11437nam 2200565 450 991063391320332120230414042358.03-031-05491-1(MiAaPQ)EBC7150303(Au-PeEL)EBL7150303(CKB)25504476500041(PPN)266350542(EXLCZ)992550447650004120230414d2023 uy 0engurcnu||||||||txtrdacontentcrdamediacrrdacarrier2021 International conference on security and information technologies with AI, internet computing and big-data applications /editors, George A. Tsihrintzis, Shiuh-Jeng Wang, Iuon-Chang LinCham, Switzerland :Springer,[2023]©20231 online resource (406 pages)Smart innovation, systems and technologies ;Volume 314Print version: Tsihrintzis, George A. 2021 International Conference on Security and Information Technologies with AI, Internet Computing and Big-Data Applications Cham : Springer International Publishing AG,c2023 9783031054907 Includes bibliographical references.Intro -- Organization -- Preface -- Contents -- About the Editors -- Multimedia -- Reversible Data Hiding in Encrypted Image Based on MSB Inversion -- 1 Introduction -- 2 Related Works -- 2.1 Secret Embedding Procedure -- 2.2 Message Extracting and Image Recovery -- 3 The Proposed Method -- 3.1 Image Encryption and Secret Embedding -- 3.2 Message Extracting and Image Recovery -- 4 Experimental Result -- 5 Conclusion -- References -- Comments on the Visual Binary QR Code -- 1 Introduction -- 2 Schemes of Visual Binary QR Code -- 2.1 Unitag -- 2.2 QArt -- 2.3 Halftone QR Code -- 3 Comparisons -- 4 Conclusions -- References -- NLP-Based Hardware Solution for Censoring Audio on Over-the-Top (OTT) Media Services -- 1 Introduction -- 2 Related Work -- 3 Proposed Method -- 3.1 Hardware Architecture -- 3.2 Software Architecture -- 4 Experiments &amp -- Results -- 4.1 Application Components &amp -- Input Dataset -- 4.2 Accommodations for Lag -- 4.3 Results -- 5 Conclusion and Future Work -- References -- Efficient Steganographic Method Based on Modulo Cube -- 1 Introduction -- 2 Related Works -- 3 Proposed Method -- 3.1 Preliminary Phase -- 3.2 Embedding Phase -- 3.3 Extraction phase -- 4 Experimental Results -- 5 Conclusions -- References -- A High Capacity Reversible Data Hiding in Encrypted Images Using Multi-MSB Prediction and Huffman Coding -- 1 Introduction -- 2 Proposed Method -- 2.1 Apply the Huffman Tree Building Algorithm -- 2.2 Reduce Reference Bytes -- 2.3 Remove the Redundant Length Column -- 3 Experimental Results -- 3.1 Commonly Used Test Images -- 4 Conclusion -- References -- Reversible Data Hiding Based on Bidirectional Generalized Integer Transform -- 1 Introduction -- 2 Qiu et al. Scheme -- 3 Proposed Scheme -- 4 Experimental Results -- 5 Conclusions -- References -- Network and System Security (I).A Prototype Design on Privacy-Preserving Outsourced Bayesian Network -- 1 Introduction -- 2 Preliminaries -- 3 System Model -- 4 Construction -- 4.1 Building Blocks -- 4.2 Round Trick -- 4.3 Main Protocol -- 5 Analysis and Discussions -- 6 Conclusions -- References -- The Security Challenge of Consumers' Mobile Payment -- 1 Introduction -- 2 Consumers' Mobile Payment Use Intention -- 3 Consumers' Mobile Payment Security -- 4 Research Methodology -- 4.1 Sample and Data Sources -- 4.2 Variables and Measures -- 4.3 Reliability Analysis -- 4.4 Validity Analysis -- 5 Results -- 5.1 The Structural Equation Modeling (SEM) Results for Mobile Payment Security-Mobile Payment Use Intention -- 5.2 The Impact of Consumers' Mobile Payment Security on Consumers' Mobile Payment Use Intention -- 6 Conclusions -- References -- Research on the Analysis of Key Attack Modes in a Wireless Environment -- 1 Introduction -- 2 The Proposed Scheme -- 2.1 