LEADER 04174nam 22006615 450 001 9911015627203321 005 20250716130251.0 010 $a981-9671-91-4 024 7 $a10.1007/978-981-96-7191-5 035 $a(MiAaPQ)EBC32212913 035 $a(Au-PeEL)EBL32212913 035 $a(CKB)39658919400041 035 $a(DE-He213)978-981-96-7191-5 035 $a(EXLCZ)9939658919400041 100 $a20250716d2025 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aArtificial Intelligence and Machine Learning $eSecond International Artificial Intelligence Conference, IAIC 2024, Jinyun, China, November 8?10, 2024, Revised Selected Papers, Part II /$fedited by Hai Jin 205 $a1st ed. 2025. 210 1$aSingapore :$cSpringer Nature Singapore :$cImprint: Springer,$d2025. 215 $a1 online resource (325 pages) 225 1 $aCommunications in Computer and Information Science,$x1865-0937 ;$v2452 311 08$a981-9671-90-6 327 $a -- Artificial Intelligence in Network and Security Systems. -- Noise-Resilient Compressive Sensing via Orthogonality Constraints. -- Joint Sensing of Computing Power and Network for Smart Grid: A Deep Matrix Completion Approach. -- Rethinking RSSI-based Key Extraction for UAVs and Ground Stations. -- Campus Card Security Depository System based on State Secret Algorithm. -- Network Traffic Classification via Deep Hashing Network. -- A Trust Management Integrated Bayesian Network Prediction in Vehicular Networks. -- Research and Development of Distribution Line Defects and Violations Detection Method and Edge Computing System Based on Improved PPYOLOe. -- A Joint Optimization Algorithm for Computing Resource Allocation, UAV Trajectory, and Task Offloading in Remote Regional VANETs. -- LSTMR: Spatio-Temporal 3D Multiscale ResNet Model for Cellular Network Traffic Prediction. -- An Efficient Name Lookup Approach Based on Character Indexing. -- A Multi-Channel Target Direction Speech Separation Model Based on Efficient Convolutional Networks. -- Secure Cloud-Edge Collaborative Task Scheduling Framework Across Data Centers. -- Research on Security Sharing Mechanism of Cyber Threat Intelligence Based on Consortium Blockchain. -- Towards Automated Decoding of Vehicle CAN Data using Deep Learning. -- Transfer Learning-driven Surrogate-assisted Differential Evolution Algorithm with User Generated Content. 330 $aThis CCIS volume constitutes the refereed proceedings of Second International Artificial Intelligence Conference on Artificial Intelligence and Machine Learning, IAIC 2024, held in Jinyun, China, November 2024. The 38 full papers presented were carefully reviewed and selected from 100 submissions.They were organized in following topical sections as follows: Part I : Artificial Intelligence in Real-World Applications. Part II : Artificial Intelligence in Network and Security systems. 410 0$aCommunications in Computer and Information Science,$x1865-0937 ;$v2452 606 $aArtificial intelligence 606 $aData protection 606 $aApplication software 606 $aComputer networks 606 $aMachine learning 606 $aArtificial Intelligence 606 $aData and Information Security 606 $aComputer and Information Systems Applications 606 $aComputer Communication Networks 606 $aMachine Learning 615 0$aArtificial intelligence. 615 0$aData protection. 615 0$aApplication software. 615 0$aComputer networks. 615 0$aMachine learning. 615 14$aArtificial Intelligence. 615 24$aData and Information Security. 615 24$aComputer and Information Systems Applications. 615 24$aComputer Communication Networks. 615 24$aMachine Learning. 676 $a006.3 700 $aJin$b Hai$01588903 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9911015627203321 996 $aArtificial Intelligence and Machine Learning$94408257 997 $aUNINA