aceptaron un total de 224 artÃculos completos y 81 artÃculos breves para ICAIS 2021; los demás artÃculos aceptados se presentan en CCIS 1422-1424. Los artÃculos se organizaron en secciones temáticas de la siguiente manera: Parte I: Inteligencia artificial; y big data Parte II: Big data; computación en la nube y seguridad; cifrado y ciberseguridad; ocultación de información; seguridad de la IoT; y análisis forense multimedia. Nota de contenido: Big Data -- Research on Optimization of Data Balancing Partition Algorithm Based on Spark Platform -- Research and Implementation of Dimension Reduction Algorithm in Big Data Analysis -- Exploring the informationization of Land Reserve Archives Management -- Research and Implementation of Anomaly Detection Algorithm in Data Mining -- An Empirical Study on Data Sampling for Just-in-Time Defect Prediction -- Design and Implementation of Data Adapter in SWIM -- Cloud Computing and Security -- Encrypted Medical Records Search with Supporting of Fuzzy Multi-Keyword and Relevance Ranking -- A Container-oriented Virtual-machine-introspection-based Security Monitor to Secure Containers in Cloud Computing -- A Computing Task Offloading Scheme for Mobile Edge Computing -- Security Transmission Scheme of Sensitive Data for Mobile Terminal -- Efficient Utilization of Cache Resources for Content Delivery Network Based on Blockchain -- A Dynamic Processing Algorithm for Variable Data in Intranet Security Monitoring -- Personalized Recommendation of English Learning Based on Knowledge Graph and Graph Convolutional Network -- Optimizing Data Placement in Multi-cloud Environments Considering Data Temperature -- Detection of Virtual Machines based on Thread Scheduling -- Graph Attention Network for Word Embeddings -- Firewall Filtering Technology And Application Based On Decision Tree -- Encryption and Cybersecurity -- A DAPP business data storage model based on blockchain and IPFS -- IPv6-Darknet Network Traffic Detection -- Neural Control Based Research of Endogenous Security Model -- Keyword Guessing Attacks on Some Proxy Re-Encryption with Keyword Search Schemes -- A Post-Quantum Certificateless Ring Signature Scheme for Privacy-Preserving of Blockchain Sharing Economy -- A transaction model of bill service based on blockchain -- An N-gram Based Deep Learning Method for Network Traffic Classification -- Interpretability Framework of Network Security Traffic Classification Based on Machine Learning -- Random Parameter Normalization Technique for Mimic Defense based on Multi-queue Architecture -- A Secure and Efficient Key Hierarchical Management and Collaborative Signature Scheme of Blockchain -- Information Hiding -- Covert Communication via Modulating Soft Label of Neural Network -- DCDC-LSB: Double Cover Dark Channel Least Significant Bit Steganography -- Halftone Image Steganography Based on Reassigned Distortion Measurement -- Halftone Image Steganography Based on Maximizing Visual Similarity of Block Units -- High efficiency quantum image steganography protocol based on ZZW framework -- Halftone Image Steganalysis by Reconstructing Grayscale Image -- Halftone Image Steganography Based on Minimizing Distortion with Pixel Density Transition -- Research and Implementation of Medical Information Protection and Sharing based on Blockchain -- IoT Security -- LoRa Network Security Schemes Based on RF Fingerprint -- Smart Home based Sleep Disorder Recognition for Ambient Assisted Living -- Blockchain-based reliable collection mechanism for smart meter quality data -- Power Blockchain Guarantee Mechanism Based on Trusted Computing -- Analysis and Implementation of Distributed DTU Communication Method Based on DDS Protocol -- Sensor Failure Detection Based on Programmable Switch and Machine Learning -- A Solution to Reduce Broadcast Storm in VANET -- a Vehicle Intrusion Detection System Based on Time Interval and Data Field -- An Authentication Mechanism for IoT Devices Based on Accountable and Revocable Identify-based Encryption -- A Load-balancing Algorithm for Power Internet of Things Resources Based on the Improved Weighted Minimum Number of Connections -- Research on Physical Layer Security Strategy in the Scenario of Multiple Eavesdroppers in Cognitive Wireless Networks Based on NOMA -- Opportunistic network performance optimization model based on a combination of neural networks and orthogonal experiments -- Security analysis of measurement automation system based on threat intelligence -- A MOEA-D-based Service Quality Matching Optimization Algorithm in Electric Power Communication Network -- Abnormal Traffic Detection of Industrial Edge Network Based on Deep Nature Learning -- Recent Development, Trends and Challenges in IoT Security -- Energy Optimization for Wild Animal Tracker basing on watchdog technology -- Performance comparison of curve fitting and compressed sensing in channel state information feature extraction -- Dynamic Time Warping Based Passive Crowd Counting Using WiFi Received Signal Strength -- Wi-Fi Indoor Positioning Using D-S Evidence Theory -- A Hybrid Localization Algorithm Based on Carrier Phase Ranging in UHF RFID System -- Multimedia Forensics -- Trusted digital asset copyright confirmation and transaction mechanism based on consortium blockchain -- Automatic Source Camera Identification Technique Based-on Hierarchy Clustering Method -- A Fast Tongue Image Color Correction Method Based on Gray World Method -- Evaluation of RGB Quantization Schemes on Histogram-Based Content Based Image Retrieval. En lÃnea: https://link-springer-com.biblioproxy.umanizales.edu.co/referencework/10.1007/97 [...] Link: https://biblioteca.umanizales.edu.co/ils/opac_css/index.php?lvl=notice_display&i 7th International Conference, ICAIS 2021, Dublin, Ireland, July 19–23, 2021, Proceedings, Part II [documento electrónico] / Sun, Xingming, ; Zhang, Xiaorui, ; Xia, Zhihua, ; Bertino, Elisa, . - 1 ed. . - [s.l.] : Springer, 2021 . - XXIII, 753 p. 353 ilustraciones, 246 ilustraciones en color.
ISBN : 978-3-030-78612-0
Libro disponible en la plataforma SpringerLink. Descarga y lectura en formatos PDF, HTML y ePub. Descarga completa o por capítulos.
Palabras clave: Software de la aplicacion IngenierÃa Informática Red de computadoras Protección de datos Inteligencia artificial CriptografÃa Cifrado de datos (Informática) Aplicaciones informáticas y de sistemas de información IngenierÃa Informática y Redes Seguridad de datos e información CriptologÃa Ãndice Dewey: 005.3 Ciencia de los computadores (Programas) Resumen: Este conjunto de dos volúmenes de LNCS 12736-12737 constituye las actas arbitradas de la 7.ª Conferencia Internacional sobre Inteligencia Artificial y Seguridad, ICAIS 2021, que se celebró en DublÃn, Irlanda, en julio de 2021. La conferencia se llamaba anteriormente "Conferencia Internacional sobre la Nube". Informática y Seguridad†con las siglas ICCCS. El total de 93 artÃculos completos y 29 artÃculos breves presentados en estas actas de dos volúmenes fue cuidadosamente revisado y seleccionado entre 1013 presentaciones. En total, se aceptaron un total de 224 artÃculos completos y 81 artÃculos breves para ICAIS 2021; los demás artÃculos aceptados se presentan en CCIS 1422-1424. Los artÃculos se organizaron en secciones temáticas de la siguiente manera: Parte I: Inteligencia artificial; y big data Parte II: Big data; computación en la nube y seguridad; cifrado y ciberseguridad; ocultación de información; seguridad de la IoT; y análisis forense multimedia. Nota de contenido: Big Data -- Research on Optimization of Data Balancing Partition Algorithm Based on Spark Platform -- Research and Implementation of Dimension Reduction Algorithm in Big Data Analysis -- Exploring the informationization of Land Reserve Archives Management -- Research and Implementation of Anomaly Detection Algorithm in Data Mining -- An Empirical Study on Data Sampling for Just-in-Time Defect Prediction -- Design and Implementation of Data Adapter in SWIM -- Cloud Computing and Security -- Encrypted Medical Records Search with Supporting of Fuzzy Multi-Keyword and Relevance Ranking -- A Container-oriented Virtual-machine-introspection-based Security Monitor to Secure Containers in Cloud Computing -- A Computing Task Offloading Scheme for Mobile Edge Computing -- Security Transmission Scheme of Sensitive Data for Mobile Terminal -- Efficient Utilization of Cache Resources for Content Delivery Network Based on Blockchain -- A Dynamic Processing Algorithm for Variable Data in Intranet Security Monitoring -- Personalized Recommendation of English Learning Based on Knowledge Graph and Graph Convolutional Network -- Optimizing Data Placement in Multi-cloud Environments Considering Data Temperature -- Detection of Virtual Machines based on Thread Scheduling -- Graph Attention Network for Word Embeddings -- Firewall Filtering Technology And Application Based On Decision Tree -- Encryption and Cybersecurity -- A DAPP business data storage model based on blockchain and IPFS -- IPv6-Darknet Network Traffic Detection -- Neural Control Based Research of Endogenous Security Model -- Keyword Guessing Attacks on Some Proxy Re-Encryption with Keyword Search Schemes -- A Post-Quantum Certificateless Ring Signature Scheme for Privacy-Preserving of Blockchain Sharing Economy -- A transaction model of bill service based on blockchain -- An N-gram Based Deep Learning Method for Network Traffic Classification -- Interpretability Framework of Network Security Traffic Classification Based on Machine Learning -- Random Parameter Normalization Technique for Mimic Defense based on Multi-queue Architecture -- A Secure and Efficient Key Hierarchical Management and Collaborative Signature Scheme of Blockchain -- Information Hiding -- Covert Communication via Modulating Soft Label of Neural Network -- DCDC-LSB: Double Cover Dark Channel Least Significant Bit Steganography -- Halftone Image Steganography Based on Reassigned Distortion Measurement -- Halftone Image Steganography Based on Maximizing Visual Similarity of Block Units -- High efficiency quantum image steganography protocol based on ZZW framework -- Halftone Image Steganalysis by Reconstructing Grayscale Image -- Halftone Image Steganography Based on Minimizing Distortion with Pixel Density Transition -- Research and Implementation of Medical Information Protection and Sharing based on Blockchain -- IoT Security -- LoRa Network Security Schemes Based on RF Fingerprint -- Smart Home based Sleep Disorder Recognition for Ambient Assisted Living -- Blockchain-based reliable collection mechanism for smart meter quality data -- Power Blockchain Guarantee Mechanism Based on Trusted Computing -- Analysis and Implementation of Distributed DTU Communication Method Based on DDS Protocol -- Sensor Failure Detection Based on Programmable Switch and Machine Learning -- A Solution to Reduce Broadcast Storm in VANET -- a Vehicle Intrusion Detection System Based on Time Interval and Data Field -- An Authentication Mechanism for IoT Devices Based on Accountable and Revocable Identify-based Encryption -- A Load-balancing Algorithm for Power Internet of Things Resources Based on the Improved Weighted Minimum Number of Connections -- Research on Physical Layer Security Strategy in the Scenario of Multiple Eavesdroppers in Cognitive Wireless Networks Based on NOMA -- Opportunistic network performance optimization model based on a combination of neural networks and orthogonal experiments -- Security analysis of measurement automation system based on threat intelligence -- A MOEA-D-based Service Quality Matching Optimization Algorithm in Electric Power Communication Network -- Abnormal Traffic Detection of Industrial Edge Network Based on Deep Nature Learning -- Recent Development, Trends and Challenges in IoT Security -- Energy Optimization for Wild Animal Tracker basing on watchdog technology -- Performance comparison of curve fitting and compressed sensing in channel state information feature extraction -- Dynamic Time Warping Based Passive Crowd Counting Using WiFi Received Signal Strength -- Wi-Fi Indoor Positioning Using D-S Evidence Theory -- A Hybrid Localization Algorithm Based on Carrier Phase Ranging in UHF RFID System -- Multimedia Forensics -- Trusted digital asset copyright confirmation and transaction mechanism based on consortium blockchain -- Automatic Source Camera Identification Technique Based-on Hierarchy Clustering Method -- A Fast Tongue Image Color Correction Method Based on Gray World Method -- Evaluation of RGB Quantization Schemes on Histogram-Based Content Based Image Retrieval. En lÃnea: https://link-springer-com.biblioproxy.umanizales.edu.co/referencework/10.1007/97 [...] Link: https://biblioteca.umanizales.edu.co/ils/opac_css/index.php?lvl=notice_display&i Advances in Artificial Intelligence and Security / Sun, Xingming ; Zhang, Xiaorui ; Xia, Zhihua ; Bertino, Elisa
![]()