Method Architecture -- 2.2 Test Flow Chart -- 2.3 Introduction to WPA2 Four-Way Handshakes Process -- 3 Analysis of Key Attack Modes -- 3.1 Dictionary Cracking Mode -- 3.2 Script Cracking Mode -- 3.3 Discussion and Comparison -- 4 Conclusion -- References -- Default Risk Prediction Using Random Forest and XGBoosting Classifier -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 Data -- 3.2 Data Cleaning -- 3.3 Exploratory Data Analysis -- 3.4 Feature Selection Method -- 3.5 Data Split &amp -- Sampling -- 3.6 Classification Models -- 4 Experiments -- 4.1 XGBoosting Classifier -- 4.2 Random Forest (RF) -- 5 Conclusion -- References -- An RFID Ownership Transfer Based on Multiple Owners with Different Weights -- 1 Introduction -- 2 The Proposed Method -- 2.1 The Initial Phase -- 2.2 The Ownership Transfer Request Phase -- 2.3 The Ownership Agreement Phase -- 2.4 The Ownership Transfer Phase.2.5 Mutual Authentication Between the TTP and the Tag -- 2.6 Tag Verification -- 3 Conclusion -- References -- Network and System Security (II) -- Comments on a Scalable Healthcare Authentication Protocol with Attack-Resilience and Anonymous Key-Agreement -- 1 Introduction -- 2 Review of Hajian et al.'s Scheme -- 2.1 System Setup Phase -- 2.2 Registration Phase -- 2.3 Authentication Phase -- 2.4 Password Change Phase -- 2.5 User Identity Change Phase -- 3 Security Analysis -- 3.1 Gateway Authentication Failure -- 3.2 Vulnerability to Denial-of-Service Attack -- 3.3 Failed Password Change and User Identity Change -- 3.4 Compromised User Anonymity and Untraceability -- 4 Conclusions -- References -- A LWE-Based Receiver-Deniable Encryption Scheme -- 1 Introduction -- 2 Related Works -- 2.1 Deniable Encryption -- 2.2 LWE-Based Encryption -- 3 Receiver-Deniable LWE-Based Encryption -- 3.1 Concept -- 3.2 Construction -- 4 Evaluation -- 4.1 Correctness -- 4.2 Deniability -- 5 Conclusion and Future Works -- References -- Privacy-Preserved Hierarchical Authentication and Key Agreement for AI-Enabled Telemedicine Systems -- 1 Introduction -- 2 Related Works -- 2.1 AI Systems -- 2.2 Telemedicine Systems -- 2.3 Chebyshev Chaotic Maps -- 3 Proposed Scheme -- 4 Security Analysis -- 4.1 Security of Secret Key -- 4.2 Session Key Confirmation and Security of Session Key -- 4.3 Mutual Authentication -- 4.4 Unforgeability -- 4.5 Without Assistance of Registration Center (RC) -- 5 Conclusion -- References -- Fuzzy C-Means Based Feature Selection Mechanism for Wireless Intrusion Detection -- 1 Introduction -- 2 Related Works -- 3 Methodology -- 3.1 Research Design -- 3.2 Difference of FCM Center Distances -- 3.3 Auto Encoder -- 3.4 Deep Neural Network -- 3.5 Data Preprocessing -- 4 Experimental Results -- 5 Conclusion -- References.An Active User-Side Detector for Evil Twins -- 1 Introduction -- 2 System Principle -- 2.1 Monitor Mode -- 2.2 Retransmission and Forwarding -- 2.3 Principle -- 3 Evaluation -- 3.1 Time Efficiency -- 3.2 Limitations -- 3.3 Discussion -- 4 Conclusion -- References -- AI ad Big Data Analysis (I) -- Evaluation of Recurrent Neural Network Model Training for Health Care Suggestions -- 1 Introduction -- 2 Related Work -- 3 Proposed Solution -- 3.1 LSTM-Based Total Care Prediction System -- 3.2 Feature Selection -- 3.3 Feature Encoding -- 4 System Evaluation -- 4.1 Study Population -- 4.2 The Performance Comparison of Different RNNs -- 5 Conclusion -- References -- E-learning Behavior Analytics in the Curriculum of Big Data Visualization Application -- 1 Introduction -- 2 Teaching Materials Design and Research Methods -- 2.1 Participants