Vai al contenuto principale della pagina

Advances in artificial intelligence and security . Part III : 7th international conference, ICAIS 2021, Dublin, Ireland, July 19-23, 2021, proceedings / / Xingming Sun



(Visualizza in formato marc)    (Visualizza in BIBFRAME)

Autore: Sun Xingming Visualizza persona
Titolo: Advances in artificial intelligence and security . Part III : 7th international conference, ICAIS 2021, Dublin, Ireland, July 19-23, 2021, proceedings / / Xingming Sun Visualizza cluster
Pubblicazione: Cham, Switzerland : , : Springer, , [2021]
©2021
Descrizione fisica: 1 online resource (771 pages)
Disciplina: 006.3
Soggetto topico: Artificial intelligence
Cloud computing - Security measures
Sommario/riassunto: Cloud Computing and Security.- Design and Implementation of Information Detection System Based On Privacy Sensitive Data.- Performance Modeling of OpenMP Program Based On LLVM Compilation Platform.- A Method of network attack recognition Based on CNN+LSTM Model.- Encryption and Cybersecurity.- Recognition Method of Abnormal Data in Local Area Network Common Channel Based on Convolutional Neural Network.- MCF-CSA: A Multi-level Collaboration Framework for Cyber Situation Awareness and Information Sharing.- VABox: A Virtualization-based Analysis Framework of Virtualization-Obfuscated Packed Executables.- Imbalance Malware Classification by Decoupling Representation and Classifier- The promotion of online communication ability of mainstream media- HNN-based Prediction Method Supporting Discovery of Production Abnormal.- Efficient Forward and Backward Private Searchable Symmetric Encryption for Multiple Data Sources.- A feature extracting and matching system based on magic-number and AC-algorithm.- A Review: How to detect malicious domains.- A Homomorphic Encryption Method for Power Data Based on Improved Paillier Algorithm.- The Vulnerabilities in Smart Contracts: A Survey.- Detection of false data injection attacks in Smart Grid based on Machine Learning.- An Adversarial Examples Defense Method Based on Image Low-frequency Information.- Information Hiding.- A Robust Watermarking Algorithm for Video Game Artwork Based on Pose Estimation Neural Network.- Research on Content Authentication Technology of Electronic Bills Based on Text Watermarking Algorithm.- Finding the better distortion function from prior scheme for Image Steganography.- Application in Aviation Customer Churn Prediction Using Classification Algorithm Based on Machine Learning.- Color Image Steganography Scheme Based on Convolutional Neural Network.- Robust JPEG steganography using singular value decomposition in DCT domain.- 3D Coverless Image Steganography Scheme Based on 3D Slice Technology.- Software Information Hiding Algorithm Based on Import Table of Portable Executable File.- A Novel Robust Reversible Watermarking Method Against JPEG Compression.- A Common Steganalysis Method of Low Embedding Rate Steganography in Compressed Speech Based on Hierarchy Feature Extraction and Fusion.- TStego-THU: Large-scale Text Steganalysis Dataset.- IoT Security.- Integration Innovation of Competitive Intelligence, AI and Big Data Analysis.- A Comprehensive Review of IoT Technologies and Applications for Healthcare.- A Pervasive Narrow-band Internet of Things (NB-IoT) based health monitoring platform for Ambient Assisted Living, . Design and Development of Field Mobile Monitoring System for Forest Fire Fighting.- ZigBee Wireless Network Attack and Detection.- Joint ToF and Doppler Estimation for Reflection Path Under the Wi-Fi TTW Scenario.- Securing Satellite Internet of Things by Perceiving Content Semantics.- Research on Cultivating Senior Technical Talents Based on the Internet of Things Platform.- Liquid Metal Droplet Series Based Wire Oscillation.- Linear Time-invariant System Reduced-order Finite-time Observer.- Research on invulnerability of WSN based on small world characteristics of complex networks.- Collaboration energy efficiency with mobile edge computing for target tracking in IOT.- Realization of CSI-based Human Behavior Recognition: A Survey.- Security Analysis of Blockchain Smart Contract: Taking Reentrancy Vulnerability as an Example.- Research on Data Security Protection System of Monitoring and Acquisition System Based on Block Chain Technology.- Adaptive Active Immune Policy for Sensing Nodes in Internet of Things.- ELM Forecasted Model of Ammonia Nitrogen in Lake Taihu Combined with Adaboost and Particle Swarm Optimization Algorithms.- Study on Identification of Multiple Pesticide Residues in Lettuce Leaves Based on Hyperspectral Technology.- Robust JPEG Image Steganography Based on
Titolo autorizzato: Advances in artificial intelligence and security  Visualizza cluster
ISBN: 3-030-78621-8
Formato: Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione: Inglese
Record Nr.: 9910488717103321
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Serie: Communications in Computer and Information Science