TÃtulo : Advances in Artificial Intelligence and Security : 7th International Conference, ICAIS 2021, Dublin, Ireland, July 19-23, 2021, Proceedings, Part I Tipo de documento: documento electrónico Autores: Sun, Xingming, ; Zhang, Xiaorui, ; Xia, Zhihua, ; Bertino, Elisa, Mención de edición: 1 ed. Editorial: [s.l.] : Springer Fecha de publicación: 2021 Número de páginas: XXX, 730 p. 324 ilustraciones, 208 ilustraciones en color. ISBN/ISSN/DL: 978-3-030-78615-1 Nota general: Libro disponible en la plataforma SpringerLink. Descarga y lectura en formatos PDF, HTML y ePub. Descarga completa o por capítulos. Palabras clave: Protección de datos Aprendizaje automático IngenierÃa Informática Red de computadoras Procesamiento de imágenes Visión por computador Ciencias sociales Seguridad de datos e información IngenierÃa Informática y Redes Imágenes por computadora visión reconocimiento de patrones y gráficos Aplicación informática en ciencias sociales y del comportamiento Computadoras y Educación Ãndice Dewey: 005.8 Ciencia de los computadores (Programación, programas de sistemas) Resumen: El conjunto de tres volúmenes CCIS 1422, CCIS 1423 y CCIS 1424 constituye las actas arbitradas de la 7.ª Conferencia Internacional sobre Inteligencia y Seguridad Artificial, ICAIS 2021, que se celebró en DublÃn, Irlanda, en julio de 2021. El total de 131 artÃculos completos y Se revisaron y seleccionaron cuidadosamente 52 artÃculos breves presentados en estas actas de 3 volúmenes entre 1013 presentaciones. Los artÃculos se organizaron en secciones temáticas de la siguiente manera: Parte I: inteligencia artificial; Parte II: inteligencia artificial; grandes datos; computación en la nube y seguridad en Internet; Parte III: computación en la nube y seguridad; cifrado y ciberseguridad; ocultación de información; Seguridad de la IO. . Nota de contenido: Artificial Intelligence -- A Load Balancing Mechanism for a Multi-Controller Software Defined WiFi Network -- HGC:Hybrid Gradient Compression in Distributed Deep Learning -- Application of Lidar INS Integrated Positioning in Automatic Driving -- A Review of Named Entity Recognition in Chinese Medical Text -- Robust liver vessel extraction using DV-Net with D-BCE loss function -- Cloud computing-based graph convolutional network power consumption prediction method -- Intelligent Intrusion Detection of Measurement Automation System Based on Deep Learning -- LSTM-Exploit:Intelligent Penetration Based On LSTM Tool -- Pig target detection from image based on improved YOLO V3 -- ICPM: An Intelligent Compound Prediction Model Based on GA and GRNN -- A new method of halftoning and inverse halftoning based on GAN Network -- Sow Estrus Diagnosis from Sound Samples based on Improved Deep Learning -- Research on YOLO Model and its application in Fault Status recognition of freight trains -- Feedforward Deep Neural Network-Based Model for the Forecast of Severe Convective Wind -- Asynchronous Compatible D-ML System for Edge Devices -- Ball K-Medoids: Faster and Exacter -- GVNP: Global Vectors for Node Representation -- Investigation on Loan Approval Based on Convolutional Neural Network -- Chinese Verb-Object Collocation Knowledge Graph Construction and Application -- Optimal Deployment of Underwater Sensor Networks Based on Hungarian Algorithm -- Discrete Multi-Height Wind Farm Layout Optimization for Optimal Energy Output -- Multilevel Threshold Image Segmentation Based on Modified Moth-flame Optimization Algorithm -- Research on critical illness fundraising methods based on blockchain and smart contracts -- Collaboration Energy Efficiency with Mobile Edge Computing for Data Collection in IoT -- Improving the Transformer Translation Model with Back-Translation -- Rigid Image Registration based on Graph Matching -- A Multi-scale Fusion Method For Dense Crowd Counting -- Chinese text classification based on adversarial training -- Research on SVM Parameter Optimization Mechanism Based on Particle Swarm Optimization -- A parameter selection method based on reinforcement learning: the QoS-privacy trade-off for adversarial training framework -- Word Research on Sentiment Analysis of Foreign News Reports Concerning China Based On the Hybrid Model of Opinion Sentence and BLSTM-Attention -- Cascaded Convolutional Neural Network for Image Super-Resolution -- Risk Probability Forecast Technology of the Gust in Beijing Winter Olympic Games based on the Theory of Digital Image Processing -- Depth estimation based on optical flow and depth prediction -- The Algorithms for Word Segmentation and Named Entity Recognition of Chinese Medical Records -- Temperature forecasting based on LSTM in coastal city -- Recent Progress of Medical CT Image Processing based on Deep Learning -- Road Damage Detection and Classification based on M2det -- Weather Temperature Prediction Based on LSTM-Bayesian Optimization -- Research Situation and Development Trends of Deep Learning application in Meteorology -- Exploiting Spatial-Spectral Feature for Hyperspectral Image Classification based on 3-D CNN and Bi-LSTM -- Automated Methods for Symptom Normalization in Traditional Chinese Medicine Records -- A Nested Named Entity Recognition Method for Traditional Chinese Medicine Records -- Face Feature Extraction and Recognition Based on Lighted Deep Convolutional Neural Network -- Non-Orthogonal Multiple Access is Used for Power Allocation to MaximizeThroughput in Cognitive Radio Network Systems -- Research on Drug Response Prediction Model Based on Big Data -- A Cross-Modal Image-Text Retrieval System with Deep Learning -- Research on Behavioral Decision Reward Mechanism of Unmanned Swarm System in Confrontational Environment -- A Variable Step-Size based Iterative Algorithm for High-precision Ranging using FMCW Radar -- Research on the Smart Management and Service of Smart Classrooms in Colleges and Universities -- Performance Analysis of Hard Fusion Rules in Cognitive Radio Networks over Composite Channels -- Performance Analysis of Spectrum Sensing in Cognitive Radio Networks Based on AD Goodness of Fit under Noise Uncertainty -- Research on Prediction Algorithm for Heavy Overload of Main Equipment in Distribution Network -- Review of Attention Mechanism in Electric Power Systems -- Comprehensive review of intelligent operation and maintenance of power system in China -- An Incremental Learning Method for Fault Diagnosis Based on Random Forest -- Research on Short-term Flow Forecast of Intelligent Traffic -- Research on Stock Price Forecasting Based on BP Neural Network -- Trust Computing Model of online transaction based on Social Network and Mobile Agent -- An Adaptive Momentum Term based Optimization Method for Image Restoration -- Research on Situational Awareness Security Defense of Intrusion Link Based on Data Element Characteristic Network Transmission Signal -- Research on Proofreading Method of Semantic Collocation Error in Chinese. En lÃnea: https://link-springer-com.biblioproxy.umanizales.edu.co/referencework/10.1007/97 [...] Link: https://biblioteca.umanizales.edu.co/ils/opac_css/index.php?lvl=notice_display&i Advances in Artificial Intelligence and Security : 7th International Conference, ICAIS 2021, Dublin, Ireland, July 19-23, 2021, Proceedings, Part I [documento electrónico] / Sun, Xingming, ; Zhang, Xiaorui, ; Xia, Zhihua, ; Bertino, Elisa, . - 1 ed. . - [s.l.] : Springer, 2021 . - XXX, 730 p. 324 ilustraciones, 208 ilustraciones en color.
ISBN : 978-3-030-78615-1
Libro disponible en la plataforma SpringerLink. Descarga y lectura en formatos PDF, HTML y ePub. Descarga completa o por capítulos.
