| TÃtulo : |
Artificial Intelligence and Security : 5th International Conference, ICAIS 2019, New York, NY, USA, July 26-28, 2019, Proceedings, Part II |
| Tipo de documento: |
documento electrónico |
| Autores: |
Sun, Xingming, ; Pan, Zhaoqing, ; Bertino, Elisa, |
| Mención de edición: |
1 ed. |
| Editorial: |
[s.l.] : Springer |
| Fecha de publicación: |
2019 |
| Número de páginas: |
XVII, 665 p. 375 ilustraciones, 189 ilustraciones en color. |
| ISBN/ISSN/DL: |
978-3-030-24265-7 |
| Nota general: |
Libro disponible en la plataforma SpringerLink. Descarga y lectura en formatos PDF, HTML y ePub. Descarga completa o por capítulos. |
| Palabras clave: |
Protección de datos Inteligencia artificial IngenierÃa Informática Red de computadoras Software de la aplicacion Visión por computador Algoritmos Seguridad de datos e información IngenierÃa Informática y Redes Aplicaciones informáticas y de sistemas de información |
| Ãndice Dewey: |
005.8 Ciencia de los computadores (Programación, programas de sistemas) |
| Resumen: |
El conjunto de 4 volúmenes LNCS 11632 hasta LNCS 11635 constituye las actas arbitradas de la Quinta Conferencia Internacional sobre Inteligencia Artificial y Seguridad, ICAIS 2019, que se celebró en Nueva York, EE. UU., en julio de 2019. La conferencia se llamaba anteriormente "Conferencia Internacional sobre Computación y Seguridad en la Nube†con las siglas ICCCS. El total de 230 artÃculos completos presentados en estas actas de 4 volúmenes fue cuidadosamente revisado y seleccionado entre 1529 presentaciones. Los artÃculos se organizaron en secciones temáticas de la siguiente manera: Parte I: computación en la nube; Parte II: inteligencia artificial; grandes datos; y computación y seguridad en la nube; Parte III: computación en la nube y seguridad; ocultación de información; seguridad de la IoT; análisis forense multimedia; y cifrado y ciberseguridad; Parte IV: cifrado y ciberseguridad. |
| Nota de contenido: |
Artificial Intelligence -- CCNET: Cascading Convolutions for Cardiac Segmentation -- A Deep Belief Networks Based Prediction Method for Identification of Disease-associated Non-coding SNPs in Human Genome -- On Human-like Performance Artificial Intelligence – A Demonstration Using an Atari Game -- Implementation of Multiplicative Seasonal ARIMA modeling and Flood Prediction based on Long-Term Time Series Data in Indonesia -- Improved Bayesian Method with Collision Recovery for RFID Anti-Collision -- Multi-step Attack Scenarios Mining Based on Neural Network and Bayesian Network Attack Graph -- A Comparative Study of Machine Learning Classifiers for Network Intrusion Detection -- On True Language Understanding -- The l2,1-Norm Stacked Robust Autoencoders via Adaptation Regularization for Domain Adaptation -- Molecular Dynamics Simulation Optimization Based on GROMACS on Sunway TaihuLight -- A Review of Network Representation Learning -- A Two-stage Deep Neural Network for Sequence Labeling -- Reinforcement Learning based Content Push Policy for HetNets with Energy Harvesting Small Cells -- A Comparative Research on Open Source Edge Computing Systems -- Weather Forecasting Using Artificial Neural Network -- A New Quantitative Evaluation Method for Fuzzing -- Classification of ECG Arrhythmia Using CNN, SVM and LDA -- Discrete Similarity Preserving Hashing for Cross-Modal Retrieval -- Classification of Vitiligo Based on Convolutional Neural Network -- Big Data -- Multi-scale and Hierarchical Embedding for Polarity Shift Sensitive Sentiment Classification -- Trade-off between Energy Consumption and Makespan in the Mapreduce Resource Allocation Problem -- FSampleJoin: A Fixed-sample-based Method for String Similarity Joins using MapReduce -- Mass Diffusion Recommendation Algorithm Based on Multi-Subnet Composited Complex Network Model -- Optimizing Word Embedding for Fine-grained Sentiment Analysis -- A Sentiment Classification Model Based on Multiple Multi-classifier Systems -- Task SchedulingAlgorithm based on Campus Cloud Platform -- Automatic Self-feedback for the Studying effect of MOOC Based on Support Vector Machine -- Prediction on Payment Volume from Customer Service Electricity Channel -- Delay-Tolerant Rendezvous-based Data collection for Target Tracking in Large-Scale Wireless Sensor Networks with UGV -- Energy-Efficient Data-Collection with Rendezvous-Based Approaches in Large-Scale WSNs with multi-UGV -- Analysis of