and Teaching Environment -- 2.2 E-leaning Variables and Analyzing Methods -- 3 Results -- 3.1 Hotspots of Online Teaching Materials -- 3.2 E-learning Behavior Analysis -- 3.3 Data Mining and Modeling -- 4 Discussion and Conclusion -- 4.1 Hotspots -- 4.2 E-learning Behavior Analysis -- 4.3 Model Prediction -- References -- Malware Detection Based on Image Conversion -- 1 Introduction -- 2 Related Work -- 2.1 Review the Image Texture Analysis Method [1] -- 2.2 Review the Classification of Convolutional Neural Network (CNN) Method [12] -- 3 Proposed Method -- 3.1 System Architecture Diagram -- 3.2 Generative Adversarial Network -- 3.3 Discrete Cosine Transform -- 3.4 Discrete Wavelet Transform -- 3.5 Convolutional Neural Network -- 4 Experiments and Results -- 5 Conclusion -- References -- Automobile Theft Detection by Driving Behavior Identification Using Deep Autoencoder -- 1 Introduction -- 2 Proposed Methods -- 2.1 Model Autoencoder -- 2.2 Deep Autoencoder for Anomaly Detection -- 2.3 Important Features -- 2.4 Dataset.2.5 Performance Measurement -- 3 Experimental Results -- 3.1 Performance of Anomaly Detection -- 3.2 Analysis of Important Features -- 4 Conclusions and Future Directions -- References -- Combining a Bi-LSTM-Based Siamese Network with Word2Vec Algorithm for Classifying High-Dimensional Dataset -- 1 Introduction -- 2 Related Work -- 2.1 Natural Language Processing -- 2.2 Recurrent Neural Network -- 2.3 Text Classification -- 2.4 Dimensionality Reduction -- 2.5 Siamese Network -- 3 Proposed Methods -- 3.1 Problem Definition -- 3.2 Proposed Method -- 4 Experiments -- 4.1 Proposed Method Experiment Data Source -- 4.2 Experiment 1: News Category Dataset Classification Precision After Dimensionality Reduction -- 4.3 Experiment 2: Classification Precision After IMDb Dimensionality Reduction -- 5 Conclusion -- References -- Real Time Drowsiness Detection Based on Facial Dynamic Features -- 1 Introduction -- 2 Literature Review -- 3 The Proposed Method -- 4 Experimental Results -- 5 Conclusions -- References -- AI ad Big Data Analysis (II) -- Gradient Deep Learning Boosting and Its Application on the Imbalanced Datasets Containing Noises in Manufacturing -- 1 Introduction -- 2 Literature Review -- 3 Materials and Methods -- 3.1 Materials -- 3.2 Methods -- 4 Materials and Methods -- 4.1 Experiments -- 4.2 Results -- 5 Discussions and Conclusions -- References -- Fabric Defect Detection by Applying Structural Similarity Index to the Combination of Variational Autoencode and Generative Adversarial Network -- 1 Introduction -- 2 The Proposed Scheme -- 2.1 The Architecture of Proposed Model -- 2.2 Loss Function -- 3 Experimental Results -- 3.1 Introduction to Environment Configuration and Data Set -- 3.2 Evaluation Index -- 3.3 Performance Evaluation After Training the Model with Fabric -- 4 Conclusions -- References.A Novel Defense Mechanism Against Label-Flipping Attacks for Support Vector Machines.Smart innovation, systems, and technologies ;Volume 314.Artificial intelligenceArtificial intelligenceCongressesBig dataArtificial intelligence.Artificial intelligenceBig data.006.3Tsihrintzis George A.Wang Shiuh-JengLin Iuon-ChangMiAaPQMiAaPQMiAaPQBOOK99106339132033212021 International conference on security and information technologies with AI, internet computing and big-data applications3090377UNINA06223nam 22016695 450 991015475410332120190708092533.01-4008-8172-210.1515/9781400881727(CKB)3710000000620064(MiAaPQ)EBC4738565(DE-B1597)467913(OCoLC)979746992(DE-B1597)9781400881727(EXLCZ)99371000000062006420190708d2016 