Palabras clave: Protección de datos Aprendizaje automático IngenierÃa Informática Red de computadoras Procesamiento de imágenes Visión por computador Ciencias sociales Seguridad de datos e información IngenierÃa Informática y Redes Imágenes por computadora visión reconocimiento de patrones y gráficos Aplicación informática en ciencias sociales y del comportamiento Computadoras y Educación Ãndice Dewey: 005.8 Ciencia de los computadores (Programación, programas de sistemas) Resumen: El conjunto de tres volúmenes CCIS 1422, CCIS 1423 y CCIS 1424 constituye las actas arbitradas de la 7.ª Conferencia Internacional sobre Inteligencia y Seguridad Artificial, ICAIS 2021, que se celebró en DublÃn, Irlanda, en julio de 2021. El total de 131 artÃculos completos y Se revisaron y seleccionaron cuidadosamente 52 artÃculos breves presentados en estas actas de 3 volúmenes entre 1013 presentaciones. Los artÃculos se organizaron en secciones temáticas de la siguiente manera: Parte I: inteligencia artificial; Parte II: inteligencia artificial; grandes datos; computación en la nube y seguridad en Internet; Parte III: computación en la nube y seguridad; cifrado y ciberseguridad; ocultación de información; Seguridad de la IO. . Nota de contenido: Artificial Intelligence -- A Load Balancing Mechanism for a Multi-Controller Software Defined WiFi Network -- HGC:Hybrid Gradient Compression in Distributed Deep Learning -- Application of Lidar INS Integrated Positioning in Automatic Driving -- A Review of Named Entity Recognition in Chinese Medical Text -- Robust liver vessel extraction using DV-Net with D-BCE loss function -- Cloud computing-based graph convolutional network power consumption prediction method -- Intelligent Intrusion Detection of Measurement Automation System Based on Deep Learning -- LSTM-Exploit:Intelligent Penetration Based On LSTM Tool -- Pig target detection from image based on improved YOLO V3 -- ICPM: An Intelligent Compound Prediction Model Based on GA and GRNN -- A new method of halftoning and inverse halftoning based on GAN Network -- Sow Estrus Diagnosis from Sound Samples based on Improved Deep Learning -- Research on YOLO Model and its application in Fault Status recognition of freight trains -- Feedforward Deep Neural Network-Based Model for the Forecast of Severe Convective Wind -- Asynchronous Compatible D-ML System for Edge Devices -- Ball K-Medoids: Faster and Exacter -- GVNP: Global Vectors for Node Representation -- Investigation on Loan Approval Based on Convolutional Neural Network -- Chinese Verb-Object Collocation Knowledge Graph Construction and Application -- Optimal Deployment of Underwater Sensor Networks Based on Hungarian Algorithm -- Discrete Multi-Height Wind Farm Layout Optimization for Optimal Energy Output -- Multilevel Threshold Image Segmentation Based on Modified Moth-flame Optimization Algorithm -- Research on critical illness fundraising methods based on blockchain and smart contracts -- Collaboration Energy Efficiency with Mobile Edge Computing for Data Collection in IoT -- Improving the Transformer Translation Model with Back-Translation -- Rigid Image Registration based on Graph Matching -- A Multi-scale Fusion Method For Dense Crowd Counting -- Chinese text classification based on adversarial training -- Research on SVM Parameter Optimization Mechanism Based on Particle Swarm Optimization -- A parameter selection method based on reinforcement learning: the QoS-privacy trade-off for adversarial training framework -- Word Research on Sentiment Analysis of Foreign News Reports Concerning China Based On the Hybrid Model of Opinion Sentence and BLSTM-Attention -- Cascaded Convolutional Neural Network for Image Super-Resolution -- Risk Probability Forecast Technology of the Gust in Beijing Winter Olympic Games based on the Theory of Digital Image Processing -- Depth estimation based on optical flow and depth prediction -- The Algorithms for Word Segmentation and Named Entity Recognition of Chinese Medical Records -- Temperature forecasting based on LSTM in coastal city -- Recent Progress of Medical CT Image Processing based on Deep Learning -- Road Damage Detection and Classification based on M2det -- Weather Temperature Prediction Based on LSTM-Bayesian Optimization -- Research Situation and Development Trends of Deep Learning application in Meteorology -- Exploiting Spatial-Spectral Feature for Hyperspectral Image Classification based on 3-D CNN and Bi-LSTM -- Automated Methods for Symptom Normalization in Traditional Chinese Medicine Records -- A Nested Named Entity Recognition Method for Traditional Chinese Medicine Records -- Face Feature Extraction and Recognition Based on Lighted Deep Convolutional Neural Network -- Non-Orthogonal Multiple Access is Used for Power Allocation to MaximizeThroughput in Cognitive Radio Network Systems -- Research on Drug Response Prediction Model Based on Big Data -- A Cross-Modal Image-Text Retrieval System with Deep Learning -- Research on Behavioral Decision Reward Mechanism of Unmanned Swarm System in Confrontational Environment -- A Variable Step-Size based Iterative Algorithm for High-precision Ranging using FMCW Radar -- Research on the Smart Management and Service of Smart Classrooms in Colleges and Universities -- Performance Analysis of Hard Fusion Rules in Cognitive Radio Networks over Composite Channels -- Performance Analysis of Spectrum Sensing in Cognitive Radio Networks Based on AD Goodness of Fit under Noise Uncertainty -- Research on Prediction Algorithm for Heavy Overload of Main Equipment in Distribution Network -- Review of Attention Mechanism in Electric Power Systems -- Comprehensive review of intelligent operation and maintenance of power system in China -- An Incremental Learning Method for Fault Diagnosis Based on Random Forest -- Research on Short-term Flow Forecast of Intelligent Traffic -- Research on Stock Price Forecasting Based on BP Neural Network -- Trust Computing Model of online transaction based on Social Network and Mobile Agent -- An Adaptive Momentum Term based Optimization Method for Image Restoration -- Research on Situational Awareness Security Defense of Intrusion Link Based on Data Element Characteristic Network Transmission Signal -- Research on Proofreading Method of Semantic Collocation Error in Chinese. En lÃnea: https://link-springer-com.biblioproxy.umanizales.edu.co/referencework/10.1007/97 [...] Link: https://biblioteca.umanizales.edu.co/ils/opac_css/index.php?lvl=notice_display&i Advances in Artificial Intelligence and Security / Sun, Xingming ; Zhang, Xiaorui ; Xia, Zhihua ; Bertino, Elisa
![]()