the Efficiency-Energy with Regression and Classification in Household using K-NN 354 -- Probe Recommendation Algorithm for Link Delay Detection -- Recommendation with Heterogeneous Information Networks Based on Meta-Graph -- A GA-optimized Weighted Mixed Kernel Function of SVM Based on Information Entropy -- Modeling and Simulation of Network Public Opinion Propagation Model Based on Interest Matching in Social Network -- Power Consumption and Coverage Test of NB-IoT in the Substation Edge Computing Environment -- Research on the Optimizationof Spark Big Table Equal Join -- Gait Recognition based on spatial-temporal information -- Research on Load Balancing Algorithm Optimization Based on Spark Platform -- A System for Calculating the Amount of Motion Based on 3D Pose Estimation -- Design of Security Portrait Big Data Application System -- Urban traffic flow forecast based on ST-SEResNet -- A Novel Power System Anomaly Data Identification Method Based on Neural Network and Affine Propagation -- Input-Output Analysis of Chinese National Agricultural Science and Technology Park -- A Power Grid Operations Monitoring Platform Based on Big Data Technology -- An Efficient Social-Aware Routing Strategy in Mobile Social Networks -- Cloud Computing and Security -- Improvement of Differential Fault Attack Based on Lightweight Ciphers with GFN Structure -- Cloud Management Systems - Load Balancing Algorithms and VDI Implementation Techniques -- When Side Channel becomes Good: Kernel Malware Attack Investigation -- Robust Encrypted Watermarking for Medical Images Based on DWT-DCT and Tent Mapping in Encrypted Domain -- An Analysis of A Three-Factor Authentication Scheme and Its Improved Fix -- A Novel Content Based Image Retrieval Scheme in Cloud Computing -- Mobile Image Retrieval System for Cloud Service Based on Convolutional Neural Network and Hadoop -- Formal Specification of Concurrent Enforcement Ucon Model with CTL Logic -- Design of Real-Time Resource-Aware Network Resource Allocation Mechanism Under SDN Background -- RSCM: A Reliability-Aware Service Chain Mapping. |
| En lÃnea: |
https://link-springer-com.biblioproxy.umanizales.edu.co/referencework/10.1007/97 [...] |
| Link: |
https://biblioteca.umanizales.edu.co/ils/opac_css/index.php?lvl=notice_display&i |
Artificial Intelligence and Security : 5th International Conference, ICAIS 2019, New York, NY, USA, July 26-28, 2019, Proceedings, Part II [documento electrónico] / Sun, Xingming, ; Pan, Zhaoqing, ; Bertino, Elisa, . - 1 ed. . - [s.l.] : Springer, 2019 . - XVII, 665 p. 375 ilustraciones, 189 ilustraciones en color. ISBN : 978-3-030-24265-7 Libro disponible en la plataforma SpringerLink. Descarga y lectura en formatos PDF, HTML y ePub. Descarga completa o por capítulos.
| Palabras clave: |
Protección de datos Inteligencia artificial IngenierÃa Informática Red de computadoras Software de la aplicacion Visión por computador Algoritmos Seguridad de datos e información IngenierÃa Informática y Redes Aplicaciones informáticas y de sistemas de información |
| Ãndice Dewey: |
005.8 Ciencia de los computadores (Programación, programas de sistemas) |
| Resumen: |
El conjunto de 4 volúmenes LNCS 11632 hasta LNCS 11635 constituye las actas arbitradas de la Quinta Conferencia Internacional sobre Inteligencia Artificial y Seguridad, ICAIS 2019, que se celebró en Nueva York, EE. UU., en julio de 2019. La conferencia se llamaba anteriormente "Conferencia Internacional sobre Computación y Seguridad en la Nube†con las siglas ICCCS. El total de 230 artÃculos completos presentados en estas actas de 4 volúmenes fue cuidadosamente revisado y seleccionado entre 1529 presentaciones. Los artÃculos se organizaron en secciones temáticas de la siguiente manera: Parte I: computación en la nube; Parte II: inteligencia artificial; grandes datos; y computación y seguridad en la nube; Parte III: computación en la nube y seguridad; ocultación de información; seguridad de la IoT; análisis forense multimedia; y cifrado y ciberseguridad; Parte IV: cifrado y ciberseguridad. |
| Nota de contenido: |
