04174nam 22006615 450 991101562720332120250716130251.0981-9671-91-410.1007/978-981-96-7191-5(MiAaPQ)EBC32212913(Au-PeEL)EBL32212913(CKB)39658919400041(DE-He213)978-981-96-7191-5(EXLCZ)993965891940004120250716d2025 u| 0engurcnu||||||||txtrdacontentcrdamediacrrdacarrierArtificial Intelligence and Machine Learning Second International Artificial Intelligence Conference, IAIC 2024, Jinyun, China, November 8–10, 2024, Revised Selected Papers, Part II /edited by Hai Jin1st ed. 2025.Singapore :Springer Nature Singapore :Imprint: Springer,2025.1 online resource (325 pages)Communications in Computer and Information Science,1865-0937 ;2452981-9671-90-6 -- Artificial Intelligence in Network and Security Systems. -- Noise-Resilient Compressive Sensing via Orthogonality Constraints. -- Joint Sensing of Computing Power and Network for Smart Grid: A Deep Matrix Completion Approach. -- Rethinking RSSI-based Key Extraction for UAVs and Ground Stations. -- Campus Card Security Depository System based on State Secret Algorithm. -- Network Traffic Classification via Deep Hashing Network. -- A Trust Management Integrated Bayesian Network Prediction in Vehicular Networks. -- Research and Development of Distribution Line Defects and Violations Detection Method and Edge Computing System Based on Improved PPYOLOe. -- A Joint Optimization Algorithm for Computing Resource Allocation, UAV Trajectory, and Task Offloading in Remote Regional VANETs. -- LSTMR: Spatio-Temporal 3D Multiscale ResNet Model for Cellular Network Traffic Prediction. -- An Efficient Name Lookup Approach Based on Character Indexing. -- A Multi-Channel Target Direction Speech Separation Model Based on Efficient Convolutional Networks. -- Secure Cloud-Edge Collaborative Task Scheduling Framework Across Data Centers. -- Research on Security Sharing Mechanism of Cyber Threat Intelligence Based on Consortium Blockchain. -- Towards Automated Decoding of Vehicle CAN Data using Deep Learning. -- Transfer Learning-driven Surrogate-assisted Differential Evolution Algorithm with User Generated Content.This CCIS volume constitutes the refereed proceedings of Second International Artificial Intelligence Conference on Artificial Intelligence and Machine Learning, IAIC 2024, held in Jinyun, China, November 2024. The 38 full papers presented were carefully reviewed and selected from 100 submissions.They were organized in following topical sections as follows: Part I : Artificial Intelligence in Real-World Applications. Part II : Artificial Intelligence in Network and Security systems.Communications in Computer and Information Science,1865-0937 ;2452Artificial intelligenceData protectionApplication softwareComputer networksMachine learningArtificial IntelligenceData and Information SecurityComputer and Information Systems ApplicationsComputer Communication NetworksMachine LearningArtificial intelligence.Data protection.Application software.Computer networks.Machine learning.Artificial Intelligence.Data and Information Security.Computer and Information Systems Applications.Computer Communication Networks.Machine Learning.006.3Jin Hai1588903MiAaPQMiAaPQMiAaPQBOOK9911015627203321Artificial Intelligence and Machine Learning4408257UNINA