TÃtulo : Advances in Artificial Intelligence and Security : 7th International Conference, ICAIS 2021, Dublin, Ireland, July 19-23, 2021, Proceedings, Part II Tipo de documento: documento electrónico Autores: Sun, Xingming, ; Zhang, Xiaorui, ; Xia, Zhihua, ; Bertino, Elisa, Mención de edición: 1 ed. Editorial: [s.l.] : Springer Fecha de publicación: 2021 Número de páginas: XVIII, 746 p. 111 ilustraciones ISBN/ISSN/DL: 978-3-030-78618-2 Nota general: Libro disponible en la plataforma SpringerLink. Descarga y lectura en formatos PDF, HTML y ePub. Descarga completa o por capítulos. Palabras clave: Protección de datos Software de la aplicacion Red de computadoras Sistemas informáticos Computadoras Propósitos especiales Gestión de base de datos Seguridad de datos e información Aplicaciones informáticas y de sistemas de información Redes de comunicación informática Implementación de sistema informático Sistemas de propósito especial y basados ​​en aplicaciones Ãndice Dewey: 005.8 Ciencia de los computadores (Programación, programas de sistemas) Resumen: El conjunto de tres volúmenes CCIS 1422, CCIS 1423 y CCIS 1424 constituye las actas arbitradas de la 7.ª Conferencia Internacional sobre Inteligencia y Seguridad Artificial, ICAIS 2021, que se celebró en DublÃn, Irlanda, en julio de 2021. El total de 131 artÃculos completos y Se revisaron y seleccionaron cuidadosamente 52 artÃculos breves presentados en estas actas de 3 volúmenes entre 1013 presentaciones. Los artÃculos se organizaron en secciones temáticas de la siguiente manera: Parte I: inteligencia artificial; Parte II: inteligencia artificial; grandes datos; computación en la nube y seguridad en Internet; Parte III: computación en la nube y seguridad; cifrado y ciberseguridad; ocultación de información; Seguridad de la IO. . Nota de contenido: Artificial Intelligence -- An approach based on demand prediction with LSTM for solving multi-batch 2D cutting stock problems -- The identification of slope crack based on convolutional neural network -- Multi-dimensional fatigue driving detection method based on SVM improved by the kernel function -- Experiments of Federated Learning for COVID-19 Chest X-ray Images -- A Novel Network Covert Channel Model based on Blockchain Transaction Parity -- An Improved CNN Model for Fast Salient Object Detection -- Control system design of transport Robot based on Multi-color Recognition -- SACache: Size-Aware Load Balancing for Large-Scale Storage Systems -- Heterogeneous-ISA Application Migration in Edge Computing: Challenges, Techniques and Open Issues -- The Interaction Between Probe and Cavity Field Assists Quantum Synchronization -- Big Data -- W-Louvain:A Group Detection Algorithm Based On Synthetic Vectors -- Application of non-negative matrix factorization in faultdetection of distribution network -- Patent Citation Network Analysis Based on Improved Main Path Analysis: Mapping Key Technology Trajectory -- On-chain and Off-chain Collaborative Management System Based on Consortium Blockchain -- The Implementation of Aeronautical Information Exchange Model in SWIM -- CCTL: Cascade Classifier Text Localization Algorithm in Natural Scene Image -- Research on the Application of Big Data Analysis in University Library -- Research on Support Vector Machine in Traffic Detection Algorithm -- Application Research on Crop Straw Biomass Waste in Logistics Packaging System -- Research On Data Analysis To Improve English Vocabulary Learning Performance -- Hungarian Method in a car-sharing system application research -- Network Topology Discovery Based on Classification Algorithm -- Research on Feature Words for IoT Device Recognition Based on Word2vec -- Coverless Information Hiding Method Based on Combination Morse code and Double Cycle Application of Starter -- Application of Grey Forecasting Model to CPI Index Forecast -- A Preliminary Study about Star Image Processing Method in Harsh Environment -- Combining Turning Point Detection with Grid Transformation for Road Intersection Detection -- Evaluation of Training Effect of New Professional Farmers Based on BP Neural Network -- Evaluation of training effect of new-type professional Farmer based on cloud model -- A study on the characteristics of college students' consumption behavior based on clustering and association rules -- Research and Application of Nuclear Reactor Computational Data Framework Based on HDF5 -- Exploiting API description information to improve code comment generation -- A Tag Recommendation Method for OpenStreetMap Based on FP-Growth and Improved Markov Process -- Data Processing and Development of Big Data System: A Survey -- Current PHM Surveys for Mechanical Engineering -- Multi-sensor Fusion Detection Method for Vehicle Target Based on Kalman Filter and Data Association Filter.-Research on Crop Growth Period Estimation Based on Fusion Features -- Research and Application of Holographic Portrait Label System Construction for Main Equipment of Distribution Network Based on Big Data -- An Empirical Study on the Tourism Image of Nanjing From the Perspective of International Students -- Anomaly detection based on isolated forests -- An Information Identification Method for Venture Firms based on Frequent Itemset Discovery -- Design of Abnormal Behavior Detection System in the State Grid Business Office -- Research on the Application of Intelligent Detection Technology in Business Hall System -- Study on Freshness Indicator Agent of Natural Plant Pigment -- Multi-dimensional Visualization and Simulation Analysis of COVID-19 Outbreak -- Enterprise Electricity Consumption Forecasting Method Based on Federated Learning -- Cloud Computing and Security -- Revisit Raft Consistency Protocol on Private Blockchain System in High Network Latency -- Privacy-Preserving Outsourced Nash Equilibrium Computation in Cloud Computing -- Efficient Multi-Receiver Certificate-Based Proxy Re-Encryption Scheme for Secure Cloud Data Sharing -- Identity Authentication Technology in Edge Computing Environment: Vision and Challenges -- Research on Security Mechanism and Forensics of SQLite Database -- Research On Software Defined Programmable Strategy of Fireworks Model Oriented To Edge Computing Nodes -- Boolean functions with a few Walsh transform values -- Research on Automation Strategy of Coq -- A Model Design of Cost-effificient Blockchain Framework for E-Government Application -- Offloading Method Based on Reinforcement Learning in Mobile Edge Computing -- A Dynamic Decision-making Method for Endorser Node Selection -- A Proxy Node Resource Load Balancing Strategy Based on the Swift System -- Research on the Picture Database of Minority Emotion -- Instant Messaging Application Traffic Recognition. En lÃnea: https://link-springer-com.biblioproxy.umanizales.edu.co/referencework/10.1007/97 [...] Link: https://biblioteca.umanizales.edu.co/ils/opac_css/index.php?lvl=notice_display&i Advances in Artificial Intelligence and Security : 7th International Conference, ICAIS 2021, Dublin, Ireland, July 19-23, 2021, Proceedings, Part II [documento electrónico] / Sun, Xingming, ; Zhang, Xiaorui, ; Xia, Zhihua, ; Bertino, Elisa, . - 1 ed. . - [s.l.] : Springer, 2021 . - XVIII, 746 p. 111 ilustraciones.
