| TÃtulo : |
6th International Conference, ICAIS 2020, Hohhot, China, July 17–20, 2020, Proceedings, Part I |
| Tipo de documento: |
documento electrónico |
| Autores: |
Sun, Xingming, ; Wang, Jinwei, ; Bertino, Elisa, |
| Mención de edición: |
1 ed. |
| Editorial: |
Singapore [Malasya] : Springer |
| Fecha de publicación: |
2020 |
| Número de páginas: |
XXIX, 719 p. 123 ilustraciones |
| ISBN/ISSN/DL: |
978-981-1580833-- |
| Nota general: |
Libro disponible en la plataforma SpringerLink. Descarga y lectura en formatos PDF, HTML y ePub. Descarga completa o por capítulos. |
| Palabras clave: |
Protección de datos IngenierÃa Informática Red de computadoras Inteligencia artificial Seguridad de datos e información IngenierÃa Informática y Redes Redes de comunicación informática |
| Ãndice Dewey: |
005.8 Ciencia de los computadores (Programación, programas de sistemas) |
| Resumen: |
El conjunto de tres volúmenes CCIS 1252 hasta CCIS 1254 constituye las actas arbitradas de la 6.ª Conferencia Internacional sobre Inteligencia Artificial y Seguridad, ICAIS 2020, que se celebró en Hohhot, China, en julio de 2020. La conferencia se llamaba anteriormente "Conferencia Internacional sobre la Nube". Informática y Seguridad†con las siglas ICCCS. El total de 178 artÃculos completos y 8 artÃculos breves presentados en estas actas de 3 volúmenes fue cuidadosamente revisado y seleccionado entre 1064 presentaciones. Los artÃculos se organizaron en secciones temáticas de la siguiente manera: Parte I: inteligencia artificial; Parte II: inteligencia artificial; Internet de las Cosas; seguridad de información; Parte III: seguridad de la información; big data y computación en la nube; procesamiento de información. |
| Nota de contenido: |
Fast Texture Image Retrieval Using Learning Copula Model of Multiple DTCWT -- Joint Generic Learning and Multi-SourceDomain Adaptation on Unsupervised FaceRecognition -- Reset Attack: An Attack Against Homomorphic Encryption-based Privacy-Preserving Deep Learning System -- Intelligent Contract for Power Market Transaction Based on the BlockChain -- Survey on Zero-trust Network Security -- A Novel Consensus Algorithm for Alliance Chain -- A Novel Thematic Network Data Collector Based on Simulated Annealing Hybrid Genetic Algorithm -- The Study of Fog Computing Security Situation Prediction in Industrial Internet -- A novel keypoints-based image registration method with fully convolutional neural network -- Image super-resolution reconstruction with dense residual attention module -- GF-2 image blue roof building extraction method based on object-oriented classification technology -- Optimization and Parallelization of the cosmological N-body Simulation on Many-core Processor -- Parallel optimization of stencil computation base on Sunway TaihuLight -- Chinese News Data Extraction System Based On Readability Algorithm -- Parallel Acceleration Improvement of Physical Quantity Gradient Algorithm Based on CFD -- Using Process Visualization and Early Warning Based on Learning Analytics to Enhance Teaching and Learning -- Research Progress of Knowledge Graph Embedding -- A Robust Framework for High-quality Voice Conversion with Conditional Generative Adversarial Network -- Effective Android Malware Detection based on Deep Learning -- Research on Tampering Detection of Material Gene Data Based on Fragile Watermarking -- Quantitative Evaluation Of Promotion Of Traditional National Sports Events Based On Probity Multiple Regression Analysis -- Research on Leisure Sports Activities Based on Decision Tree Algorithm -- Semantic Integrity Analysis Based on Transformer -- An improvementof Coherent Semantic Attention for Image Inpainting -- Formal Verification of the Correctness of Operating System on Assembly Layer in Isabelle/HoL -- Nonlinear Correction Based on Depth Neural Network -- Spatial-temporal co-attention network for action recognition -- Improved SSD for object detection -- Sentiment Analysis on Weibo Platform for Stock Prediction -- Refinement Measurement and Evaluation of Streets in Shanghai Old City -- A Traceability Architecture for the Fresh Food Supply Chain based on Blockchain Technology in China -- Research Progress in Blind Forensics of Digital Image Smooth Filtering -- Research on video violence detection technology of UAV on cloud platform -- A Generative Steganography Method Based on WGAN-GP -- A deep learning network for coarse-to-fine deformable medical image registration -- Research on Cross-lingual Machine Reading Comprehension