LEADER 05468nam 2200469 450 001 996464514803316 005 20220407175100.0 010 $a3-030-78621-8 035 $a(CKB)5590000000517971 035 $a(MiAaPQ)EBC6676293 035 $a(Au-PeEL)EBL6676293 035 $a(BIP)080231568 035 $a(PPN)258060603 035 $a(OCoLC)1259515711 035 $a(EXLCZ)995590000000517971 100 $a20220407d2021 uy 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aAdvances in artificial intelligence and security$hPart III $e7th international conference, ICAIS 2021, Dublin, Ireland, July 19-23, 2021, proceedings /$fXingming Sun 210 1$aCham, Switzerland :$cSpringer,$d[2021] 210 4$dİ2021 215 $a1 online resource (771 pages) 225 1 $aCommunications in Computer and Information Science ;$vv.1424 311 $a3-030-78620-X 330 8 $aCloud Computing and Security.- Design and Implementation of Information Detection System Based On Privacy Sensitive Data.- Performance Modeling of OpenMP Program Based On LLVM Compilation Platform.- A Method of network attack recognition Based on CNN+LSTM Model.- Encryption and Cybersecurity.- Recognition Method of Abnormal Data in Local Area Network Common Channel Based on Convolutional Neural Network.- MCF-CSA: A Multi-level Collaboration Framework for Cyber Situation Awareness and Information Sharing.- VABox: A Virtualization-based Analysis Framework of Virtualization-Obfuscated Packed Executables.- Imbalance Malware Classification by Decoupling Representation and Classifier- The promotion of online communication ability of mainstream media- HNN-based Prediction Method Supporting Discovery of Production Abnormal.- Efficient Forward and Backward Private Searchable Symmetric Encryption for Multiple Data Sources.- A feature extracting and matching system based on magic-number and AC-algorithm.- A Review: How to detect malicious domains.- A Homomorphic Encryption Method for Power Data Based on Improved Paillier Algorithm.- The Vulnerabilities in Smart Contracts: A Survey.- Detection of false data injection attacks in Smart Grid based on Machine Learning.- An Adversarial Examples Defense Method Based on Image Low-frequency Information.- Information Hiding.- A Robust Watermarking Algorithm for Video Game Artwork Based on Pose Estimation Neural Network.- Research on Content Authentication Technology of Electronic Bills Based on Text Watermarking Algorithm.- Finding the better distortion function from prior scheme for Image Steganography.- Application in Aviation Customer Churn Prediction Using Classification Algorithm Based on Machine Learning.- Color Image Steganography Scheme Based on Convolutional Neural Network.- Robust JPEG steganography using singular value decomposition in DCT domain.- 3D Coverless Image Steganography Scheme Based on 3D Slice Technology.- Software Information Hiding Algorithm Based on Import Table of Portable Executable File.- A Novel Robust Reversible Watermarking Method Against JPEG Compression.- A Common Steganalysis Method of Low Embedding Rate Steganography in Compressed Speech Based on Hierarchy Feature Extraction and Fusion.- TStego-THU: Large-scale Text Steganalysis Dataset.- IoT Security.- Integration Innovation of Competitive Intelligence, AI and Big Data Analysis.- A Comprehensive Review of IoT Technologies and Applications for Healthcare.- A Pervasive Narrow-band Internet of Things (NB-IoT) based health monitoring platform for Ambient Assisted Living, . Design and Development of Field Mobile Monitoring System for Forest Fire Fighting.- ZigBee Wireless Network Attack and Detection.- Joint ToF and Doppler Estimation for Reflection Path Under the Wi-Fi TTW Scenario.- Securing Satellite Internet of Things by Perceiving Content Semantics.- Research on Cultivating Senior Technical Talents Based on the Internet of Things Platform.- Liquid Metal Droplet Series Based Wire Oscillation.- Linear Time-invariant System Reduced-order Finite-time Observer.- Research on invulnerability of WSN based on small world characteristics of complex networks.- Collaboration energy efficiency with mobile edge computing for target tracking in IOT.- Realization of CSI-based Human Behavior Recognition: A Survey.- Security Analysis of Blockchain Smart Contract: Taking Reentrancy Vulnerability as an Example.- Research on Data Security Protection System of Monitoring and Acquisition System Based on Block Chain Technology.- Adaptive Active Immune Policy for Sensing Nodes in Internet of Things.- ELM Forecasted Model of Ammonia Nitrogen in Lake Taihu Combined with Adaboost and Particle Swarm Optimization Algorithms.- Study on Identification of Multiple Pesticide Residues in Lettuce Leaves Based on Hyperspectral Technology.- Robust JPEG Image Steganography Based on 410 0$aCommunications in Computer and Information Science 606 $aArtificial intelligence$vCongresses 606 $aCloud computing$xSecurity measures$vCongresses 615 0$aArtificial intelligence 615 0$aCloud computing$xSecurity measures 676 $a006.3 700 $aSun$b Xingming$0846737 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996464514803316 996 $aAdvances in artificial intelligence and security$93659082 997 $aUNISA