ISBN : 978-3-030-78618-2
Libro disponible en la plataforma SpringerLink. Descarga y lectura en formatos PDF, HTML y ePub. Descarga completa o por capítulos.
Palabras clave: Protección de datos Software de la aplicacion Red de computadoras Sistemas informáticos Computadoras Propósitos especiales Gestión de base de datos Seguridad de datos e información Aplicaciones informáticas y de sistemas de información Redes de comunicación informática Implementación de sistema informático Sistemas de propósito especial y basados ​​en aplicaciones Ãndice Dewey: 005.8 Ciencia de los computadores (Programación, programas de sistemas) Resumen: El conjunto de tres volúmenes CCIS 1422, CCIS 1423 y CCIS 1424 constituye las actas arbitradas de la 7.ª Conferencia Internacional sobre Inteligencia y Seguridad Artificial, ICAIS 2021, que se celebró en DublÃn, Irlanda, en julio de 2021. El total de 131 artÃculos completos y Se revisaron y seleccionaron cuidadosamente 52 artÃculos breves presentados en estas actas de 3 volúmenes entre 1013 presentaciones. Los artÃculos se organizaron en secciones temáticas de la siguiente manera: Parte I: inteligencia artificial; Parte II: inteligencia artificial; grandes datos; computación en la nube y seguridad en Internet; Parte III: computación en la nube y seguridad; cifrado y ciberseguridad; ocultación de información; Seguridad de la IO. . Nota de contenido: Artificial Intelligence -- An approach based on demand prediction with LSTM for solving multi-batch 2D cutting stock problems -- The identification of slope crack based on convolutional neural network -- Multi-dimensional fatigue driving detection method based on SVM improved by the kernel function -- Experiments of Federated Learning for COVID-19 Chest X-ray Images -- A Novel Network Covert Channel Model based on Blockchain Transaction Parity -- An Improved CNN Model for Fast Salient Object Detection -- Control system design of transport Robot based on Multi-color Recognition -- SACache: Size-Aware Load Balancing for Large-Scale Storage Systems -- Heterogeneous-ISA Application Migration in Edge Computing: Challenges, Techniques and Open Issues -- The Interaction Between Probe and Cavity Field Assists Quantum Synchronization -- Big Data -- W-Louvain:A Group Detection Algorithm Based On Synthetic Vectors -- Application of non-negative matrix factorization in faultdetection of distribution network -- Patent Citation Network Analysis Based on Improved Main Path Analysis: Mapping Key Technology Trajectory -- On-chain and Off-chain Collaborative Management System Based on Consortium Blockchain -- The Implementation of Aeronautical Information Exchange Model in SWIM -- CCTL: Cascade Classifier Text Localization Algorithm in Natural Scene Image -- Research on the Application of Big Data Analysis in University Library -- Research on Support Vector Machine in Traffic Detection Algorithm -- Application Research on Crop Straw Biomass Waste in Logistics Packaging System -- Research On Data Analysis To Improve English Vocabulary Learning Performance -- Hungarian Method in a car-sharing system application research -- Network Topology Discovery Based on Classification Algorithm -- Research on Feature Words for IoT Device Recognition Based on Word2vec -- Coverless Information Hiding Method Based on Combination Morse code and Double Cycle Application of Starter -- Application of Grey Forecasting Model to CPI Index Forecast -- A Preliminary Study about Star Image Processing Method in Harsh Environment -- Combining Turning Point Detection with Grid Transformation for Road Intersection Detection -- Evaluation of Training Effect of New Professional Farmers Based on BP Neural Network -- Evaluation of training effect of new-type professional Farmer based on cloud model -- A study on the characteristics of college students' consumption behavior based on clustering and association rules -- Research and Application of Nuclear Reactor Computational Data Framework Based on HDF5 -- Exploiting API description information to improve code comment generation -- A Tag Recommendation Method for OpenStreetMap Based on FP-Growth and Improved Markov Process -- Data Processing and Development of Big Data System: A Survey -- Current PHM Surveys for Mechanical Engineering -- Multi-sensor Fusion Detection Method for Vehicle Target Based on Kalman Filter and Data Association Filter.-Research on Crop Growth Period Estimation Based on Fusion Features -- Research and Application of Holographic Portrait Label System Construction for Main Equipment of Distribution Network Based on Big Data -- An Empirical Study on the Tourism Image of Nanjing From the Perspective of International Students -- Anomaly detection based on isolated forests -- An Information Identification Method for Venture Firms based on Frequent Itemset Discovery -- Design of Abnormal Behavior Detection System in the State Grid Business Office -- Research on the Application of Intelligent Detection Technology in Business Hall System -- Study on Freshness Indicator Agent of Natural Plant Pigment -- Multi-dimensional Visualization and Simulation Analysis of COVID-19 Outbreak -- Enterprise Electricity Consumption Forecasting Method Based on Federated Learning -- Cloud Computing and Security -- Revisit Raft Consistency Protocol on Private Blockchain System in High Network Latency -- Privacy-Preserving Outsourced Nash Equilibrium Computation in Cloud Computing -- Efficient Multi-Receiver Certificate-Based Proxy Re-Encryption Scheme for Secure Cloud Data Sharing -- Identity Authentication Technology in Edge Computing Environment: Vision and Challenges -- Research on Security Mechanism and Forensics of SQLite Database -- Research On Software Defined Programmable Strategy of Fireworks Model Oriented To Edge Computing Nodes -- Boolean functions with a few Walsh transform values -- Research on Automation Strategy of Coq -- A Model Design of Cost-effificient Blockchain Framework for E-Government Application -- Offloading Method Based on Reinforcement Learning in Mobile Edge Computing -- A Dynamic Decision-making Method for Endorser Node Selection -- A Proxy Node Resource Load Balancing Strategy Based on the Swift System -- Research on the Picture Database of Minority Emotion -- Instant Messaging Application Traffic Recognition. En lÃnea: https://link-springer-com.biblioproxy.umanizales.edu.co/referencework/10.1007/97 [...] Link: https://biblioteca.umanizales.edu.co/ils/opac_css/index.php?lvl=notice_display&i Advances in Artificial Intelligence and Security / Sun, Xingming ; Zhang, Xiaorui ; Xia, Zhihua ; Bertino, Elisa
![]()
TÃtulo : Advances in Artificial Intelligence and Security : 7th International Conference, ICAIS 2021, Dublin, Ireland, July 19-23, 2021, Proceedings, Part III Tipo de documento: documento electrónico Autores: Sun, Xingming, ; Zhang, Xiaorui, ; Xia, Zhihua, ; Bertino, Elisa, Mención de edición: 1 ed. Editorial: [s.l.] : Springer Fecha de publicación: 2021 Número de páginas: XVIII, 758 p. 330 ilustraciones, 206 ilustraciones en color. ISBN/ISSN/DL: 978-3-030-78621-2 Nota general: Libro disponible en la plataforma SpringerLink. Descarga y lectura en formatos PDF, HTML y ePub. Descarga completa o por capítulos. Palabras clave: Protección de datos IngenierÃa Informática Red de computadoras Sistemas informáticos CriptografÃa Cifrado de datos (Informática) TeorÃa de la codificación TeorÃa de la información Seguridad de datos e información IngenierÃa Informática y Redes Redes de comunicación informática Implementación de sistema informático CriptologÃa TeorÃa de la codificación y la información Ãndice Dewey: 005.8 Ciencia de los computadores (Programación, programas de sistemas) Resumen: El conjunto de tres volúmenes CCIS 1422, CCIS 1423 y CCIS 1424 constituye las actas arbitradas de la 7.ª Conferencia Internacional sobre Inteligencia y Seguridad Artificial, ICAIS 2021, que se celebró en DublÃn, Irlanda, en julio de 2021. El total de 131 artÃculos completos y Se revisaron y seleccionaron cuidadosamente 52 artÃculos breves presentados en estas actas de 3 volúmenes entre 1013 presentaciones. Los artÃculos se organizaron en secciones temáticas de la siguiente manera: Parte I: inteligencia artificial; Parte II: inteligencia artificial; grandes datos; computación en la nube y seguridad; Parte III: computación en la nube y seguridad; cifrado y ciberseguridad; ocultación de información; Seguridad de la IO. . Nota de contenido: Cloud Computing and Security -- Design and Implementation of Information Detection System Based On Privacy Sensitive Data -- Performance Modeling of OpenMP Program Based On LLVM Compilation Platform -- A Method of network attack recognition Based on CNN+LSTM Model -- Encryption and Cybersecurity -- Recognition Method of Abnormal Data in Local Area Network Common Channel Based on Convolutional Neural Network -- MCF-CSA: A Multi-level Collaboration Framework for Cyber Situation Awareness and Information Sharing -- VABox: A Virtualization-based Analysis Framework of Virtualization-Obfuscated Packed Executables -- Imbalance Malware Classification by Decoupling Representation and Classifier- The promotion of online communication ability of mainstream media- HNN-based Prediction Method Supporting Discovery of Production Abnormal -- Efficient Forward and Backward Private Searchable Symmetric Encryption for Multiple Data Sources -- A feature extracting and matching system based on magic-number and AC-algorithm -- A Review: How to detect malicious domains -- A Homomorphic Encryption Method for Power Data Based on Improved Paillier Algorithm -- The Vulnerabilities in Smart Contracts: A Survey -- Detection of false data injection attacks in Smart Grid based on Machine Learning -- An Adversarial Examples Defense Method Based on Image Low-frequency Information -- Information Hiding -- A Robust Watermarking Algorithm for Video Game Artwork Based on Pose Estimation Neural Network -- Research on Content Authentication Technology of Electronic Bills Based on Text Watermarking Algorithm -- Finding the better distortion function from prior scheme for Image Steganography -- Application in Aviation Customer Churn Prediction Using Classification Algorithm Based on Machine Learning -- Color Image Steganography Scheme Based on Convolutional Neural Network -- Robust JPEG steganography using singular value decomposition in DCT domain -- 3D Coverless Image SteganographyScheme Based on 3D Slice Technology -- Software Information Hiding Algorithm Based on Import Table of Portable Executable File -- A Novel Robust Reversible Watermarking Method Against JPEG Compression -- A Common Steganalysis Method of Low Embedding Rate Steganography in Compressed Speech Based on Hierarchy Feature Extraction and Fusion -- TStego-THU: Large-scale Text Steganalysis Dataset -- IoT Security -- Integration Innovation of Competitive Intelligence, AI and Big Data Analysis -- A Comprehensive Review of IoT Technologies and Applications for Healthcare -- A Pervasive Narrow-band Internet of Things (NB-IoT) based health monitoring platform for Ambient Assisted Living,. Design and Development of Field Mobile Monitoring System for Forest Fire Fighting -- ZigBee Wireless Network Attack and Detection -- Joint ToF and Doppler Estimation for Reflection Path Under the Wi-Fi TTW Scenario -- Securing Satellite Internet of Things by Perceiving Content Semantics -- Research on Cultivating Senior Technical Talents Based on the Internet of Things Platform -- Liquid Metal Droplet Series Based Wire Oscillation -- Linear Time-invariant System Reduced-order Finite-time Observer -- Research on invulnerability of WSN based on small world characteristics of complex networks -- Collaboration energy efficiency with mobile edge computing for target tracking in IOT -- Realization of CSI-based Human Behavior Recognition: A Survey -- Security Analysis of Blockchain Smart Contract: Taking Reentrancy Vulnerability as an Example -- Research on Data Security Protection System of Monitoring and Acquisition System Based on Block Chain Technology -- Adaptive Active Immune Policy for Sensing Nodes in Internet of Things -- ELM Forecasted Model of Ammonia Nitrogen in Lake Taihu Combined with Adaboost and Particle Swarm Optimization Algorithms -- Study on Identification of Multiple Pesticide Residues in Lettuce Leaves Based on Hyperspectral Technology -- Robust JPEG Image Steganography Based onSVD in Wavelet Domain -- Raw Material Traceability of Industrial Control System based on Blockchain -- Survey: Research on Blockchain Consensus Mechanism in IoT Security -- Research on Life Prediction Model of Field Seismic Equipment Based on IFA-RVM Algorithm -- Optimization of Location Technology in Meteorological Wireless Sensor Network -- A Survey on the Applications of Wi-Fi Sensing -- Efficient Partially Policy-Hidden CP-ABE for IoT assisted Smart Health -- A Novel Hand Gesture Recognition Method for FMCW Radar -- A Novel Blockchain-based Revocable Permission Management on CP-ABE Scheme.-Automated Authentication of Large-scale IoT Devices with Hybrid Feature Selection -- A Practical Blockchain Framework for Securing IoT Applications -- A Blockchain-based Internet of Things Forensics Model -- Network Device Identification based on MAC Boundary Inference -- Providing Network-based Datasets and Multi-dimensional Features for IoT Botnet Detection Research -- The cross-domain identity authentication scheme has no trusted authentication center in the cloud environment -- A Caching Strategy Based On Content Popularity Level for NDN. . En lÃnea: https://link-springer-com.biblioproxy.umanizales.edu.co/referencework/10.1007/97 [...] Link: https://biblioteca.umanizales.edu.co/ils/opac_css/index.php?lvl=notice_display&i Advances in Artificial Intelligence and Security : 7th International Conference, ICAIS 2021, Dublin, Ireland, July 19-23, 2021, Proceedings, Part III [documento electrónico] / Sun, Xingming, ; Zhang, Xiaorui, ; Xia, Zhihua, ; Bertino, Elisa, . - 1 ed. . - [s.l.] : Springer, 2021 . - XVIII, 758 p. 330 ilustraciones, 206 ilustraciones en color.