Technology Based on Non-parallel Corpus -- Research on the data reference model of NMIS -- A Real-time Recommender System Design Based on Spark Streaming -- A Novel Clone Detection Scheme Based on Generative Adversarial Networks -- Design of Vehicle Remote Monitoring System Based on LoRa Technology and QT Platform -- Unifying Domain Adaptation into Simultaneous Discriminant Analysis: a Method for Low-resolution Face Recognition with Single Sample per Person -- An exploratory study of blending Smart classroom in database course -- Optimization and simulation of pre-warehouse multi-objective stock levels based on the Weibull distribution function -- Research and Analysis of Fine Management of Engineering Cost Based on BIM -- Survey of Software-Defined Network Security Issues -- A Fall Detection Algorithm Based on a Support Vector Machine -- A Multi-AGV Optimal Scheduling Algorithm Based on Particle Swarm Optimization -- An efficient quantum private comparison protocol based on conjugate coding -- Deliberated Vulnerable Environment Generating based on Container and Structured Vulnerability Intelligence -- Deep neural network watermarking based on texture analysis -- A Robust Reversible Image Watermarking Scheme based on Singular Value Decomposition and Quantization Technique -- Boolean Function Decomposition Based on Grover Algorithm and Its Simulation Using Quantum Language Quipper -- Research on Emotional Recognition of EEG Signals in Experimental Paradigm -- Research on Rasterized Population Evaluation Method Based on Multi-class Machine Learning Method -- Salary Satisfaction of University Teachers with Different Professional Positions -- Deï¬ning Cost Function for Robust Embedding -- Efficient Identity-Based Signature authentication scheme for smart home system -- A Resource Allocation Mechanism for Edge-blockchain -- Remote sensing image zero-watermarking algorithm based on accurate polar harmonic Fourier moment -- Multi-layer quantum secret sharing based on GHZ states -- Robot scheduling system based on semantic recognition -- Pedestrian Counting without Tracking for the Security Application of IoT Framework. |
| En lÃnea: |
https://link-springer-com.biblioproxy.umanizales.edu.co/referencework/10.1007/97 [...] |
| Link: |
https://biblioteca.umanizales.edu.co/ils/opac_css/index.php?lvl=notice_display&i |
6th International Conference, ICAIS 2020, Hohhot, China, July 17–20, 2020, Proceedings, Part I [documento electrónico] / Sun, Xingming, ; Wang, Jinwei, ; Bertino, Elisa, . - 1 ed. . - Singapore [Malasya] : Springer, 2020 . - XXIX, 719 p. 123 ilustraciones. ISBN : 978-981-1580833-- Libro disponible en la plataforma SpringerLink. Descarga y lectura en formatos PDF, HTML y ePub. Descarga completa o por capítulos.
| Palabras clave: |
Protección de datos IngenierÃa Informática Red de computadoras Inteligencia artificial Seguridad de datos e información IngenierÃa Informática y Redes Redes de comunicación informática |
| Ãndice Dewey: |
005.8 Ciencia de los computadores (Programación, programas de sistemas) |
| Resumen: |
El conjunto de tres volúmenes CCIS 1252 hasta CCIS 1254 constituye las actas arbitradas de la 6.ª Conferencia Internacional sobre Inteligencia Artificial y Seguridad, ICAIS 2020, que se celebró en Hohhot, China, en julio de 2020. La conferencia se llamaba anteriormente "Conferencia Internacional sobre la Nube". Informática y Seguridad†con las siglas ICCCS. El total de 178 artÃculos completos y 8 artÃculos breves presentados en estas actas de 3 volúmenes fue cuidadosamente revisado y seleccionado entre 1064 presentaciones. Los artÃculos se organizaron en secciones temáticas de la siguiente manera: Parte I: inteligencia artificial; Parte II: inteligencia artificial; Internet de las Cosas; seguridad de información; Parte III: seguridad de la información; big data y computación en la nube; procesamiento de información. |
| Nota de contenido: |