Artificial Intelligence -- CCNET: Cascading Convolutions for Cardiac Segmentation -- A Deep Belief Networks Based Prediction Method for Identification of Disease-associated Non-coding SNPs in Human Genome -- On Human-like Performance Artificial Intelligence – A Demonstration Using an Atari Game -- Implementation of Multiplicative Seasonal ARIMA modeling and Flood Prediction based on Long-Term Time Series Data in Indonesia -- Improved Bayesian Method with Collision Recovery for RFID Anti-Collision -- Multi-step Attack Scenarios Mining Based on Neural Network and Bayesian Network Attack Graph -- A Comparative Study of Machine Learning Classifiers for Network Intrusion Detection -- On True Language Understanding -- The l2,1-Norm Stacked Robust Autoencoders via Adaptation Regularization for Domain Adaptation -- Molecular Dynamics Simulation Optimization Based on GROMACS on Sunway TaihuLight -- A Review of Network Representation Learning -- A Two-stage Deep Neural Network for Sequence Labeling -- Reinforcement Learning based Content Push Policy for HetNets with Energy Harvesting Small Cells -- A Comparative Research on Open Source Edge Computing Systems -- Weather Forecasting Using Artificial Neural Network -- A New Quantitative Evaluation Method for Fuzzing -- Classification of ECG Arrhythmia Using CNN, SVM and LDA -- Discrete Similarity Preserving Hashing for Cross-Modal Retrieval -- Classification of Vitiligo Based on Convolutional Neural Network -- Big Data -- Multi-scale and Hierarchical Embedding for Polarity Shift Sensitive Sentiment Classification -- Trade-off between Energy Consumption and Makespan in the Mapreduce Resource Allocation Problem -- FSampleJoin: A Fixed-sample-based Method for String Similarity Joins using MapReduce -- Mass Diffusion Recommendation Algorithm Based on Multi-Subnet Composited Complex Network Model -- Optimizing Word Embedding for Fine-grained Sentiment Analysis -- A Sentiment Classification Model Based on Multiple Multi-classifier Systems -- Task SchedulingAlgorithm based on Campus Cloud Platform -- Automatic Self-feedback for the Studying effect of MOOC Based on Support Vector Machine -- Prediction on Payment Volume from Customer Service Electricity Channel -- Delay-Tolerant Rendezvous-based Data collection for Target Tracking in Large-Scale Wireless Sensor Networks with UGV -- Energy-Efficient Data-Collection with Rendezvous-Based Approaches in Large-Scale WSNs with multi-UGV -- Analysis of the Efficiency-Energy with Regression and Classification in Household using K-NN 354 -- Probe Recommendation Algorithm for Link Delay Detection -- Recommendation with Heterogeneous Information Networks Based on Meta-Graph -- A GA-optimized Weighted Mixed Kernel Function of SVM Based on Information Entropy -- Modeling and Simulation of Network Public Opinion Propagation Model Based on Interest Matching in Social Network -- Power Consumption and Coverage Test of NB-IoT in the Substation Edge Computing Environment -- Research on the Optimizationof Spark Big Table Equal Join -- Gait Recognition based on spatial-temporal information -- Research on Load Balancing Algorithm Optimization Based on Spark Platform -- A System for Calculating the Amount of Motion Based on 3D Pose Estimation -- Design of Security Portrait Big Data Application System -- Urban traffic flow forecast based on ST-SEResNet -- A Novel Power System Anomaly Data Identification Method Based on Neural Network and Affine Propagation -- Input-Output Analysis of Chinese National Agricultural Science and Technology Park -- A Power Grid Operations Monitoring Platform Based on Big Data Technology -- An Efficient Social-Aware Routing Strategy in Mobile Social Networks -- Cloud Computing and Security -- Improvement of Differential Fault Attack Based on Lightweight Ciphers with GFN Structure -- Cloud Management Systems - Load Balancing Algorithms and VDI Implementation Techniques -- When Side Channel becomes Good: Kernel Malware Attack Investigation -- Robust Encrypted Watermarking for Medical Images Based on DWT-DCT and Tent Mapping in Encrypted Domain -- An Analysis of A Three-Factor Authentication Scheme and Its Improved Fix -- A Novel Content Based Image Retrieval Scheme in Cloud Computing -- Mobile Image Retrieval System for Cloud Service Based on Convolutional Neural Network and Hadoop -- Formal Specification of Concurrent Enforcement Ucon Model with CTL Logic -- Design of Real-Time Resource-Aware Network Resource Allocation Mechanism Under SDN Background -- RSCM: A Reliability-Aware Service Chain Mapping. |
| En lÃnea: |
https://link-springer-com.biblioproxy.umanizales.edu.co/referencework/10.1007/97 [...] |
| Link: |
https://biblioteca.umanizales.edu.co/ils/opac_css/index.php?lvl=notice_display&i |
|  |