ISBN : 978-3-030-78621-2
Libro disponible en la plataforma SpringerLink. Descarga y lectura en formatos PDF, HTML y ePub. Descarga completa o por capítulos.
Palabras clave: Protección de datos IngenierÃa Informática Red de computadoras Sistemas informáticos CriptografÃa Cifrado de datos (Informática) TeorÃa de la codificación TeorÃa de la información Seguridad de datos e información IngenierÃa Informática y Redes Redes de comunicación informática Implementación de sistema informático CriptologÃa TeorÃa de la codificación y la información Ãndice Dewey: 005.8 Ciencia de los computadores (Programación, programas de sistemas) Resumen: El conjunto de tres volúmenes CCIS 1422, CCIS 1423 y CCIS 1424 constituye las actas arbitradas de la 7.ª Conferencia Internacional sobre Inteligencia y Seguridad Artificial, ICAIS 2021, que se celebró en DublÃn, Irlanda, en julio de 2021. El total de 131 artÃculos completos y Se revisaron y seleccionaron cuidadosamente 52 artÃculos breves presentados en estas actas de 3 volúmenes entre 1013 presentaciones. Los artÃculos se organizaron en secciones temáticas de la siguiente manera: Parte I: inteligencia artificial; Parte II: inteligencia artificial; grandes datos; computación en la nube y seguridad; Parte III: computación en la nube y seguridad; cifrado y ciberseguridad; ocultación de información; Seguridad de la IO. . Nota de contenido: Cloud Computing and Security -- Design and Implementation of Information Detection System Based On Privacy Sensitive Data -- Performance Modeling of OpenMP Program Based On LLVM Compilation Platform -- A Method of network attack recognition Based on CNN+LSTM Model -- Encryption and Cybersecurity -- Recognition Method of Abnormal Data in Local Area Network Common Channel Based on Convolutional Neural Network -- MCF-CSA: A Multi-level Collaboration Framework for Cyber Situation Awareness and Information Sharing -- VABox: A Virtualization-based Analysis Framework of Virtualization-Obfuscated Packed Executables -- Imbalance Malware Classification by Decoupling Representation and Classifier- The promotion of online communication ability of mainstream media- HNN-based Prediction Method Supporting Discovery of Production Abnormal -- Efficient Forward and Backward Private Searchable Symmetric Encryption for Multiple Data Sources -- A feature extracting and matching system based on magic-number and AC-algorithm -- A Review: How to detect malicious domains -- A Homomorphic Encryption Method for Power Data Based on Improved Paillier Algorithm -- The Vulnerabilities in Smart Contracts: A Survey -- Detection of false data injection attacks in Smart Grid based on Machine Learning -- An Adversarial Examples Defense Method Based on Image Low-frequency Information -- Information Hiding -- A Robust Watermarking Algorithm for Video Game Artwork Based on Pose Estimation Neural Network -- Research on Content Authentication Technology of Electronic Bills Based on Text Watermarking Algorithm -- Finding the better distortion function from prior scheme for Image Steganography -- Application in Aviation Customer Churn Prediction Using Classification Algorithm Based on Machine Learning -- Color Image Steganography Scheme Based on Convolutional Neural Network -- Robust JPEG steganography using singular value decomposition in DCT domain -- 3D Coverless Image SteganographyScheme Based on 3D Slice Technology -- Software Information Hiding Algorithm Based on Import Table of Portable Executable File -- A Novel Robust Reversible Watermarking Method Against JPEG Compression -- A Common Steganalysis Method of Low Embedding Rate Steganography in Compressed Speech Based on Hierarchy Feature Extraction and Fusion -- TStego-THU: Large-scale Text Steganalysis Dataset -- IoT Security -- Integration Innovation of Competitive Intelligence, AI and Big Data Analysis -- A Comprehensive Review of IoT Technologies and Applications for Healthcare -- A Pervasive Narrow-band Internet of Things (NB-IoT) based health monitoring platform for Ambient Assisted Living,. Design and Development of Field Mobile Monitoring System for Forest Fire Fighting -- ZigBee Wireless Network Attack and Detection -- Joint ToF and Doppler Estimation for Reflection Path Under the Wi-Fi TTW Scenario -- Securing Satellite Internet of Things by Perceiving Content Semantics -- Research on Cultivating Senior Technical Talents Based on the Internet of Things Platform -- Liquid Metal Droplet Series Based Wire Oscillation -- Linear Time-invariant System Reduced-order Finite-time Observer -- Research on invulnerability of WSN based on small world characteristics of complex networks -- Collaboration energy efficiency with mobile edge computing for target tracking in IOT -- Realization of CSI-based Human Behavior Recognition: A Survey -- Security Analysis of Blockchain Smart Contract: Taking Reentrancy Vulnerability as an Example -- Research on Data Security Protection System of Monitoring and Acquisition System Based on Block Chain Technology -- Adaptive Active Immune Policy for Sensing Nodes in Internet of Things -- ELM Forecasted Model of Ammonia Nitrogen in Lake Taihu Combined with Adaboost and Particle Swarm Optimization Algorithms -- Study on Identification of Multiple Pesticide Residues in Lettuce Leaves Based on Hyperspectral Technology -- Robust JPEG Image Steganography Based onSVD in Wavelet Domain -- Raw Material Traceability of Industrial Control System based on Blockchain -- Survey: Research on Blockchain Consensus Mechanism in IoT Security -- Research on Life Prediction Model of Field Seismic Equipment Based on IFA-RVM Algorithm -- Optimization of Location Technology in Meteorological Wireless Sensor Network -- A Survey on the Applications of Wi-Fi Sensing -- Efficient Partially Policy-Hidden CP-ABE for IoT assisted Smart Health -- A Novel Hand Gesture Recognition Method for FMCW Radar -- A Novel Blockchain-based Revocable Permission Management on CP-ABE Scheme.-Automated Authentication of Large-scale IoT Devices with Hybrid Feature Selection -- A Practical Blockchain Framework for Securing IoT Applications -- A Blockchain-based Internet of Things Forensics Model -- Network Device Identification based on MAC Boundary Inference -- Providing Network-based Datasets and Multi-dimensional Features for IoT Botnet Detection Research -- The cross-domain identity authentication scheme has no trusted authentication center in the cloud environment -- A Caching Strategy Based On Content Popularity Level for NDN. . En lÃnea: https://link-springer-com.biblioproxy.umanizales.edu.co/referencework/10.1007/97 [...] Link: https://biblioteca.umanizales.edu.co/ils/opac_css/index.php?lvl=notice_display&i