Fast Texture Image Retrieval Using Learning Copula Model of Multiple DTCWT -- Joint Generic Learning and Multi-SourceDomain Adaptation on Unsupervised FaceRecognition -- Reset Attack: An Attack Against Homomorphic Encryption-based Privacy-Preserving Deep Learning System -- Intelligent Contract for Power Market Transaction Based on the BlockChain -- Survey on Zero-trust Network Security -- A Novel Consensus Algorithm for Alliance Chain -- A Novel Thematic Network Data Collector Based on Simulated Annealing Hybrid Genetic Algorithm -- The Study of Fog Computing Security Situation Prediction in Industrial Internet -- A novel keypoints-based image registration method with fully convolutional neural network -- Image super-resolution reconstruction with dense residual attention module -- GF-2 image blue roof building extraction method based on object-oriented classification technology -- Optimization and Parallelization of the cosmological N-body Simulation on Many-core Processor -- Parallel optimization of stencil computation base on Sunway TaihuLight -- Chinese News Data Extraction System Based On Readability Algorithm -- Parallel Acceleration Improvement of Physical Quantity Gradient Algorithm Based on CFD -- Using Process Visualization and Early Warning Based on Learning Analytics to Enhance Teaching and Learning -- Research Progress of Knowledge Graph Embedding -- A Robust Framework for High-quality Voice Conversion with Conditional Generative Adversarial Network -- Effective Android Malware Detection based on Deep Learning -- Research on Tampering Detection of Material Gene Data Based on Fragile Watermarking -- Quantitative Evaluation Of Promotion Of Traditional National Sports Events Based On Probity Multiple Regression Analysis -- Research on Leisure Sports Activities Based on Decision Tree Algorithm -- Semantic Integrity Analysis Based on Transformer -- An improvementof Coherent Semantic Attention for Image Inpainting -- Formal Verification of the Correctness of Operating System on Assembly Layer in Isabelle/HoL -- Nonlinear Correction Based on Depth Neural Network -- Spatial-temporal co-attention network for action recognition -- Improved SSD for object detection -- Sentiment Analysis on Weibo Platform for Stock Prediction -- Refinement Measurement and Evaluation of Streets in Shanghai Old City -- A Traceability Architecture for the Fresh Food Supply Chain based on Blockchain Technology in China -- Research Progress in Blind Forensics of Digital Image Smooth Filtering -- Research on video violence detection technology of UAV on cloud platform -- A Generative Steganography Method Based on WGAN-GP -- A deep learning network for coarse-to-fine deformable medical image registration -- Research on Cross-lingual Machine Reading Comprehension Technology Based on Non-parallel Corpus -- Research on the data reference model of NMIS -- A Real-time Recommender System Design Based on Spark Streaming -- A Novel Clone Detection Scheme Based on Generative Adversarial Networks -- Design of Vehicle Remote Monitoring System Based on LoRa Technology and QT Platform -- Unifying Domain Adaptation into Simultaneous Discriminant Analysis: a Method for Low-resolution Face Recognition with Single Sample per Person -- An exploratory study of blending Smart classroom in database course -- Optimization and simulation of pre-warehouse multi-objective stock levels based on the Weibull distribution function -- Research and Analysis of Fine Management of Engineering Cost Based on BIM -- Survey of Software-Defined Network Security Issues -- A Fall Detection Algorithm Based on a Support Vector Machine -- A Multi-AGV Optimal Scheduling Algorithm Based on Particle Swarm Optimization -- An efficient quantum private comparison protocol based on conjugate coding -- Deliberated Vulnerable Environment Generating based on Container and Structured Vulnerability Intelligence -- Deep neural network watermarking based on texture analysis -- A Robust Reversible Image Watermarking Scheme based on Singular Value Decomposition and Quantization Technique -- Boolean Function Decomposition Based on Grover Algorithm and Its Simulation Using Quantum Language Quipper -- Research on Emotional Recognition of EEG Signals in Experimental Paradigm -- Research on Rasterized Population Evaluation Method Based on Multi-class Machine Learning Method -- Salary Satisfaction of University Teachers with Different Professional Positions -- Deï¬ning Cost Function for Robust Embedding -- Efficient Identity-Based Signature authentication scheme for smart home system -- A Resource Allocation Mechanism for Edge-blockchain -- Remote sensing image zero-watermarking algorithm based on accurate polar harmonic Fourier moment -- Multi-layer quantum secret sharing based on GHZ states -- Robot scheduling system based on semantic recognition -- Pedestrian Counting without Tracking for the Security Application of IoT Framework. |
| En lÃnea: |
https://link-springer-com.biblioproxy.umanizales.edu.co/referencework/10.1007/97 [...] |
| Link: |
https://biblioteca.umanizales.edu.co/ils/opac_css/index.php?lvl=notice_display&i |
|  |