fg engurcnu||||||||rdacontentrdamediardacarrierContributions to the Theory of Games (AM-24), Volume I /Albert William Tucker, Harold William KuhnPrinceton, NJ : Princeton University Press, [2016]©19511 online resource (221 pages) illustrationsAnnals of Mathematics Studies ;2730-691-07934-X Includes bibliographical references.Frontmatter -- PREFACE -- CONTENTS -- PART I. FINITE GAMES -- 1. THE ELEMENTARY THEORY OF CONVEX POLYHEDRA -- 2. ELEMENTARY PROOF OF A MINIMAX THEOREM DUE TO VON NEUMANN -- 3. BASIC SOLUTIONS OF DISCRETE GAMES / Shapley, L. S. / Snow, R. N. -- 4. SOLUTIONS OF FINITE TWO-PERSON GAMES / Gale, D. / Sherman, S. -- 5. SOLUTIONS OF DISCRETE, TWO-PERSON GAMES / Bohnenblust, H. F. / Karlin, S. -- 6. SOLUTIONS OF GAMES BY DIFFERENTIAL EQUATIONS / Brown, G. W. / Neumann, J. von -- 7. ON SYMMETRIC GAMES / Gale, D. / Kuhn, H. W. / Tucker, A. W. -- 8. REDUCTIONS OP GAME MATRICES / Gale, D. / Kuhn, H. W. / Tucker, A. W. -- 9. A SIMPLIFIED TWO-PERSON POKER / Kuhn, H. W. -- 10. A SIMPLE THREE-PERSON POKER GAME / Nash, J. F. / Shapley, L. S. -- 11. ISOMORPHISM OF GAMES, AND STRATEGIC EQUIVALENCE / McKinsey, J. C. C. -- PART II. INFINITE GAMES -- 12. OPERATOR TREATMENT OF MINMAX PRINCIPLE / Karlin, Samuel -- 13. ON A THEOREM OF VILLE / Bohnenblust, H. F. / Karlin, S. -- 14. POLYNOMIAL GAMES / Dresher, M. / Karlin, S. / Shapley, L. S. -- 15. GAMES WITH CONTINUOUS, CONVEX PAY-OFF / Bohnenblust, H. F. / Karlin, S. / Shapley, L. S. -- BIBLIOGRAPHYThe description for this book, Contributions to the Theory of Games (AM-24), Volume I, will be forthcoming.Annals of mathematics studies ;Number 24.Game theoryAffine space.Almost surely.Banach space.Basic solution (linear programming).Bilinear form.Boundary (topology).Bounded variation.Calculation.Characteristic function (probability theory).Characterization (mathematics).Coefficient.Combination.Completeness of the real numbers.Computation.Computational problem.Connected space.Continuous function (set theory).Continuous function.Continuous game.Convex combination.Convex set.Counterexample.Diagram (category theory).Dimension (vector space).Dimension.Dimensional analysis.Elementary proof.Equation solving.Equilibrium point.Euclidean space.Existential quantification.Exterior (topology).Extreme point.Facet (geometry).Fubini's theorem.Function (mathematics).Function space.Fundamental theorem.Geometry.Helly's theorem.Hyperplane.Identity matrix.Inequality (mathematics).Infimum and supremum.Interior (topology).Invertible matrix.Iterative method.Limit of a sequence.Limit point.Linear inequality.Linear map.Linear programming.Mathematical analysis.Mathematical optimization.Mathematics.Matrix (mathematics).Maxima and minima.Maximal set.Measure (mathematics).Minimax theorem.Mutual exclusivity.NSPACE.Orthogonal basis.Orthogonal matrix.Orthogonal polynomials.Partially ordered set.Permutation.Polyhedron.Polynomial.Probability distribution.Probability.Proportionality (mathematics).Rational number.Riemann–Stieltjes integral.Scientific notation.Set (mathematics).Set theory.Sign (mathematics).Skew-symmetric matrix.Solution concept.Special case.Strategy (game theory).Subsequence.Subset.Summation.Symmetrization.Theorem.Theory of Games and Economic Behavior.Theory.Topology.Transfinite number.Transfinite.Unit interval.Unit sphere.Unit vector.Vandermonde matrix.Variable (mathematics).Vector space.Weak convergence (Hilbert space).Weyl's theorem.Game theory.519.3Kuhn Harold William, Tucker Albert William, DE-B1597DE-B1597BOOK9910154754103321Contributions to the Theory of Games (AM-24), Volume I2788529UNINA