Artificial Intelligence and Security
Springer Verlag, Singapore
978-981-15-8082-6 (ISBN)
The total of 178 full papers and 8 short papers presented in this 3-volume proceedings was carefully reviewed and selected from 1064 submissions. The papers were organized in topical sections as follows:
Part I: artificial intelligence;
Part II: artificial intelligence; Internet of things; information security;
Part III: information security; big data and cloud computing; information processing.
Fast Texture Image Retrieval Using Learning Copula Model of Multiple DTCWT.- Joint Generic Learning and Multi-SourceDomain Adaptation on Unsupervised FaceRecognition.- Reset Attack: An Attack Against Homomorphic Encryption-based Privacy-Preserving Deep Learning System.- Intelligent Contract for Power Market Transaction Based on the BlockChain.- Survey on Zero-trust Network Security.- A Novel Consensus Algorithm for Alliance Chain.- A Novel Thematic Network Data Collector Based on Simulated Annealing Hybrid Genetic Algorithm.- The Study of Fog Computing Security Situation Prediction in Industrial Internet.- A novel keypoints-based image registration method with fully convolutional neural network.- Image super-resolution reconstruction with dense residual attention module.- GF-2 image blue roof building extraction method based on object-oriented classification technology.- Optimization and Parallelization of the cosmological N-body Simulation on Many-core Processor.- Parallel optimization of stencil computation base on Sunway TaihuLight.- Chinese News Data Extraction System Based On Readability Algorithm.- Parallel Acceleration Improvement of Physical Quantity Gradient Algorithm Based on CFD.- Using Process Visualization and Early Warning Based on Learning Analytics to Enhance Teaching and Learning.- Research Progress of Knowledge Graph Embedding.- A Robust Framework for High-quality Voice Conversion with Conditional Generative Adversarial Network.- Effective Android Malware Detection based on Deep Learning.- Research on Tampering Detection of Material Gene Data Based on Fragile Watermarking.- Quantitative Evaluation Of Promotion Of Traditional National Sports Events Based On Probity Multiple Regression Analysis.- Research on Leisure Sports Activities Based on Decision Tree Algorithm.- Semantic Integrity Analysis Based on Transformer.- An improvementof Coherent Semantic Attention for Image Inpainting.- Formal Verification of the Correctness of Operating System on Assembly Layer in Isabelle/HoL.- Nonlinear Correction Based on Depth Neural Network.- Spatial-temporal co-attention network for action recognition.- Improved SSD for object detection.- Sentiment Analysis on Weibo Platform for Stock Prediction.- Refinement Measurement and Evaluation of Streets in Shanghai Old City.- A Traceability Architecture for the Fresh Food Supply Chain based on Blockchain Technology in China.- Research Progress in Blind Forensics of Digital Image Smooth Filtering.- Research on video violence detection technology of UAV on cloud platform.- A Generative Steganography Method Based on WGAN-GP.- A deep learning network for coarse-to-fine deformable medical image registration.- Research on Cross-lingual Machine Reading Comprehension Technology Based on Non-parallel Corpus.- Research on the data reference model of NMIS.- A Real-time Recommender System Design Based on Spark Streaming.- A Novel Clone Detection Scheme Based on Generative Adversarial Networks.- Design of Vehicle Remote Monitoring System Based on LoRa Technology and QT Platform.- Unifying Domain Adaptation into Simultaneous Discriminant Analysis: a Method for Low-resolution Face Recognition with Single Sample per Person.- An exploratory study of blending Smart classroom in database course.- Optimization and simulation of pre-warehouse multi-objective stock levels based on the Weibull distribution function.- Research and Analysis of Fine Management of Engineering Cost Based on BIM.- Survey of Software-Defined Network Security Issues.- A Fall Detection Algorithm Based on a Support Vector Machine.- A Multi-AGV Optimal Scheduling Algorithm Based on Particle Swarm Optimization.- An efficient quantum private comparison protocol based on conjugate coding.- Deliberated Vulnerable Environment Generating based on Container and Structured Vulnerability Intelligence.- Deep neural network watermarking based on texture analysis.- A Robust Reversible Image Watermarking Scheme based on Singular Value Decomposition and Quantization Technique.- Boolean Function Decomposition Based on Grover Algorithm and Its Simulation Using Quantum Language Quipper.- Research on Emotional Recognition of EEG Signals in Experimental Paradigm.- Research on Rasterized Population Evaluation Method Based on Multi-class Machine Learning Method.- Salary Satisfaction of University Teachers with Different Professional Positions.- Defining Cost Function for Robust Embedding.- Efficient Identity-Based Signature authentication scheme for smart home system.- A Resource Allocation Mechanism for Edge-blockchain.- Remote sensing image zero-watermarking algorithm based on accurate polar harmonic Fourier moment.- Multi-layer quantum secret sharing based on GHZ states.- Robot scheduling system based on semantic recognition.- Pedestrian Counting without Tracking for the Security Application of IoT Framework.
Erscheinungsdatum | 21.09.2020 |
---|---|
Reihe/Serie | Communications in Computer and Information Science ; 1252 |
Zusatzinfo | 123 Illustrations, black and white; XXIX, 719 p. 123 illus. |
Verlagsort | Singapore |
Sprache | englisch |
Maße | 155 x 235 mm |
Themenwelt | Informatik ► Netzwerke ► Sicherheit / Firewall |
Informatik ► Theorie / Studium ► Künstliche Intelligenz / Robotik | |
Informatik ► Weitere Themen ► Hardware | |
ISBN-10 | 981-15-8082-0 / 9811580820 |
ISBN-13 | 978-981-15-8082-6 / 9789811580826 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich